From fa87f02f6ae9ea0562796b5c4a43d80ba65db7eb Mon Sep 17 00:00:00 2001 From: Takumi Yanagawa Date: Tue, 5 Dec 2023 15:05:15 +0900 Subject: [PATCH 01/13] Align the latest OSCAL Assessment Results and consolidate ocm test data in ocm dedicated directory Signed-off-by: Takumi Yanagawa --- cmd/ocm/oscal2policy/c2p-config.yaml | 2 +- cmd/ocm/result2oscal/c2p-config.yaml | 4 +- cmd/ocm/result2oscal/cmd/cmd.go | 17 +- docs/oscal-vs-ocm-status-mapping.csv | 16 ++ go.mod | 2 +- pkg/ocm/oscal2policy_test.go | 5 +- pkg/ocm/reporter/helper_test.go | 2 +- pkg/ocm/reporter/reporter.go | 192 +++++++++-------- pkg/ocm/reporter/reporter_test.go | 52 ++--- pkg/testdata/ocm/assessment-results.json | 204 ++++++++++++++++++ .../{oscal/reporter-test => ocm}/catalog.json | 0 .../component-definition.json | 0 .../MachineConfig.50-worker-chrony.0.yaml | 0 .../policies/add-chrony/kustomization.yaml | 0 .../policies/add-chrony/policy-generator.yaml | 0 .../kustomization.yaml | 0 .../LVMCluster.odf-lvmcluster.0.yaml | 0 .../policy-generator.yaml | 0 .../Namespace.openshift-storage.0.yaml | 0 ...oup.openshift-storage-operatorgroup.0.yaml | 0 .../Subscription.lvm-operator.0.yaml | 0 .../policy-deployment/kustomization.yaml | 0 .../policy-deployment/policy-generator.yaml | 0 .../Deployment.nginx-deployment.0.yaml | 0 .../kustomization.yaml | 0 .../Role.noname.0.yaml | 0 .../policy-generator.yaml | 0 .../ScanSettingBinding.high.0.yaml | 0 .../ComplianceCheckResult.noname.0.yaml | 0 .../ComplianceSuite.high.0.yaml | 0 .../policy-high-scan/kustomization.yaml | 0 .../policy-high-scan/policy-generator.yaml | 0 .../kustomization.yaml | 0 .../policy-generator.yaml | 0 .../Deployment.nginx-deployment.0.yaml | 0 .../policy-results/00.placementdecisions.yaml | 0 .../{ => ocm}/policy-results/00.policies.yaml | 0 .../policy-results/00.policysets.yaml | 0 ...lacement-managed-kubernetes-decision-1.yml | 0 .../Policy.c2p.policy-deployment.yml | 0 .../Policy.c2p.policy-disallowed-roles.yml | 0 .../Policy.c2p.policy-high-scan.yml | 0 .../Policy.cluster1.c2p.policy-deployment.yml | 0 ...y.cluster1.c2p.policy-disallowed-roles.yml | 0 .../Policy.cluster1.c2p.policy-high-scan.yml | 0 .../Policy.cluster2.c2p.policy-deployment.yml | 0 ...y.cluster2.c2p.policy-disallowed-roles.yml | 0 .../Policy.cluster2.c2p.policy-high-scan.yml | 0 .../PolicySet.c2p.managed-kubernetes.yml | 0 .../{oscal/reporter-test => ocm}/profile.json | 0 pkg/testdata/oscal/component-definition.json | 150 ------------- pkg/testdata/reports/compliance-report.md | 108 ---------- 52 files changed, 353 insertions(+), 401 deletions(-) create mode 100644 docs/oscal-vs-ocm-status-mapping.csv create mode 100755 pkg/testdata/ocm/assessment-results.json rename pkg/testdata/{oscal/reporter-test => ocm}/catalog.json (100%) rename pkg/testdata/{oscal/reporter-test => ocm}/component-definition.json (100%) rename pkg/testdata/{ => ocm}/policies/add-chrony/add-chrony-worker/MachineConfig.50-worker-chrony.0.yaml (100%) rename pkg/testdata/{ => ocm}/policies/add-chrony/kustomization.yaml (100%) rename pkg/testdata/{ => ocm}/policies/add-chrony/policy-generator.yaml (100%) rename pkg/testdata/{ => ocm}/policies/install-odf-lvm-operator/kustomization.yaml (100%) rename pkg/testdata/{ => ocm}/policies/install-odf-lvm-operator/odf-lvmcluster/LVMCluster.odf-lvmcluster.0.yaml (100%) rename pkg/testdata/{ => ocm}/policies/install-odf-lvm-operator/policy-generator.yaml (100%) rename pkg/testdata/{ => ocm}/policies/install-odf-lvm-operator/policy-odf-lvm-operator/Namespace.openshift-storage.0.yaml (100%) rename pkg/testdata/{ => ocm}/policies/install-odf-lvm-operator/policy-odf-lvm-operator/OperatorGroup.openshift-storage-operatorgroup.0.yaml (100%) rename pkg/testdata/{ => ocm}/policies/install-odf-lvm-operator/policy-odf-lvm-operator/Subscription.lvm-operator.0.yaml (100%) rename pkg/testdata/{ => ocm}/policies/policy-deployment/kustomization.yaml (100%) rename pkg/testdata/{ => ocm}/policies/policy-deployment/policy-generator.yaml (100%) rename pkg/testdata/{ => ocm}/policies/policy-deployment/policy-nginx-deployment/Deployment.nginx-deployment.0.yaml (100%) rename pkg/testdata/{ => ocm}/policies/policy-disallowed-roles/kustomization.yaml (100%) rename pkg/testdata/{ => ocm}/policies/policy-disallowed-roles/policy-disallowed-roles-sample-role/Role.noname.0.yaml (100%) rename pkg/testdata/{ => ocm}/policies/policy-disallowed-roles/policy-generator.yaml (100%) rename pkg/testdata/{ => ocm}/policies/policy-high-scan/compliance-high-scan/ScanSettingBinding.high.0.yaml (100%) rename pkg/testdata/{ => ocm}/policies/policy-high-scan/compliance-suite-high-results/ComplianceCheckResult.noname.0.yaml (100%) rename pkg/testdata/{ => ocm}/policies/policy-high-scan/compliance-suite-high/ComplianceSuite.high.0.yaml (100%) rename pkg/testdata/{ => ocm}/policies/policy-high-scan/kustomization.yaml (100%) rename pkg/testdata/{ => ocm}/policies/policy-high-scan/policy-generator.yaml (100%) rename pkg/testdata/{ => ocm}/policies/policy-nginx-deployment/kustomization.yaml (100%) rename pkg/testdata/{ => ocm}/policies/policy-nginx-deployment/policy-generator.yaml (100%) rename pkg/testdata/{ => ocm}/policies/policy-nginx-deployment/policy-nginx-deployment/Deployment.nginx-deployment.0.yaml (100%) rename pkg/testdata/{ => ocm}/policy-results/00.placementdecisions.yaml (100%) rename pkg/testdata/{ => ocm}/policy-results/00.policies.yaml (100%) rename pkg/testdata/{ => ocm}/policy-results/00.policysets.yaml (100%) rename pkg/testdata/{ => ocm}/policy-results/PlacementDecision.c2p.placement-managed-kubernetes-decision-1.yml (100%) rename pkg/testdata/{ => ocm}/policy-results/Policy.c2p.policy-deployment.yml (100%) rename pkg/testdata/{ => ocm}/policy-results/Policy.c2p.policy-disallowed-roles.yml (100%) rename pkg/testdata/{ => ocm}/policy-results/Policy.c2p.policy-high-scan.yml (100%) rename pkg/testdata/{ => ocm}/policy-results/Policy.cluster1.c2p.policy-deployment.yml (100%) rename pkg/testdata/{ => ocm}/policy-results/Policy.cluster1.c2p.policy-disallowed-roles.yml (100%) rename pkg/testdata/{ => ocm}/policy-results/Policy.cluster1.c2p.policy-high-scan.yml (100%) rename pkg/testdata/{ => ocm}/policy-results/Policy.cluster2.c2p.policy-deployment.yml (100%) rename pkg/testdata/{ => ocm}/policy-results/Policy.cluster2.c2p.policy-disallowed-roles.yml (100%) rename pkg/testdata/{ => ocm}/policy-results/Policy.cluster2.c2p.policy-high-scan.yml (100%) rename pkg/testdata/{ => ocm}/policy-results/PolicySet.c2p.managed-kubernetes.yml (100%) rename pkg/testdata/{oscal/reporter-test => ocm}/profile.json (100%) delete mode 100644 pkg/testdata/oscal/component-definition.json diff --git a/cmd/ocm/oscal2policy/c2p-config.yaml b/cmd/ocm/oscal2policy/c2p-config.yaml index 2c1bc45..1cd541a 100644 --- a/cmd/ocm/oscal2policy/c2p-config.yaml +++ b/cmd/ocm/oscal2policy/c2p-config.yaml @@ -7,7 +7,7 @@ compliance: componentDefinition: url: ./pkg/composer/testdata/oscal/component-definition.json policyResources: - url: ./pkg/composer/testdata/policies + url: ./pkg/composer/testdata/ocm/policies policyResults: url: a/b/c clusterGroups: diff --git a/cmd/ocm/result2oscal/c2p-config.yaml b/cmd/ocm/result2oscal/c2p-config.yaml index 70e663e..225c511 100644 --- a/cmd/ocm/result2oscal/c2p-config.yaml +++ b/cmd/ocm/result2oscal/c2p-config.yaml @@ -7,9 +7,9 @@ compliance: componentDefinition: url: ./pkg/testdata/oscal/reporter-test/component-definition.json policyResources: - url: ./pkg/testdata/policies + url: ./pkg/testdata/ocm/policies policyResults: - url: ./pkg/testdata/policy-results + url: ./pkg/testdata/ocm/policy-results clusterGroups: - name: test-group # name of clusterGroup matchLabels: diff --git a/cmd/ocm/result2oscal/cmd/cmd.go b/cmd/ocm/result2oscal/cmd/cmd.go index e53f233..1328a79 100644 --- a/cmd/ocm/result2oscal/cmd/cmd.go +++ b/cmd/ocm/result2oscal/cmd/cmd.go @@ -33,7 +33,7 @@ func New() *cobra.Command { command := &cobra.Command{ Use: "result2oscal", - Short: "Generate OSCAL Assessment Results from Kyverno policies and the policy reports", + Short: "Generate OSCAL Assessment Results from OCM Policy statuses", RunE: func(cmd *cobra.Command, args []string) error { if err := opts.Complete(); err != nil { return err @@ -71,26 +71,15 @@ func Run(options *options.Options) error { r := reporter.NewReporter(c2pcrParsed) r.SetGenerationType(reporter.GenerationTypePolicyReport) - report, err := r.Generate() + arRoot, err := r.Generate() if err != nil { panic(err) } - err = pkg.WriteObjToYamlFile(outputDir+"/compliance-report.yaml", report) + err = pkg.WriteObjToJsonFile(outputDir+"/assessment-results.json", arRoot) if err != nil { panic(err) } - for _, pr := range r.GetPolicyReports() { - nspath, err := pkg.MakeDir(outputDir + "/" + pr.Namespace) - if err != nil { - panic(err) - } - err = pkg.WriteObjToYamlFile(nspath+"/"+pr.Name+".yaml", pr) - if err != nil { - panic(err) - } - } - return nil } diff --git a/docs/oscal-vs-ocm-status-mapping.csv b/docs/oscal-vs-ocm-status-mapping.csv new file mode 100644 index 0000000..61fca5e --- /dev/null +++ b/docs/oscal-vs-ocm-status-mapping.csv @@ -0,0 +1,16 @@ +Field of OSCAL Assessment Result,How is OCM Policy status mapped,Field of OCM Policy status +local-definitions.inventory-items[],Per cluster,status_status = policies[].find(x -> x.namespace == hub ns).flatmap(x1 -> status.status[].map(x2 -> x2)) +local-definitions.inventory-items[].props[].(cluster-name),Cluster name,status_status.clustername +observations[],Per rule (= per policy),OSCAL CDef Rule Ids +observations[].props[].(assessment-rule-id),Rule Id,OSCAL CDef Rule Id +observations[].props[].(policy-id),Policy Id,OSCAL CDef Policy Id +observations[].props[].(control-id),Control Id,OSCAL CDef Control Id +observations[].props[].(result),Aggregated status of compliance over clusters (=subjects),policies[].find(x -> x.namespace == hub ns && x -> x.metadata.name == policy-id).status.compliant == “Compliant” ? “pass” : “fail” +observations[].subjects[],Per policy status of cluster,status[i] := policies[].find(x -> x.metadata.name == policy-id).status.status[] +observations[].subjects[].subject-uuid,Inventory item id of the check,inventory-items[].find(x -> x.props[].(cluster-name) == status[i].clustername).id +observations[].subjects[].props[].(result),Status of compliance (pass/fail),status[i].compliant == “Compliant” ? “pass” : “fail” +observations[].subjects[].props[].(reason),Reason of the status,details := policies[].find(x -> x.namespace == clustername && x.metadata.name == policy-id).status.details +observations[].subjects[].props[].(evaluate-on),Evaluation timestamp,details.map(x -> x.history[0].lastTimestamp).sort_by_descend()[0] +observations[].relevant_references[].description,Evidence description,TBD +observations[].relevant_references[].href,Evidence urls,TBD +observations[].links[].href,Report urls,TBD \ No newline at end of file diff --git a/go.mod b/go.mod index f81e71f..eb74e73 100644 --- a/go.mod +++ b/go.mod @@ -4,6 +4,7 @@ go 1.19 require ( github.com/go-logr/logr v1.2.4 + github.com/google/go-cmp v0.5.9 github.com/google/uuid v1.3.0 github.com/kcp-dev/kcp/pkg/apis v0.11.0 github.com/kyverno/kyverno v1.10.3 @@ -128,7 +129,6 @@ require ( github.com/golang/snappy v0.0.4 // indirect github.com/google/certificate-transparency-go v1.1.4 // indirect github.com/google/gnostic v0.6.9 // indirect - github.com/google/go-cmp v0.5.9 // indirect github.com/google/go-containerregistry v0.14.0 // indirect github.com/google/go-github/v45 v45.2.0 // indirect github.com/google/go-querystring v1.1.0 // indirect diff --git a/pkg/ocm/oscal2policy_test.go b/pkg/ocm/oscal2policy_test.go index 0af10c3..8b09b08 100644 --- a/pkg/ocm/oscal2policy_test.go +++ b/pkg/ocm/oscal2policy_test.go @@ -27,11 +27,10 @@ import ( ) func TestOscal2Policy(t *testing.T) { - policyDir := pkg.PathFromPkgDirectory("./testdata/policies") + policyDir := pkg.PathFromPkgDirectory("./testdata/ocm/policies") catalogPath := pkg.PathFromPkgDirectory("./testdata/oscal/catalog.json") profilePath := pkg.PathFromPkgDirectory("./testdata/oscal/profile.json") - cdPath := pkg.PathFromPkgDirectory("./testdata/oscal/component-definition.json") - // expectedDir := pkg.PathFromPkgDirectory("./composer/testdata/expected/c2pcr-parser-composed-policies") + cdPath := pkg.PathFromPkgDirectory("./testdata/ocm/component-definition.json") tempDirPath := pkg.PathFromPkgDirectory("./testdata/_test") err := os.MkdirAll(tempDirPath, os.ModePerm) diff --git a/pkg/ocm/reporter/helper_test.go b/pkg/ocm/reporter/helper_test.go index 8cb418f..cc5a4c0 100644 --- a/pkg/ocm/reporter/helper_test.go +++ b/pkg/ocm/reporter/helper_test.go @@ -36,7 +36,7 @@ func TestConvertToPolicyReport(t *testing.T) { func(policySet typepolicy.PolicySet) {}, func(placementDecision typeplacementdecision.PlacementDecision) {}, ) - err := filepath.Walk(pkg.PathFromPkgDirectory("./testdata/policy-results"), traverseFunc) + err := filepath.Walk(pkg.PathFromPkgDirectory("./testdata/ocm/policy-results"), traverseFunc) assert.NoError(t, err, "Should not happen") tempDirPath := pkg.PathFromPkgDirectory("./testdata/_test") diff --git a/pkg/ocm/reporter/reporter.go b/pkg/ocm/reporter/reporter.go index 6a2a514..a656dea 100644 --- a/pkg/ocm/reporter/reporter.go +++ b/pkg/ocm/reporter/reporter.go @@ -32,6 +32,8 @@ import ( "github.com/IBM/compliance-to-policy/pkg/oscal" typec2pcr "github.com/IBM/compliance-to-policy/pkg/types/c2pcr" + typear "github.com/IBM/compliance-to-policy/pkg/types/oscal/assessmentresults" + typeoscalcommon "github.com/IBM/compliance-to-policy/pkg/types/oscal/common" typeplacementdecision "github.com/IBM/compliance-to-policy/pkg/types/placementdecision" typepolicy "github.com/IBM/compliance-to-policy/pkg/types/policy" typereport "github.com/IBM/compliance-to-policy/pkg/types/report" @@ -79,11 +81,7 @@ func (r *Reporter) SetGenerationType(generationType GenerationType) { r.generationType = generationType } -func (r *Reporter) GetPolicyReports() []*typepolr.PolicyReport { - return r.policyReports -} - -func (r *Reporter) Generate() (typereport.ComplianceReport, error) { +func (r *Reporter) Generate() (*typear.AssessmentResultsRoot, error) { traverseFunc := genTraverseFunc( func(policy typepolicy.Policy) { r.policies = append(r.policies, &policy) }, func(policySet typepolicy.PolicySet) { r.policySets = append(r.policySets, &policySet) }, @@ -94,11 +92,30 @@ func (r *Reporter) Generate() (typereport.ComplianceReport, error) { if err := filepath.Walk(r.c2pParsed.PolicyResultsDir, traverseFunc); err != nil { logger.Error(err.Error()) } + + inventories := []typear.InventoryItem{} + clusternameIndex := map[string]bool{} for _, policy := range r.policies { polr := ConvertToPolicyReport(*policy) r.policyReports = append(r.policyReports, &polr) + if policy.Namespace == r.c2pParsed.Namespace { + for _, s := range policy.Status.Status { + _, exist := clusternameIndex[s.ClusterName] + if !exist { + clusternameIndex[s.ClusterName] = true + item := typear.InventoryItem{ + UUID: oscal.GenerateUUID(), + Props: []typeoscalcommon.Prop{{ + Name: "cluster-name", + Value: s.ClusterName, + }}, + } + inventories = append(inventories, item) + } + } + } } - reportComponents := []typereport.Component{} + observations := []typear.Observation{} for _, cdobj := range r.c2pParsed.ComponentObjects { policySets := typeutils.FilterByAnnotation(r.policySets, pkg.ANNOTATION_COMPONENT_TITLE, cdobj.ComponentTitle) clusterNameSets := sets.NewString() @@ -119,7 +136,6 @@ func (r *Reporter) Generate() (typereport.ComplianceReport, error) { } } for _, controlImpleObj := range cdobj.ControlImpleObjects { - controlResults := []typereport.ControlResult{} requiredControls := sets.NewString() checkedControls := sets.NewString() for _, controlObj := range controlImpleObj.ControlObjects { @@ -140,8 +156,8 @@ func (r *Reporter) Generate() (typereport.ComplianceReport, error) { if policySet != nil { policy = typeutils.FindByNamespaceName(r.policies, policySet.Namespace, policyId) } - var reason string var ruleStatus typereport.RuleStatus + subjects := []typear.Subject{} if policy != nil { var reasons []Reason if r.generationType == GenerationTypePolicyReport { @@ -149,62 +165,98 @@ func (r *Reporter) Generate() (typereport.ComplianceReport, error) { } else { reasons = r.GenerateReasonsFromRawPolicies(*policy) } - if statusByte, err := sigyaml.Marshal(reasons); err == nil { - reason = string(statusByte) - } else { - reason = err.Error() - } ruleStatus = mapToRuleStatus(policy.Status.ComplianceState) + for _, reason := range reasons { + var clusterName string + var inventoryUuid string + for _, inventory := range inventories { + prop, ok := oscal.FindProp("cluster-name", inventory.Props) + if ok { + clusterName = prop.Value + inventoryUuid = inventory.UUID + } else { + clusterName = "N/A" + inventoryUuid = "" + } + } + if inventoryUuid != "" { + var message string + if messageByte, err := sigyaml.Marshal(reason.Messages); err == nil { + message = string(messageByte) + } else { + message = err.Error() + } + subject := typear.Subject{ + SubjectUUID: inventoryUuid, + Type: "resource", + Title: "Cluster Name: " + clusterName, + Props: []typeoscalcommon.Prop{{ + Name: "result", + Value: string(mapToRuleStatus(reason.ComplianceState)), + }, { + Name: "reason", + Value: message, + }}, + } + subjects = append(subjects, subject) + } + } } else { - reason = fmt.Sprintf("Unable to find policy status for policy %s", policyId) ruleStatus = typereport.RuleStatusError } - ruleResult := typereport.RuleResult{ - RuleId: ruleId, - PolicyId: policyId, - Status: ruleStatus, - Reason: reason, + observation := typear.Observation{ + UUID: oscal.GenerateUUID(), + Description: fmt.Sprintf("Observation of policy %s", policyId), + Methods: []string{"TEST-AUTOMATED"}, + Props: []typeoscalcommon.Prop{{ + Name: "assessment-rule-id", + Value: ruleId, + }, { + Name: "policy-id", + Value: policyId, + }, { + Name: "control-id", + Value: controlId, + }, { + Name: "result", + Value: string(ruleStatus), + }}, + Subjects: subjects, } - ruleResults = append(ruleResults, ruleResult) + observations = append(observations, observation) checkedControls.Insert(controlId) } } - controlResult := typereport.ControlResult{ - ControlId: controlId, - RuleResults: ruleResults, - ComplianceStatus: aggregateRuleResults(ruleResults), - } - controlResults = append(controlResults, controlResult) - } - parameters := map[string]string{} - for _, setParam := range controlImpleObj.SetParameters { - parameters[setParam.ParamID] = setParam.Values[0] - } - reportComponent := typereport.Component{ - ComponentTitle: cdobj.ComponentTitle, - RequiredControls: requiredControls.List(), - CheckedControls: checkedControls.List(), - Parameters: parameters, - ControlResults: controlResults, - ComplianceStatus: aggregateControlResults(controlResults), } - reportComponents = append(reportComponents, reportComponent) } } - spec := typereport.Spec{ - Catalog: r.c2pParsed.Catalog.Metadata.Title, - Profile: r.c2pParsed.Profile.Metadata.Title, - Components: reportComponents, + + metadata := typear.Metadata{ + Title: "OSCAL Assessment Results", + LastModified: time.Now(), + Version: "0.0.1", + OscalVersion: "1.0.4", } - complianceReport := typereport.ComplianceReport{ - ObjectMeta: v1.ObjectMeta{ - Name: "compliance-report", - CreationTimestamp: v1.Now(), - }, - Spec: spec, + importAp := typear.ImportAp{ + Href: "http://...", + } + ar := typear.AssessmentResults{ + UUID: oscal.GenerateUUID(), + Metadata: metadata, + ImportAp: importAp, + Results: []typear.Result{}, + } + result := typear.Result{ + UUID: oscal.GenerateUUID(), + Title: "Assessment Results by OCM", + Description: "Assessment Results by OCM...", + Start: time.Now(), + Observations: observations, } + ar.Results = append(ar.Results, result) + arRoot := typear.AssessmentResultsRoot{AssessmentResults: ar} - return complianceReport, nil + return &arRoot, nil } func (r *Reporter) GenerateReasonsFromRawPolicies(policy typepolicy.Policy) []Reason { @@ -275,46 +327,6 @@ func aggregatePolicyReportSummaryToComplianceState(summary typepolr.PolicyReport } } -func aggregateRuleResults(ruleResults []typereport.RuleResult) typereport.ComplianceStatus { - countPass := 0 - countFail := 0 - countError := 0 - countUnimple := 0 - for _, ruleResult := range ruleResults { - switch ruleResult.Status { - case typereport.RuleStatusPass: - countPass++ - case typereport.RuleStatusFail: - countFail++ - case typereport.RuleStatusError: - countError++ - case typereport.RuleStatusUnImplemented: - countUnimple++ - } - } - if countPass != 0 && countPass == len(ruleResults) { - return typereport.ComplianceStatusCompliant - } - return typereport.ComplianceStatusNonCompliant -} - -func aggregateControlResults(controlResults []typereport.ControlResult) typereport.ComplianceStatus { - countCompiant := 0 - countNonCompiant := 0 - for _, controlResult := range controlResults { - switch controlResult.ComplianceStatus { - case typereport.ComplianceStatusCompliant: - countCompiant++ - case typereport.ComplianceStatusNonCompliant: - countNonCompiant++ - } - } - if countCompiant != 0 && countCompiant == len(controlResults) { - return typereport.ComplianceStatusCompliant - } - return typereport.ComplianceStatusNonCompliant -} - func genTraverseFunc(onPolicy func(typepolicy.Policy), onPolicySet func(typepolicy.PolicySet), onPlacementDesicion func(typeplacementdecision.PlacementDecision)) func(path string, info os.FileInfo, err error) error { return func(path string, info os.FileInfo, err error) error { if err != nil { diff --git a/pkg/ocm/reporter/reporter_test.go b/pkg/ocm/reporter/reporter_test.go index 8344487..5d258ef 100644 --- a/pkg/ocm/reporter/reporter_test.go +++ b/pkg/ocm/reporter/reporter_test.go @@ -17,24 +17,25 @@ limitations under the License. package reporter import ( - "fmt" "os" "testing" "github.com/IBM/compliance-to-policy/pkg" "github.com/IBM/compliance-to-policy/pkg/c2pcr" typec2pcr "github.com/IBM/compliance-to-policy/pkg/types/c2pcr" - typereport "github.com/IBM/compliance-to-policy/pkg/types/report" + typear "github.com/IBM/compliance-to-policy/pkg/types/oscal/assessmentresults" + "github.com/google/go-cmp/cmp" + "github.com/google/go-cmp/cmp/cmpopts" "github.com/stretchr/testify/assert" ) func TestReporter(t *testing.T) { - policyDir := pkg.PathFromPkgDirectory("./testdata/policies") - policyResultsDir := pkg.PathFromPkgDirectory("./testdata/policy-results") - catalogPath := pkg.PathFromPkgDirectory("./testdata/oscal/reporter-test/catalog.json") - profilePath := pkg.PathFromPkgDirectory("./testdata/oscal/reporter-test/profile.json") - cdPath := pkg.PathFromPkgDirectory("./testdata/oscal/reporter-test/component-definition.json") + policyDir := pkg.PathFromPkgDirectory("./testdata/ocm/policies") + policyResultsDir := pkg.PathFromPkgDirectory("./testdata/ocm/policy-results") + catalogPath := pkg.PathFromPkgDirectory("./testdata/ocm/catalog.json") + profilePath := pkg.PathFromPkgDirectory("./testdata/ocm/profile.json") + cdPath := pkg.PathFromPkgDirectory("./testdata/ocm/component-definition.json") tempDirPath := pkg.PathFromPkgDirectory("./testdata/_test") err := os.MkdirAll(tempDirPath, os.ModePerm) @@ -79,34 +80,23 @@ func TestReporter(t *testing.T) { assert.NoError(t, err, "Should not happen") reporter := NewReporter(c2pcrParsed) - report, err := reporter.Generate() + arRoot, err := reporter.Generate() assert.NoError(t, err, "Should not happen") - err = pkg.WriteObjToYamlFile(tempDir.GetTempDir()+"/compliance-report.yaml", report) + err = pkg.WriteObjToJsonFile(tempDir.GetTempDir()+"/assessment-results.json", arRoot) assert.NoError(t, err, "Should not happen") - var expected typereport.ComplianceReport - err = pkg.LoadYamlFileToK8sTypedObject(pkg.PathFromPkgDirectory("./testdata/reports/compliance-report.yaml"), &expected) + var expected typear.AssessmentResultsRoot + err = pkg.LoadYamlFileToK8sTypedObject(pkg.PathFromPkgDirectory("./testdata/ocm/assessment-results.json"), &expected) - // Timestamp is currently set by Now(). Since the timestamp should be always different from expected one, reset creationTimestamp of expected one to actual one. - expected.CreationTimestamp = report.CreationTimestamp - - assert.NoError(t, err, "Should not happen") - assert.Equal(t, expected, report) - - reporter.SetGenerationType("policy-report") - reportFromPolicyReports, err := reporter.Generate() assert.NoError(t, err, "Should not happen") - - // Timestamp is currently set by Now(). Since the timestamp should be always different from expected one, reset creationTimestamp of expected one to actual one. - reportFromPolicyReports.CreationTimestamp = report.CreationTimestamp - - assert.Equal(t, report, reportFromPolicyReports) - - for _, policyReport := range reporter.policyReports { - fname := fmt.Sprintf("policy-report.%s.%s.yaml", policyReport.Namespace, policyReport.Name) - err := pkg.WriteObjToYamlFile(tempDir.GetTempDir()+"/"+fname, policyReport) - assert.NoError(t, err, "Should not happen") - } - + diff := cmp.Diff(expected, *arRoot, + cmpopts.IgnoreFields(typear.AssessmentResults{}, "UUID"), + cmpopts.IgnoreFields(typear.Metadata{}, "LastModified"), + cmpopts.IgnoreFields(typear.Result{}, "UUID", "Start"), + cmpopts.IgnoreFields(typear.InventoryItem{}, "UUID"), + cmpopts.IgnoreFields(typear.Subject{}, "SubjectUUID"), + cmpopts.IgnoreFields(typear.Observation{}, "UUID"), + ) + assert.Equal(t, diff, "", "assessment-result matched") } diff --git a/pkg/testdata/ocm/assessment-results.json b/pkg/testdata/ocm/assessment-results.json new file mode 100755 index 0000000..7ba4d8f --- /dev/null +++ b/pkg/testdata/ocm/assessment-results.json @@ -0,0 +1,204 @@ +{ + "assessment-results": { + "uuid": "9913b24e-931f-11ee-82cf-62f79297f1b7", + "metadata": { + "title": "OSCAL Assessment Results", + "last-modified": "2023-12-05T12:37:21.653819+09:00", + "version": "0.0.1", + "oscal-version": "1.0.4" + }, + "import-ap": { + "href": "http://..." + }, + "results": [ + { + "uuid": "9913b258-931f-11ee-82cf-62f79297f1b7", + "title": "Assessment Results by OCM", + "description": "Assessment Results by OCM...", + "start": "2023-12-05T12:37:21.65382+09:00", + "local-definitions": { + "inventory-items": null + }, + "observations": [ + { + "uuid": "9913a92a-931f-11ee-82cf-62f79297f1b7", + "description": "Observation of policy policy-high-scan", + "props": [ + { + "name": "assessment-rule-id", + "value": "test_configuration_check" + }, + { + "name": "policy-id", + "value": "policy-high-scan" + }, + { + "name": "control-id", + "value": "cm-6" + }, + { + "name": "result", + "value": "fail" + } + ], + "methods": [ + "TEST-AUTOMATED" + ], + "subjects": [ + { + "subject-uuid": "99133e9a-931f-11ee-82cf-62f79297f1b7", + "type": "resource", + "title": "Cluster Name: cluster2", + "props": [ + { + "name": "result", + "value": "fail" + }, + { + "name": "reason", + "value": "- eventName: c2p.policy-high-scan.176f1dcdc2b51b01\n lastTimestamp: \"2023-07-05T23:52:34Z\"\n message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding,\n please check if you have CRD deployed\n- eventName: c2p.policy-high-scan.176f1ddc44adf035\n lastTimestamp: \"2023-07-05T23:53:37Z\"\n message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite,\n please check if you have CRD deployed\n- eventName: c2p.policy-high-scan.176f1ddc441457e5\n lastTimestamp: \"2023-07-05T23:53:37Z\"\n message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult,\n please check if you have CRD deployed\n" + } + ] + }, + { + "subject-uuid": "99133e9a-931f-11ee-82cf-62f79297f1b7", + "type": "resource", + "title": "Cluster Name: cluster2", + "props": [ + { + "name": "result", + "value": "fail" + }, + { + "name": "reason", + "value": "- eventName: c2p.policy-high-scan.176f1dc3684f9eb6\n lastTimestamp: \"2023-07-05T23:51:50Z\"\n message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding,\n please check if you have CRD deployed\n- eventName: c2p.policy-high-scan.176f1dc426d20948\n lastTimestamp: \"2023-07-05T23:51:53Z\"\n message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite,\n please check if you have CRD deployed\n- eventName: c2p.policy-high-scan.176f1dc4e29e1221\n lastTimestamp: \"2023-07-05T23:51:56Z\"\n message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult,\n please check if you have CRD deployed\n" + } + ] + } + ], + "collected": "0001-01-01T00:00:00Z", + "expires": "0001-01-01T00:00:00Z" + }, + { + "uuid": "9913adf8-931f-11ee-82cf-62f79297f1b7", + "description": "Observation of policy policy-deployment", + "props": [ + { + "name": "assessment-rule-id", + "value": "test_proxy_check" + }, + { + "name": "policy-id", + "value": "policy-deployment" + }, + { + "name": "control-id", + "value": "cm-2" + }, + { + "name": "result", + "value": "fail" + } + ], + "methods": [ + "TEST-AUTOMATED" + ], + "subjects": [ + { + "subject-uuid": "99133e9a-931f-11ee-82cf-62f79297f1b7", + "type": "resource", + "title": "Cluster Name: cluster2", + "props": [ + { + "name": "result", + "value": "fail" + }, + { + "name": "reason", + "value": "- eventName: c2p.policy-deployment.176f1ddc5591cb1c\n lastTimestamp: \"2023-07-05T23:53:37Z\"\n message: 'NonCompliant; violation - deployments not found: [nginx-deployment] in\n namespace cluster1 missing; [nginx-deployment] in namespace kube-node-lease missing;\n [nginx-deployment] in namespace kube-public missing; [nginx-deployment] in namespace\n local-path-storage missing'\n" + } + ] + }, + { + "subject-uuid": "99133e9a-931f-11ee-82cf-62f79297f1b7", + "type": "resource", + "title": "Cluster Name: cluster2", + "props": [ + { + "name": "result", + "value": "fail" + }, + { + "name": "reason", + "value": "- eventName: c2p.policy-deployment.176f1dc4e7de17cb\n lastTimestamp: \"2023-07-05T23:51:56Z\"\n message: 'NonCompliant; violation - deployments not found: [nginx-deployment] in\n namespace cluster2 missing; [nginx-deployment] in namespace default missing; [nginx-deployment]\n in namespace kube-node-lease missing; [nginx-deployment] in namespace kube-public\n missing; [nginx-deployment] in namespace local-path-storage missing'\n" + } + ] + } + ], + "collected": "0001-01-01T00:00:00Z", + "expires": "0001-01-01T00:00:00Z" + }, + { + "uuid": "9913b244-931f-11ee-82cf-62f79297f1b7", + "description": "Observation of policy policy-disallowed-roles", + "props": [ + { + "name": "assessment-rule-id", + "value": "test_rbac_check" + }, + { + "name": "policy-id", + "value": "policy-disallowed-roles" + }, + { + "name": "control-id", + "value": "ac-6" + }, + { + "name": "result", + "value": "pass" + } + ], + "methods": [ + "TEST-AUTOMATED" + ], + "subjects": [ + { + "subject-uuid": "99133e9a-931f-11ee-82cf-62f79297f1b7", + "type": "resource", + "title": "Cluster Name: cluster2", + "props": [ + { + "name": "result", + "value": "pass" + }, + { + "name": "reason", + "value": "- eventName: c2p.policy-disallowed-roles.176f1dcdc4c8d17e\n lastTimestamp: \"2023-07-05T23:52:34Z\"\n message: Compliant; notification - roles in namespace cluster1; in namespace default;\n in namespace kube-node-lease; in namespace kube-public; in namespace local-path-storage\n missing as expected, therefore this Object template is compliant\n" + } + ] + }, + { + "subject-uuid": "99133e9a-931f-11ee-82cf-62f79297f1b7", + "type": "resource", + "title": "Cluster Name: cluster2", + "props": [ + { + "name": "result", + "value": "pass" + }, + { + "name": "reason", + "value": "- eventName: c2p.policy-disallowed-roles.176f1dc36e36b7b2\n lastTimestamp: \"2023-07-05T23:51:50Z\"\n message: Compliant; notification - roles in namespace cluster2; in namespace default;\n in namespace kube-node-lease; in namespace kube-public; in namespace local-path-storage\n missing as expected, therefore this Object template is compliant\n" + } + ] + } + ], + "collected": "0001-01-01T00:00:00Z", + "expires": "0001-01-01T00:00:00Z" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/pkg/testdata/oscal/reporter-test/catalog.json b/pkg/testdata/ocm/catalog.json similarity index 100% rename from pkg/testdata/oscal/reporter-test/catalog.json rename to pkg/testdata/ocm/catalog.json diff --git a/pkg/testdata/oscal/reporter-test/component-definition.json b/pkg/testdata/ocm/component-definition.json similarity index 100% rename from pkg/testdata/oscal/reporter-test/component-definition.json rename to pkg/testdata/ocm/component-definition.json diff --git a/pkg/testdata/policies/add-chrony/add-chrony-worker/MachineConfig.50-worker-chrony.0.yaml b/pkg/testdata/ocm/policies/add-chrony/add-chrony-worker/MachineConfig.50-worker-chrony.0.yaml similarity index 100% rename from pkg/testdata/policies/add-chrony/add-chrony-worker/MachineConfig.50-worker-chrony.0.yaml rename to pkg/testdata/ocm/policies/add-chrony/add-chrony-worker/MachineConfig.50-worker-chrony.0.yaml diff --git a/pkg/testdata/policies/add-chrony/kustomization.yaml b/pkg/testdata/ocm/policies/add-chrony/kustomization.yaml similarity index 100% rename from pkg/testdata/policies/add-chrony/kustomization.yaml rename to pkg/testdata/ocm/policies/add-chrony/kustomization.yaml diff --git a/pkg/testdata/policies/add-chrony/policy-generator.yaml b/pkg/testdata/ocm/policies/add-chrony/policy-generator.yaml similarity index 100% rename from pkg/testdata/policies/add-chrony/policy-generator.yaml rename to pkg/testdata/ocm/policies/add-chrony/policy-generator.yaml diff --git a/pkg/testdata/policies/install-odf-lvm-operator/kustomization.yaml b/pkg/testdata/ocm/policies/install-odf-lvm-operator/kustomization.yaml similarity index 100% rename from pkg/testdata/policies/install-odf-lvm-operator/kustomization.yaml rename to pkg/testdata/ocm/policies/install-odf-lvm-operator/kustomization.yaml diff --git a/pkg/testdata/policies/install-odf-lvm-operator/odf-lvmcluster/LVMCluster.odf-lvmcluster.0.yaml b/pkg/testdata/ocm/policies/install-odf-lvm-operator/odf-lvmcluster/LVMCluster.odf-lvmcluster.0.yaml similarity index 100% rename from pkg/testdata/policies/install-odf-lvm-operator/odf-lvmcluster/LVMCluster.odf-lvmcluster.0.yaml rename to pkg/testdata/ocm/policies/install-odf-lvm-operator/odf-lvmcluster/LVMCluster.odf-lvmcluster.0.yaml diff --git a/pkg/testdata/policies/install-odf-lvm-operator/policy-generator.yaml b/pkg/testdata/ocm/policies/install-odf-lvm-operator/policy-generator.yaml similarity index 100% rename from pkg/testdata/policies/install-odf-lvm-operator/policy-generator.yaml rename to pkg/testdata/ocm/policies/install-odf-lvm-operator/policy-generator.yaml diff --git a/pkg/testdata/policies/install-odf-lvm-operator/policy-odf-lvm-operator/Namespace.openshift-storage.0.yaml b/pkg/testdata/ocm/policies/install-odf-lvm-operator/policy-odf-lvm-operator/Namespace.openshift-storage.0.yaml similarity index 100% rename from pkg/testdata/policies/install-odf-lvm-operator/policy-odf-lvm-operator/Namespace.openshift-storage.0.yaml rename to pkg/testdata/ocm/policies/install-odf-lvm-operator/policy-odf-lvm-operator/Namespace.openshift-storage.0.yaml diff --git a/pkg/testdata/policies/install-odf-lvm-operator/policy-odf-lvm-operator/OperatorGroup.openshift-storage-operatorgroup.0.yaml b/pkg/testdata/ocm/policies/install-odf-lvm-operator/policy-odf-lvm-operator/OperatorGroup.openshift-storage-operatorgroup.0.yaml similarity index 100% rename from pkg/testdata/policies/install-odf-lvm-operator/policy-odf-lvm-operator/OperatorGroup.openshift-storage-operatorgroup.0.yaml rename to pkg/testdata/ocm/policies/install-odf-lvm-operator/policy-odf-lvm-operator/OperatorGroup.openshift-storage-operatorgroup.0.yaml diff --git a/pkg/testdata/policies/install-odf-lvm-operator/policy-odf-lvm-operator/Subscription.lvm-operator.0.yaml b/pkg/testdata/ocm/policies/install-odf-lvm-operator/policy-odf-lvm-operator/Subscription.lvm-operator.0.yaml similarity index 100% rename from pkg/testdata/policies/install-odf-lvm-operator/policy-odf-lvm-operator/Subscription.lvm-operator.0.yaml rename to pkg/testdata/ocm/policies/install-odf-lvm-operator/policy-odf-lvm-operator/Subscription.lvm-operator.0.yaml diff --git a/pkg/testdata/policies/policy-deployment/kustomization.yaml b/pkg/testdata/ocm/policies/policy-deployment/kustomization.yaml similarity index 100% rename from pkg/testdata/policies/policy-deployment/kustomization.yaml rename to pkg/testdata/ocm/policies/policy-deployment/kustomization.yaml diff --git a/pkg/testdata/policies/policy-deployment/policy-generator.yaml b/pkg/testdata/ocm/policies/policy-deployment/policy-generator.yaml similarity index 100% rename from pkg/testdata/policies/policy-deployment/policy-generator.yaml rename to pkg/testdata/ocm/policies/policy-deployment/policy-generator.yaml diff --git a/pkg/testdata/policies/policy-deployment/policy-nginx-deployment/Deployment.nginx-deployment.0.yaml b/pkg/testdata/ocm/policies/policy-deployment/policy-nginx-deployment/Deployment.nginx-deployment.0.yaml similarity index 100% rename from pkg/testdata/policies/policy-deployment/policy-nginx-deployment/Deployment.nginx-deployment.0.yaml rename to pkg/testdata/ocm/policies/policy-deployment/policy-nginx-deployment/Deployment.nginx-deployment.0.yaml diff --git a/pkg/testdata/policies/policy-disallowed-roles/kustomization.yaml b/pkg/testdata/ocm/policies/policy-disallowed-roles/kustomization.yaml similarity index 100% rename from pkg/testdata/policies/policy-disallowed-roles/kustomization.yaml rename to pkg/testdata/ocm/policies/policy-disallowed-roles/kustomization.yaml diff --git a/pkg/testdata/policies/policy-disallowed-roles/policy-disallowed-roles-sample-role/Role.noname.0.yaml b/pkg/testdata/ocm/policies/policy-disallowed-roles/policy-disallowed-roles-sample-role/Role.noname.0.yaml similarity index 100% rename from pkg/testdata/policies/policy-disallowed-roles/policy-disallowed-roles-sample-role/Role.noname.0.yaml rename to pkg/testdata/ocm/policies/policy-disallowed-roles/policy-disallowed-roles-sample-role/Role.noname.0.yaml diff --git a/pkg/testdata/policies/policy-disallowed-roles/policy-generator.yaml b/pkg/testdata/ocm/policies/policy-disallowed-roles/policy-generator.yaml similarity index 100% rename from pkg/testdata/policies/policy-disallowed-roles/policy-generator.yaml rename to pkg/testdata/ocm/policies/policy-disallowed-roles/policy-generator.yaml diff --git a/pkg/testdata/policies/policy-high-scan/compliance-high-scan/ScanSettingBinding.high.0.yaml b/pkg/testdata/ocm/policies/policy-high-scan/compliance-high-scan/ScanSettingBinding.high.0.yaml similarity index 100% rename from pkg/testdata/policies/policy-high-scan/compliance-high-scan/ScanSettingBinding.high.0.yaml rename to pkg/testdata/ocm/policies/policy-high-scan/compliance-high-scan/ScanSettingBinding.high.0.yaml diff --git a/pkg/testdata/policies/policy-high-scan/compliance-suite-high-results/ComplianceCheckResult.noname.0.yaml b/pkg/testdata/ocm/policies/policy-high-scan/compliance-suite-high-results/ComplianceCheckResult.noname.0.yaml similarity index 100% rename from pkg/testdata/policies/policy-high-scan/compliance-suite-high-results/ComplianceCheckResult.noname.0.yaml rename to pkg/testdata/ocm/policies/policy-high-scan/compliance-suite-high-results/ComplianceCheckResult.noname.0.yaml diff --git a/pkg/testdata/policies/policy-high-scan/compliance-suite-high/ComplianceSuite.high.0.yaml b/pkg/testdata/ocm/policies/policy-high-scan/compliance-suite-high/ComplianceSuite.high.0.yaml similarity index 100% rename from pkg/testdata/policies/policy-high-scan/compliance-suite-high/ComplianceSuite.high.0.yaml rename to pkg/testdata/ocm/policies/policy-high-scan/compliance-suite-high/ComplianceSuite.high.0.yaml diff --git a/pkg/testdata/policies/policy-high-scan/kustomization.yaml b/pkg/testdata/ocm/policies/policy-high-scan/kustomization.yaml similarity index 100% rename from pkg/testdata/policies/policy-high-scan/kustomization.yaml rename to pkg/testdata/ocm/policies/policy-high-scan/kustomization.yaml diff --git a/pkg/testdata/policies/policy-high-scan/policy-generator.yaml b/pkg/testdata/ocm/policies/policy-high-scan/policy-generator.yaml similarity index 100% rename from pkg/testdata/policies/policy-high-scan/policy-generator.yaml rename to pkg/testdata/ocm/policies/policy-high-scan/policy-generator.yaml diff --git a/pkg/testdata/policies/policy-nginx-deployment/kustomization.yaml b/pkg/testdata/ocm/policies/policy-nginx-deployment/kustomization.yaml similarity index 100% rename from pkg/testdata/policies/policy-nginx-deployment/kustomization.yaml rename to pkg/testdata/ocm/policies/policy-nginx-deployment/kustomization.yaml diff --git a/pkg/testdata/policies/policy-nginx-deployment/policy-generator.yaml b/pkg/testdata/ocm/policies/policy-nginx-deployment/policy-generator.yaml similarity index 100% rename from pkg/testdata/policies/policy-nginx-deployment/policy-generator.yaml rename to pkg/testdata/ocm/policies/policy-nginx-deployment/policy-generator.yaml diff --git a/pkg/testdata/policies/policy-nginx-deployment/policy-nginx-deployment/Deployment.nginx-deployment.0.yaml b/pkg/testdata/ocm/policies/policy-nginx-deployment/policy-nginx-deployment/Deployment.nginx-deployment.0.yaml similarity index 100% rename from pkg/testdata/policies/policy-nginx-deployment/policy-nginx-deployment/Deployment.nginx-deployment.0.yaml rename to pkg/testdata/ocm/policies/policy-nginx-deployment/policy-nginx-deployment/Deployment.nginx-deployment.0.yaml diff --git a/pkg/testdata/policy-results/00.placementdecisions.yaml b/pkg/testdata/ocm/policy-results/00.placementdecisions.yaml similarity index 100% rename from pkg/testdata/policy-results/00.placementdecisions.yaml rename to pkg/testdata/ocm/policy-results/00.placementdecisions.yaml diff --git a/pkg/testdata/policy-results/00.policies.yaml b/pkg/testdata/ocm/policy-results/00.policies.yaml similarity index 100% rename from pkg/testdata/policy-results/00.policies.yaml rename to pkg/testdata/ocm/policy-results/00.policies.yaml diff --git a/pkg/testdata/policy-results/00.policysets.yaml b/pkg/testdata/ocm/policy-results/00.policysets.yaml similarity index 100% rename from pkg/testdata/policy-results/00.policysets.yaml rename to pkg/testdata/ocm/policy-results/00.policysets.yaml diff --git a/pkg/testdata/policy-results/PlacementDecision.c2p.placement-managed-kubernetes-decision-1.yml b/pkg/testdata/ocm/policy-results/PlacementDecision.c2p.placement-managed-kubernetes-decision-1.yml similarity index 100% rename from pkg/testdata/policy-results/PlacementDecision.c2p.placement-managed-kubernetes-decision-1.yml rename to pkg/testdata/ocm/policy-results/PlacementDecision.c2p.placement-managed-kubernetes-decision-1.yml diff --git a/pkg/testdata/policy-results/Policy.c2p.policy-deployment.yml b/pkg/testdata/ocm/policy-results/Policy.c2p.policy-deployment.yml similarity index 100% rename from pkg/testdata/policy-results/Policy.c2p.policy-deployment.yml rename to pkg/testdata/ocm/policy-results/Policy.c2p.policy-deployment.yml diff --git a/pkg/testdata/policy-results/Policy.c2p.policy-disallowed-roles.yml b/pkg/testdata/ocm/policy-results/Policy.c2p.policy-disallowed-roles.yml similarity index 100% rename from pkg/testdata/policy-results/Policy.c2p.policy-disallowed-roles.yml rename to pkg/testdata/ocm/policy-results/Policy.c2p.policy-disallowed-roles.yml diff --git a/pkg/testdata/policy-results/Policy.c2p.policy-high-scan.yml b/pkg/testdata/ocm/policy-results/Policy.c2p.policy-high-scan.yml similarity index 100% rename from pkg/testdata/policy-results/Policy.c2p.policy-high-scan.yml rename to pkg/testdata/ocm/policy-results/Policy.c2p.policy-high-scan.yml diff --git a/pkg/testdata/policy-results/Policy.cluster1.c2p.policy-deployment.yml b/pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-deployment.yml similarity index 100% rename from pkg/testdata/policy-results/Policy.cluster1.c2p.policy-deployment.yml rename to pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-deployment.yml diff --git a/pkg/testdata/policy-results/Policy.cluster1.c2p.policy-disallowed-roles.yml b/pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-disallowed-roles.yml similarity index 100% rename from pkg/testdata/policy-results/Policy.cluster1.c2p.policy-disallowed-roles.yml rename to pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-disallowed-roles.yml diff --git a/pkg/testdata/policy-results/Policy.cluster1.c2p.policy-high-scan.yml b/pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-high-scan.yml similarity index 100% rename from pkg/testdata/policy-results/Policy.cluster1.c2p.policy-high-scan.yml rename to pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-high-scan.yml diff --git a/pkg/testdata/policy-results/Policy.cluster2.c2p.policy-deployment.yml b/pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-deployment.yml similarity index 100% rename from pkg/testdata/policy-results/Policy.cluster2.c2p.policy-deployment.yml rename to pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-deployment.yml diff --git a/pkg/testdata/policy-results/Policy.cluster2.c2p.policy-disallowed-roles.yml b/pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-disallowed-roles.yml similarity index 100% rename from pkg/testdata/policy-results/Policy.cluster2.c2p.policy-disallowed-roles.yml rename to pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-disallowed-roles.yml diff --git a/pkg/testdata/policy-results/Policy.cluster2.c2p.policy-high-scan.yml b/pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-high-scan.yml similarity index 100% rename from pkg/testdata/policy-results/Policy.cluster2.c2p.policy-high-scan.yml rename to pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-high-scan.yml diff --git a/pkg/testdata/policy-results/PolicySet.c2p.managed-kubernetes.yml b/pkg/testdata/ocm/policy-results/PolicySet.c2p.managed-kubernetes.yml similarity index 100% rename from pkg/testdata/policy-results/PolicySet.c2p.managed-kubernetes.yml rename to pkg/testdata/ocm/policy-results/PolicySet.c2p.managed-kubernetes.yml diff --git a/pkg/testdata/oscal/reporter-test/profile.json b/pkg/testdata/ocm/profile.json similarity index 100% rename from pkg/testdata/oscal/reporter-test/profile.json rename to pkg/testdata/ocm/profile.json diff --git a/pkg/testdata/oscal/component-definition.json b/pkg/testdata/oscal/component-definition.json deleted file mode 100644 index 49a22b4..0000000 --- a/pkg/testdata/oscal/component-definition.json +++ /dev/null @@ -1,150 +0,0 @@ -{ - "component-definition": { - "uuid": "e3f74636-b63c-4406-bbc7-cf9dee495816", - "metadata": { - "title": "Test Component Definition", - "last-modified": "2023-05-22T04:20:26+00:00", - "version": "20210826", - "oscal-version": "1.0.4" - }, - "components": [ - { - "uuid": "5ccc0047-6b10-4f9d-90d4-5f2bc4141fa8", - "type": "Service", - "title": "My Test Service", - "description": "My Test Service...", - "props": [ - { - "name": "Rule_Id", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "rule1", - "class": "scc_class", - "remarks": "rule_set_01" - }, - { - "name": "Rule_Description", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "rule1...", - "class": "scc_class", - "remarks": "rule_set_01" - }, - { - "name": "Policy_Id", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "add-chrony", - "remarks": "rule_set_01" - }, - { - "name": "Rule_Id", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "rule2", - "class": "scc_class", - "remarks": "rule_set_02" - }, - { - "name": "Rule_Description", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "rule2...", - "class": "scc_class", - "remarks": "rule_set_02" - }, - { - "name": "Policy_Id", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "install-odf-lvm-operator", - "remarks": "rule_set_02" - }, - { - "name": "Rule_Id", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "rule3", - "class": "scc_class", - "remarks": "rule_set_03" - }, - { - "name": "Rule_Description", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "rule3...", - "class": "scc_class", - "remarks": "rule_set_03" - }, - { - "name": "Policy_Id", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "policy-nginx-deployment", - "remarks": "rule_set_03" - }, - { - "name": "Parameter_Id", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "minimum_nginx_deployment_replicas", - "class": "scc_class", - "remarks": "rule_set_03" - }, - { - "name": "Parameter_Description", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "Minimum # of NGINX pod", - "class": "scc_class", - "remarks": "rule_set_02" - } - ], - "control-implementations": [ - { - "uuid": "18c98b61-9561-4fc6-b65a-7715bf61e17f", - "source": "https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json", - "description": "NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE", - "set-parameters": [ - { - "param-id": "minimum_nginx_deployment_replicas", - "values": [ - "3" - ] - } - ], - "implemented-requirements": [ - { - "uuid": "bdc3a56a-d12e-46d7-bd39-db909a3daabd", - "control-id": "ac-1", - "description": "", - "props": [ - { - "name": "Rule_Id", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "rule1", - "class": "scc_class" - }, - { - "name": "Rule_Id", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "rule2", - "class": "scc_class" - } - ] - }, - { - "uuid": "8a2cb5a3-f3d1-480f-8463-dd4ecf45a8cd", - "control-id": "ac-2.1", - "description": "", - "props": [ - { - "name": "Rule_Id", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "rule2", - "class": "scc_class" - }, - { - "name": "Rule_Id", - "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", - "value": "rule3", - "class": "scc_class" - } - ] - } - ] - } - ] - } - ] - } -} \ No newline at end of file diff --git a/pkg/testdata/reports/compliance-report.md b/pkg/testdata/reports/compliance-report.md index 9fa7bb9..e69de29 100755 --- a/pkg/testdata/reports/compliance-report.md +++ b/pkg/testdata/reports/compliance-report.md @@ -1,108 +0,0 @@ -## Catalog -Electronic Version of NIST SP 800-53 Rev 5 Controls and SP 800-53A Rev 5 Assessment Procedures -## Component: Managed Kubernetes - -Compliance status: NonCompliant - -Checked controls: [ac-6,cm-2,cm-6,] -#### Result of control: cm-6 -**Compliance status: NonCompliant** - -Rules: -- Rule ID: test_configuration_check -- Policy ID: policy-high-scan -- Status: fail -- Reason: -``` -- clusterName: cluster1 - complianceState: NonCompliant - messages: - - eventName: c2p.policy-high-scan.176f1dcdc2b51b01 - lastTimestamp: "2023-07-05T23:52:34Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding, - please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1ddc44adf035 - lastTimestamp: "2023-07-05T23:53:37Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite, - please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1ddc441457e5 - lastTimestamp: "2023-07-05T23:53:37Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult, - please check if you have CRD deployed -- clusterName: cluster2 - complianceState: NonCompliant - messages: - - eventName: c2p.policy-high-scan.176f1dc3684f9eb6 - lastTimestamp: "2023-07-05T23:51:50Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding, - please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1dc426d20948 - lastTimestamp: "2023-07-05T23:51:53Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite, - please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1dc4e29e1221 - lastTimestamp: "2023-07-05T23:51:56Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult, - please check if you have CRD deployed - -``` ---- -#### Result of control: cm-2 -**Compliance status: NonCompliant** - -Rules: -- Rule ID: test_proxy_check -- Policy ID: policy-deployment -- Status: fail -- Reason: -``` -- clusterName: cluster1 - complianceState: NonCompliant - messages: - - eventName: c2p.policy-deployment.176f1ddc5591cb1c - lastTimestamp: "2023-07-05T23:53:37Z" - message: 'NonCompliant; violation - deployments not found: [nginx-deployment] - in namespace cluster1 missing; [nginx-deployment] in namespace kube-node-lease - missing; [nginx-deployment] in namespace kube-public missing; [nginx-deployment] - in namespace local-path-storage missing' -- clusterName: cluster2 - complianceState: NonCompliant - messages: - - eventName: c2p.policy-deployment.176f1dc4e7de17cb - lastTimestamp: "2023-07-05T23:51:56Z" - message: 'NonCompliant; violation - deployments not found: [nginx-deployment] - in namespace cluster2 missing; [nginx-deployment] in namespace default missing; - [nginx-deployment] in namespace kube-node-lease missing; [nginx-deployment] - in namespace kube-public missing; [nginx-deployment] in namespace local-path-storage - missing' - -``` ---- -#### Result of control: ac-6 -**Compliance status: Compliant** - -Rules: -- Rule ID: test_rbac_check -- Policy ID: policy-disallowed-roles -- Status: pass -- Reason: -``` -- clusterName: cluster1 - complianceState: Compliant - messages: - - eventName: c2p.policy-disallowed-roles.176f1dcdc4c8d17e - lastTimestamp: "2023-07-05T23:52:34Z" - message: Compliant; notification - roles in namespace cluster1; in namespace default; - in namespace kube-node-lease; in namespace kube-public; in namespace local-path-storage - missing as expected, therefore this Object template is compliant -- clusterName: cluster2 - complianceState: Compliant - messages: - - eventName: c2p.policy-disallowed-roles.176f1dc36e36b7b2 - lastTimestamp: "2023-07-05T23:51:50Z" - message: Compliant; notification - roles in namespace cluster2; in namespace default; - in namespace kube-node-lease; in namespace kube-public; in namespace local-path-storage - missing as expected, therefore this Object template is compliant - -``` ---- From cdb6913e748ccce011cd2d6124eacae04b1477f6 Mon Sep 17 00:00:00 2001 From: Takumi Yanagawa Date: Tue, 5 Dec 2023 16:14:26 +0900 Subject: [PATCH 02/13] Reuse oscal2posture implemented for C2P for Kyverno Signed-off-by: Takumi Yanagawa --- cmd/c2pcli/subcommands/kyverno.go | 5 +- cmd/c2pcli/subcommands/ocm.go | 5 +- cmd/kyverno/oscal2posture/main.go | 30 ---------- .../oscal2posture/cmd/cmd.go | 12 ++-- .../oscal2posture/options/options.go | 3 - pkg/ocm/reporter/reporter.go | 21 +++---- pkg/{kyverno => pvpcommon}/oscal2posture.go | 21 +++++-- pkg/{kyverno => pvpcommon}/template/model.go | 0 .../template/template.md | 2 +- pkg/testdata/ocm/assessment-results.json | 55 +++++++++++++------ 10 files changed, 78 insertions(+), 76 deletions(-) delete mode 100644 cmd/kyverno/oscal2posture/main.go rename cmd/{kyverno => pvpcommon}/oscal2posture/cmd/cmd.go (84%) rename cmd/{kyverno => pvpcommon}/oscal2posture/options/options.go (92%) rename pkg/{kyverno => pvpcommon}/oscal2posture.go (89%) rename pkg/{kyverno => pvpcommon}/template/model.go (100%) rename pkg/{kyverno => pvpcommon}/template/template.md (93%) diff --git a/cmd/c2pcli/subcommands/kyverno.go b/cmd/c2pcli/subcommands/kyverno.go index 6cd9cb4..3b0aa08 100644 --- a/cmd/c2pcli/subcommands/kyverno.go +++ b/cmd/c2pcli/subcommands/kyverno.go @@ -21,9 +21,10 @@ import ( "github.com/IBM/compliance-to-policy/cmd/c2pcli/options" oscal2policycmd "github.com/IBM/compliance-to-policy/cmd/kyverno/oscal2policy/cmd" - oscal2posturecmd "github.com/IBM/compliance-to-policy/cmd/kyverno/oscal2posture/cmd" result2oscalcmd "github.com/IBM/compliance-to-policy/cmd/kyverno/result2oscal/cmd" toolscmd "github.com/IBM/compliance-to-policy/cmd/kyverno/tools/cmd" + oscal2posturecmd "github.com/IBM/compliance-to-policy/cmd/pvpcommon/oscal2posture/cmd" + "github.com/IBM/compliance-to-policy/pkg" ) func NewKyvernoSubCommand() *cobra.Command { @@ -38,7 +39,7 @@ func NewKyvernoSubCommand() *cobra.Command { command.AddCommand(oscal2policycmd.New()) command.AddCommand(result2oscalcmd.New()) - command.AddCommand(oscal2posturecmd.New()) + command.AddCommand(oscal2posturecmd.New(pkg.GetLogger("kyverno/oscal2posture"))) command.AddCommand(toolscmd.New()) return command diff --git a/cmd/c2pcli/subcommands/ocm.go b/cmd/c2pcli/subcommands/ocm.go index 1ce9738..9b9659d 100644 --- a/cmd/c2pcli/subcommands/ocm.go +++ b/cmd/c2pcli/subcommands/ocm.go @@ -21,8 +21,9 @@ import ( "github.com/IBM/compliance-to-policy/cmd/c2pcli/options" oscal2policycmd "github.com/IBM/compliance-to-policy/cmd/ocm/oscal2policy/cmd" - oscal2posturecmd "github.com/IBM/compliance-to-policy/cmd/ocm/oscal2posture/cmd" result2oscalcmd "github.com/IBM/compliance-to-policy/cmd/ocm/result2oscal/cmd" + oscal2posturecmd "github.com/IBM/compliance-to-policy/cmd/pvpcommon/oscal2posture/cmd" + "github.com/IBM/compliance-to-policy/pkg" ) func NewOcmSubCommand() *cobra.Command { @@ -37,7 +38,7 @@ func NewOcmSubCommand() *cobra.Command { command.AddCommand(oscal2policycmd.New()) command.AddCommand(result2oscalcmd.New()) - command.AddCommand(oscal2posturecmd.New()) + command.AddCommand(oscal2posturecmd.New(pkg.GetLogger("ocm/oscal2posture"))) return command } diff --git a/cmd/kyverno/oscal2posture/main.go b/cmd/kyverno/oscal2posture/main.go deleted file mode 100644 index eb3d2aa..0000000 --- a/cmd/kyverno/oscal2posture/main.go +++ /dev/null @@ -1,30 +0,0 @@ -/* -Copyright 2023 IBM Corporation - -Licensed under the Apache License, Version 2.0 (the "License"); -you may not use this file except in compliance with the License. -You may obtain a copy of the License at - -http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law or agreed to in writing, software -distributed under the License is distributed on an "AS IS" BASIS, -WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -See the License for the specific language governing permissions and -limitations under the License. -*/ - -package main - -import ( - "os" - - "github.com/IBM/compliance-to-policy/cmd/kyverno/oscal2posture/cmd" -) - -func main() { - err := cmd.New().Execute() - if err != nil { - os.Exit(1) - } -} diff --git a/cmd/kyverno/oscal2posture/cmd/cmd.go b/cmd/pvpcommon/oscal2posture/cmd/cmd.go similarity index 84% rename from cmd/kyverno/oscal2posture/cmd/cmd.go rename to cmd/pvpcommon/oscal2posture/cmd/cmd.go index cf828b7..e154d51 100644 --- a/cmd/kyverno/oscal2posture/cmd/cmd.go +++ b/cmd/pvpcommon/oscal2posture/cmd/cmd.go @@ -21,14 +21,16 @@ import ( "os" "github.com/spf13/cobra" + "go.uber.org/zap" - "github.com/IBM/compliance-to-policy/cmd/kyverno/oscal2posture/options" + "github.com/IBM/compliance-to-policy/cmd/pvpcommon/oscal2posture/options" "github.com/IBM/compliance-to-policy/pkg" "github.com/IBM/compliance-to-policy/pkg/kyverno" + "github.com/IBM/compliance-to-policy/pkg/pvpcommon" typec2pcr "github.com/IBM/compliance-to-policy/pkg/types/c2pcr" ) -func New() *cobra.Command { +func New(logger *zap.Logger) *cobra.Command { opts := options.NewOptions() command := &cobra.Command{ @@ -42,7 +44,7 @@ func New() *cobra.Command { if err := opts.Validate(); err != nil { return err } - return Run(opts) + return Run(opts, logger) }, } @@ -51,7 +53,7 @@ func New() *cobra.Command { return command } -func Run(options *options.Options) error { +func Run(options *options.Options, logger *zap.Logger) error { output, c2pcrPath, tempDirPath := options.Out, options.C2PCRPath, options.TempDirPath var c2pcrSpec typec2pcr.Spec @@ -71,7 +73,7 @@ func Run(options *options.Options) error { return err } - r := kyverno.NewOscal2Posture(c2pcrParsed, arRoot, nil) + r := pvpcommon.NewOscal2Posture(c2pcrParsed, arRoot, nil, logger) data, err := r.Generate() if err != nil { return err diff --git a/cmd/kyverno/oscal2posture/options/options.go b/cmd/pvpcommon/oscal2posture/options/options.go similarity index 92% rename from cmd/kyverno/oscal2posture/options/options.go rename to cmd/pvpcommon/oscal2posture/options/options.go index 4758317..e9c657a 100644 --- a/cmd/kyverno/oscal2posture/options/options.go +++ b/cmd/pvpcommon/oscal2posture/options/options.go @@ -48,8 +48,5 @@ func (o *Options) Validate() error { if o.C2PCRPath == "" { return errors.New("-c or --config is required") } - if o.AssessmentResults == "" { - return errors.New("--assessment-results is required") - } return nil } diff --git a/pkg/ocm/reporter/reporter.go b/pkg/ocm/reporter/reporter.go index a656dea..7e2738f 100644 --- a/pkg/ocm/reporter/reporter.go +++ b/pkg/ocm/reporter/reporter.go @@ -167,16 +167,14 @@ func (r *Reporter) Generate() (*typear.AssessmentResultsRoot, error) { } ruleStatus = mapToRuleStatus(policy.Status.ComplianceState) for _, reason := range reasons { - var clusterName string - var inventoryUuid string + clusterName := "N/A" + inventoryUuid := "" for _, inventory := range inventories { prop, ok := oscal.FindProp("cluster-name", inventory.Props) - if ok { + if ok && prop.Value == reason.ClusterName { clusterName = prop.Value inventoryUuid = inventory.UUID - } else { - clusterName = "N/A" - inventoryUuid = "" + break } } if inventoryUuid != "" { @@ -247,10 +245,13 @@ func (r *Reporter) Generate() (*typear.AssessmentResultsRoot, error) { Results: []typear.Result{}, } result := typear.Result{ - UUID: oscal.GenerateUUID(), - Title: "Assessment Results by OCM", - Description: "Assessment Results by OCM...", - Start: time.Now(), + UUID: oscal.GenerateUUID(), + Title: "Assessment Results by OCM", + Description: "Assessment Results by OCM...", + Start: time.Now(), + LocalDefinitions: typear.LocalDefinitions{ + InventoryItems: inventories, + }, Observations: observations, } ar.Results = append(ar.Results, result) diff --git a/pkg/kyverno/oscal2posture.go b/pkg/pvpcommon/oscal2posture.go similarity index 89% rename from pkg/kyverno/oscal2posture.go rename to pkg/pvpcommon/oscal2posture.go index da9758c..1ecf3cf 100644 --- a/pkg/kyverno/oscal2posture.go +++ b/pkg/pvpcommon/oscal2posture.go @@ -14,19 +14,19 @@ See the License for the specific language governing permissions and limitations under the License. */ -package kyverno +package pvpcommon import ( "bytes" "embed" "html/template" "os" + "strings" - "github.com/IBM/compliance-to-policy/pkg" "go.uber.org/zap" - tp "github.com/IBM/compliance-to-policy/pkg/kyverno/template" "github.com/IBM/compliance-to-policy/pkg/oscal" + tp "github.com/IBM/compliance-to-policy/pkg/pvpcommon/template" typec2pcr "github.com/IBM/compliance-to-policy/pkg/types/c2pcr" typear "github.com/IBM/compliance-to-policy/pkg/types/oscal/assessmentresults" typecd "github.com/IBM/compliance-to-policy/pkg/types/oscal/componentdefinition" @@ -48,9 +48,8 @@ type TemplateValues struct { AssessmentResult typear.AssessmentResults } -func NewOscal2Posture(c2pParsed typec2pcr.C2PCRParsed, assessmentResults typear.AssessmentResultsRoot, templateFile *string) *Oscal2Posture { +func NewOscal2Posture(c2pParsed typec2pcr.C2PCRParsed, assessmentResults typear.AssessmentResultsRoot, templateFile *string, logger *zap.Logger) *Oscal2Posture { return &Oscal2Posture{ - logger: pkg.GetLogger("kyverno/oscal2posture"), c2pParsed: c2pParsed, assessmentResults: assessmentResults, templateFile: templateFile, @@ -138,8 +137,18 @@ func (r *Oscal2Posture) Generate() ([]byte, error) { if err != nil { return nil, err } + + funcmap := template.FuncMap{ + "newline_with_indent": func(text string, indent int) string { + newText := strings.ReplaceAll(text, "\n", "\n"+strings.Repeat(" ", indent)) + return newText + }, + } + templateString := string(templateData) - tmpl, err := template.New("report.md").Parse(templateString) + tmpl := template.New("report.md") + tmpl.Funcs(funcmap) + tmpl, err = tmpl.Parse(templateString) if err != nil { return nil, err } diff --git a/pkg/kyverno/template/model.go b/pkg/pvpcommon/template/model.go similarity index 100% rename from pkg/kyverno/template/model.go rename to pkg/pvpcommon/template/model.go diff --git a/pkg/kyverno/template/template.md b/pkg/pvpcommon/template/template.md similarity index 93% rename from pkg/kyverno/template/template.md rename to pkg/pvpcommon/template/template.md index b4586bc..24c8bdc 100644 --- a/pkg/kyverno/template/template.md +++ b/pkg/pvpcommon/template/template.md @@ -18,7 +18,7 @@ Rule ID: {{$ruleResult.RuleId}} - Result: {{$subject.Result}} - Reason: ``` - {{$subject.Reason}} + {{ newline_with_indent $subject.Reason 6}} ``` {{- end}} diff --git a/pkg/testdata/ocm/assessment-results.json b/pkg/testdata/ocm/assessment-results.json index 7ba4d8f..24bc121 100755 --- a/pkg/testdata/ocm/assessment-results.json +++ b/pkg/testdata/ocm/assessment-results.json @@ -1,9 +1,9 @@ { "assessment-results": { - "uuid": "9913b24e-931f-11ee-82cf-62f79297f1b7", + "uuid": "50436d5c-933d-11ee-a9ed-62f79297f1b7", "metadata": { "title": "OSCAL Assessment Results", - "last-modified": "2023-12-05T12:37:21.653819+09:00", + "last-modified": "2023-12-05T16:10:04.394838+09:00", "version": "0.0.1", "oscal-version": "1.0.4" }, @@ -12,16 +12,37 @@ }, "results": [ { - "uuid": "9913b258-931f-11ee-82cf-62f79297f1b7", + "uuid": "50436d5c-933d-11ee-a9ee-62f79297f1b7", "title": "Assessment Results by OCM", "description": "Assessment Results by OCM...", - "start": "2023-12-05T12:37:21.65382+09:00", + "start": "2023-12-05T16:10:04.394839+09:00", "local-definitions": { - "inventory-items": null + "inventory-items": [ + { + "uuid": "5042d8ec-933d-11ee-a9ed-62f79297f1b7", + "description": "", + "props": [ + { + "name": "cluster-name", + "value": "cluster1" + } + ] + }, + { + "uuid": "5042df04-933d-11ee-a9ed-62f79297f1b7", + "description": "", + "props": [ + { + "name": "cluster-name", + "value": "cluster2" + } + ] + } + ] }, "observations": [ { - "uuid": "9913a92a-931f-11ee-82cf-62f79297f1b7", + "uuid": "50436320-933d-11ee-a9ed-62f79297f1b7", "description": "Observation of policy policy-high-scan", "props": [ { @@ -46,9 +67,9 @@ ], "subjects": [ { - "subject-uuid": "99133e9a-931f-11ee-82cf-62f79297f1b7", + "subject-uuid": "5042d8ec-933d-11ee-a9ed-62f79297f1b7", "type": "resource", - "title": "Cluster Name: cluster2", + "title": "Cluster Name: cluster1", "props": [ { "name": "result", @@ -61,7 +82,7 @@ ] }, { - "subject-uuid": "99133e9a-931f-11ee-82cf-62f79297f1b7", + "subject-uuid": "5042df04-933d-11ee-a9ed-62f79297f1b7", "type": "resource", "title": "Cluster Name: cluster2", "props": [ @@ -80,7 +101,7 @@ "expires": "0001-01-01T00:00:00Z" }, { - "uuid": "9913adf8-931f-11ee-82cf-62f79297f1b7", + "uuid": "50436898-933d-11ee-a9ed-62f79297f1b7", "description": "Observation of policy policy-deployment", "props": [ { @@ -105,9 +126,9 @@ ], "subjects": [ { - "subject-uuid": "99133e9a-931f-11ee-82cf-62f79297f1b7", + "subject-uuid": "5042d8ec-933d-11ee-a9ed-62f79297f1b7", "type": "resource", - "title": "Cluster Name: cluster2", + "title": "Cluster Name: cluster1", "props": [ { "name": "result", @@ -120,7 +141,7 @@ ] }, { - "subject-uuid": "99133e9a-931f-11ee-82cf-62f79297f1b7", + "subject-uuid": "5042df04-933d-11ee-a9ed-62f79297f1b7", "type": "resource", "title": "Cluster Name: cluster2", "props": [ @@ -139,7 +160,7 @@ "expires": "0001-01-01T00:00:00Z" }, { - "uuid": "9913b244-931f-11ee-82cf-62f79297f1b7", + "uuid": "50436d52-933d-11ee-a9ed-62f79297f1b7", "description": "Observation of policy policy-disallowed-roles", "props": [ { @@ -164,9 +185,9 @@ ], "subjects": [ { - "subject-uuid": "99133e9a-931f-11ee-82cf-62f79297f1b7", + "subject-uuid": "5042d8ec-933d-11ee-a9ed-62f79297f1b7", "type": "resource", - "title": "Cluster Name: cluster2", + "title": "Cluster Name: cluster1", "props": [ { "name": "result", @@ -179,7 +200,7 @@ ] }, { - "subject-uuid": "99133e9a-931f-11ee-82cf-62f79297f1b7", + "subject-uuid": "5042df04-933d-11ee-a9ed-62f79297f1b7", "type": "resource", "title": "Cluster Name: cluster2", "props": [ From 6ca8ef30ef9f85c7710cd37e98369f4e18cd67f5 Mon Sep 17 00:00:00 2001 From: Takumi Yanagawa Date: Tue, 5 Dec 2023 16:20:21 +0900 Subject: [PATCH 03/13] Conversion to PolicyReport is no longer required Signed-off-by: Takumi Yanagawa --- cmd/ocm/oscal2posture/cmd/cmd.go | 70 ------------ cmd/ocm/oscal2posture/main.go | 30 ----- cmd/ocm/oscal2posture/options/options.go | 48 -------- cmd/ocm/result2oscal/cmd/cmd.go | 1 - pkg/ocm/reporter/helper.go | 65 ----------- pkg/ocm/reporter/helper_test.go | 68 ----------- pkg/ocm/reporter/markdown.go | 59 ---------- pkg/ocm/reporter/markdown_test.go | 40 ------- pkg/ocm/reporter/reporter.go | 50 +------- pkg/ocm/reporter/template.md | 27 ----- pkg/testdata/reports/compliance-report.md | 0 pkg/testdata/reports/compliance-report.yaml | 107 ------------------ .../policy-report.c2p.policy-deployment.yaml | 31 ----- ...cy-report.c2p.policy-disallowed-roles.yaml | 30 ----- .../policy-report.c2p.policy-high-scan.yaml | 57 ---------- ...report.cluster1.c2p.policy-deployment.yaml | 38 ------- ....cluster1.c2p.policy-disallowed-roles.yaml | 36 ------ ...-report.cluster1.c2p.policy-high-scan.yaml | 72 ------------ ...report.cluster2.c2p.policy-deployment.yaml | 39 ------- ....cluster2.c2p.policy-disallowed-roles.yaml | 36 ------ ...-report.cluster2.c2p.policy-high-scan.yaml | 72 ------------ 21 files changed, 1 insertion(+), 975 deletions(-) delete mode 100644 cmd/ocm/oscal2posture/cmd/cmd.go delete mode 100644 cmd/ocm/oscal2posture/main.go delete mode 100644 cmd/ocm/oscal2posture/options/options.go delete mode 100644 pkg/ocm/reporter/helper_test.go delete mode 100644 pkg/ocm/reporter/markdown.go delete mode 100644 pkg/ocm/reporter/markdown_test.go delete mode 100644 pkg/ocm/reporter/template.md delete mode 100755 pkg/testdata/reports/compliance-report.md delete mode 100755 pkg/testdata/reports/compliance-report.yaml delete mode 100755 pkg/testdata/reports/policy-report.c2p.policy-deployment.yaml delete mode 100755 pkg/testdata/reports/policy-report.c2p.policy-disallowed-roles.yaml delete mode 100755 pkg/testdata/reports/policy-report.c2p.policy-high-scan.yaml delete mode 100755 pkg/testdata/reports/policy-report.cluster1.c2p.policy-deployment.yaml delete mode 100755 pkg/testdata/reports/policy-report.cluster1.c2p.policy-disallowed-roles.yaml delete mode 100755 pkg/testdata/reports/policy-report.cluster1.c2p.policy-high-scan.yaml delete mode 100755 pkg/testdata/reports/policy-report.cluster2.c2p.policy-deployment.yaml delete mode 100755 pkg/testdata/reports/policy-report.cluster2.c2p.policy-disallowed-roles.yaml delete mode 100755 pkg/testdata/reports/policy-report.cluster2.c2p.policy-high-scan.yaml diff --git a/cmd/ocm/oscal2posture/cmd/cmd.go b/cmd/ocm/oscal2posture/cmd/cmd.go deleted file mode 100644 index 735f76d..0000000 --- a/cmd/ocm/oscal2posture/cmd/cmd.go +++ /dev/null @@ -1,70 +0,0 @@ -/* -Copyright 2023 IBM Corporation - -Licensed under the Apache License, Version 2.0 (the "License"); -you may not use this file except in compliance with the License. -You may obtain a copy of the License at - -http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law or agreed to in writing, software -distributed under the License is distributed on an "AS IS" BASIS, -WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -See the License for the specific language governing permissions and -limitations under the License. -*/ - -package cmd - -import ( - "fmt" - "os" - - "github.com/spf13/cobra" - - "github.com/IBM/compliance-to-policy/cmd/ocm/oscal2posture/options" - "github.com/IBM/compliance-to-policy/pkg" - "github.com/IBM/compliance-to-policy/pkg/ocm/reporter" - typereport "github.com/IBM/compliance-to-policy/pkg/types/report" -) - -func New() *cobra.Command { - opts := options.NewOptions() - - command := &cobra.Command{ - Use: "oscal2posture", - Short: "Generate Compliance Posture from OSCAL artifacts", - RunE: func(cmd *cobra.Command, args []string) error { - if err := opts.Complete(); err != nil { - return err - } - - if err := opts.Validate(); err != nil { - return err - } - return Run(opts) - }, - } - - opts.AddFlags(command.Flags()) - - return command -} - -func Run(options *options.Options) error { - - var report typereport.ComplianceReport - err := pkg.LoadYamlFileToK8sTypedObject(options.ComplianceReportFile, &report) - if err != nil { - panic(err) - } - - md := reporter.NewMarkdown() - generated, err := md.Generate(options.MdTemplateFile, report) - if err != nil { - panic(err) - } - fmt.Fprintln(os.Stdout, string(generated)) - - return nil -} diff --git a/cmd/ocm/oscal2posture/main.go b/cmd/ocm/oscal2posture/main.go deleted file mode 100644 index a06ae50..0000000 --- a/cmd/ocm/oscal2posture/main.go +++ /dev/null @@ -1,30 +0,0 @@ -/* -Copyright 2023 IBM Corporation - -Licensed under the Apache License, Version 2.0 (the "License"); -you may not use this file except in compliance with the License. -You may obtain a copy of the License at - -http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law or agreed to in writing, software -distributed under the License is distributed on an "AS IS" BASIS, -WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -See the License for the specific language governing permissions and -limitations under the License. -*/ - -package main - -import ( - "os" - - "github.com/IBM/compliance-to-policy/cmd/ocm/oscal2posture/cmd" -) - -func main() { - err := cmd.New().Execute() - if err != nil { - os.Exit(1) - } -} diff --git a/cmd/ocm/oscal2posture/options/options.go b/cmd/ocm/oscal2posture/options/options.go deleted file mode 100644 index 4774cae..0000000 --- a/cmd/ocm/oscal2posture/options/options.go +++ /dev/null @@ -1,48 +0,0 @@ -/* -Copyright 2023 IBM Corporation - -Licensed under the Apache License, Version 2.0 (the "License"); -you may not use this file except in compliance with the License. -You may obtain a copy of the License at - -http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law or agreed to in writing, software -distributed under the License is distributed on an "AS IS" BASIS, -WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -See the License for the specific language governing permissions and -limitations under the License. -*/ - -package options - -import ( - "errors" - - "github.com/spf13/pflag" -) - -type Options struct { - ComplianceReportFile string - MdTemplateFile string -} - -func NewOptions() *Options { - return &Options{} -} - -func (o *Options) AddFlags(fs *pflag.FlagSet) { - fs.StringVar(&o.ComplianceReportFile, "compliance-report", "", "path to a compliance report") - fs.StringVar(&o.MdTemplateFile, "template", "", "path to a template of markdown (default: pre-defined template)") -} - -func (o *Options) Complete() error { - return nil -} - -func (o *Options) Validate() error { - if o.ComplianceReportFile == "" { - return errors.New("--compliance-report is required") - } - return nil -} diff --git a/cmd/ocm/result2oscal/cmd/cmd.go b/cmd/ocm/result2oscal/cmd/cmd.go index 1328a79..dc189fa 100644 --- a/cmd/ocm/result2oscal/cmd/cmd.go +++ b/cmd/ocm/result2oscal/cmd/cmd.go @@ -70,7 +70,6 @@ func Run(options *options.Options) error { } r := reporter.NewReporter(c2pcrParsed) - r.SetGenerationType(reporter.GenerationTypePolicyReport) arRoot, err := r.Generate() if err != nil { panic(err) diff --git a/pkg/ocm/reporter/helper.go b/pkg/ocm/reporter/helper.go index e239bc8..54f04f0 100644 --- a/pkg/ocm/reporter/helper.go +++ b/pkg/ocm/reporter/helper.go @@ -17,15 +17,9 @@ limitations under the License. package reporter import ( - "fmt" - "strings" - - "github.com/IBM/compliance-to-policy/pkg" typeconfigpolicy "github.com/IBM/compliance-to-policy/pkg/types/configurationpolicy" typepolicy "github.com/IBM/compliance-to-policy/pkg/types/policy" - corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" - "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" typepolr "sigs.k8s.io/wg-policy-prototypes/policy-report/pkg/api/wgpolicyk8s.io/v1beta1" ) @@ -53,65 +47,6 @@ const ( PolicyResultSkip PolicyResult = "skip" ) -func ConvertToPolicyReport(policy typepolicy.Policy) typepolr.PolicyReport { - results := []*typepolr.PolicyReportResult{} - for _, pt := range policy.Spec.PolicyTemplates { - var configPolicy typeconfigpolicy.ConfigurationPolicy - if err := pkg.LoadByteToK8sTypedObject(pt.ObjectDefinition.Raw, &configPolicy); err != nil { - logger.Error(err.Error()) - continue - } - subjects := []*corev1.ObjectReference{} - descriptions := []string{} - for _, ot := range configPolicy.Spec.ObjectTemplates { - var unstObj unstructured.Unstructured - if err := pkg.LoadByteToK8sTypedObject(ot.ObjectDefinition.Raw, &unstObj); err != nil { - logger.Error(err.Error()) - continue - } - subject := corev1.ObjectReference{ - Kind: unstObj.GetKind(), - APIVersion: unstObj.GetAPIVersion(), - Name: unstObj.GetName(), - Namespace: unstObj.GetNamespace(), - } - subjects = append(subjects, &subject) - descriptions = append(descriptions, fmt.Sprintf("%s Kind:%s Name:%s", ot.ComplianceType, unstObj.GetKind(), unstObj.GetName())) - } - details := findConfigPolicyStatus(policy, configPolicy) - result := typepolr.PolicyReportResult{ - Policy: configPolicy.GetName(), - Description: strings.Join(descriptions, ","), - Subjects: subjects, - Result: mapToPolicyResult(details.ComplianceState), - Severity: mapToSeverity(configPolicy.Spec.Severity), - Properties: mapToProps(details), - Timestamp: mapToTimestamp(details), - } - results = append(results, &result) - } - policyReport := typepolr.PolicyReport{ - TypeMeta: metav1.TypeMeta{ - Kind: "PolicyReport", - APIVersion: "wgpolicyk8s.io/v1beta1", - }, - ObjectMeta: metav1.ObjectMeta{ - Namespace: policy.Namespace, - Name: policy.Name, - CreationTimestamp: metav1.Now(), - }, - Scope: &corev1.ObjectReference{ - Kind: "Policy", - APIVersion: "policy.open-cluster-management.io/v1", - Namespace: policy.Namespace, - Name: policy.Name, - }, - Results: results, - } - policyReport.Summary = summary(policyReport) - return policyReport -} - func mapToPolicyResult(complianceState typepolicy.ComplianceState) typepolr.PolicyResult { var result PolicyResult switch complianceState { diff --git a/pkg/ocm/reporter/helper_test.go b/pkg/ocm/reporter/helper_test.go deleted file mode 100644 index cc5a4c0..0000000 --- a/pkg/ocm/reporter/helper_test.go +++ /dev/null @@ -1,68 +0,0 @@ -/* -Copyright 2023 IBM Corporation - -Licensed under the Apache License, Version 2.0 (the "License"); -you may not use this file except in compliance with the License. -You may obtain a copy of the License at - -http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law or agreed to in writing, software -distributed under the License is distributed on an "AS IS" BASIS, -WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -See the License for the specific language governing permissions and -limitations under the License. -*/ - -package reporter - -import ( - "fmt" - "os" - "path/filepath" - "testing" - - "github.com/IBM/compliance-to-policy/pkg" - typeplacementdecision "github.com/IBM/compliance-to-policy/pkg/types/placementdecision" - typepolicy "github.com/IBM/compliance-to-policy/pkg/types/policy" - "github.com/stretchr/testify/assert" - typepolr "sigs.k8s.io/wg-policy-prototypes/policy-report/pkg/api/wgpolicyk8s.io/v1beta1" -) - -func TestConvertToPolicyReport(t *testing.T) { - policies := []typepolicy.Policy{} - traverseFunc := genTraverseFunc( - func(policy typepolicy.Policy) { policies = append(policies, policy) }, - func(policySet typepolicy.PolicySet) {}, - func(placementDecision typeplacementdecision.PlacementDecision) {}, - ) - err := filepath.Walk(pkg.PathFromPkgDirectory("./testdata/ocm/policy-results"), traverseFunc) - assert.NoError(t, err, "Should not happen") - - tempDirPath := pkg.PathFromPkgDirectory("./testdata/_test") - err = os.MkdirAll(tempDirPath, os.ModePerm) - assert.NoError(t, err, "Should not happen") - tempDir := pkg.NewTempDirectory(tempDirPath) - - for _, policy := range policies { - policyReport := ConvertToPolicyReport(policy) - assert.NotNil(t, policyReport, "Should not happen") - fname := fmt.Sprintf("policy-report.%s.%s.yaml", policy.Namespace, policy.Name) - err = pkg.WriteObjToYamlFile(tempDir.GetTempDir()+"/"+fname, policyReport) - assert.NoError(t, err, "Should not happen") - - var expected typepolr.PolicyReport - err = pkg.LoadYamlFileToK8sTypedObject(pkg.PathFromPkgDirectory("./testdata/reports")+"/"+fname, &expected) - assert.NoError(t, err, "Should not happen") - - // Workaround: I'm not sure why empty map field is treated as nil for loaded object. Explicitly set as empty map. - for idx := range expected.Results { - if expected.Results[idx].Properties == nil { - expected.Results[idx].Properties = map[string]string{} - } - } - // Timestamp is currently set by Now(). Since the timestamp should be always different from expected one, reset creationTimestamp of expected one to actual one. - expected.CreationTimestamp = policyReport.CreationTimestamp - assert.Equal(t, expected, policyReport) - } -} diff --git a/pkg/ocm/reporter/markdown.go b/pkg/ocm/reporter/markdown.go deleted file mode 100644 index c91018d..0000000 --- a/pkg/ocm/reporter/markdown.go +++ /dev/null @@ -1,59 +0,0 @@ -/* -Copyright 2023 IBM Corporation - -Licensed under the Apache License, Version 2.0 (the "License"); -you may not use this file except in compliance with the License. -You may obtain a copy of the License at - -http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law or agreed to in writing, software -distributed under the License is distributed on an "AS IS" BASIS, -WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -See the License for the specific language governing permissions and -limitations under the License. -*/ - -package reporter - -import ( - "bytes" - "embed" - "os" - "text/template" - - typereport "github.com/IBM/compliance-to-policy/pkg/types/report" -) - -//go:embed *.md -var embeddedResources embed.FS - -type Markdown struct{} - -func NewMarkdown() Markdown { - return Markdown{} -} - -func (m *Markdown) Generate(templateFile string, report typereport.ComplianceReport) ([]byte, error) { - var templateData []byte - var err error - if templateFile == "" { - templateData, err = embeddedResources.ReadFile("template.md") - } else { - templateData, err = os.ReadFile(templateFile) - } - if err != nil { - return nil, err - } - templateString := string(templateData) - tmpl, err := template.New("report.md").Parse(templateString) - if err != nil { - return nil, err - } - buffer := bytes.NewBuffer([]byte{}) - err = tmpl.Execute(buffer, report.Spec) - if err != nil { - return nil, err - } - return buffer.Bytes(), nil -} diff --git a/pkg/ocm/reporter/markdown_test.go b/pkg/ocm/reporter/markdown_test.go deleted file mode 100644 index cebd2ec..0000000 --- a/pkg/ocm/reporter/markdown_test.go +++ /dev/null @@ -1,40 +0,0 @@ -/* -Copyright 2023 IBM Corporation - -Licensed under the Apache License, Version 2.0 (the "License"); -you may not use this file except in compliance with the License. -You may obtain a copy of the License at - -http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law or agreed to in writing, software -distributed under the License is distributed on an "AS IS" BASIS, -WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -See the License for the specific language governing permissions and -limitations under the License. -*/ - -package reporter - -import ( - "os" - "testing" - - "github.com/stretchr/testify/assert" - - "github.com/IBM/compliance-to-policy/pkg" - typereport "github.com/IBM/compliance-to-policy/pkg/types/report" -) - -func TestMarkdown(t *testing.T) { - var report typereport.ComplianceReport - err := pkg.LoadYamlFileToK8sTypedObject(pkg.PathFromPkgDirectory("./testdata/reports/compliance-report.yaml"), &report) - assert.NoError(t, err, "Should not happen") - - markdown := NewMarkdown() - generated, err := markdown.Generate("", report) - assert.NoError(t, err, "Should not happen") - - err = os.WriteFile(pkg.PathFromPkgDirectory("./testdata/reports/compliance-report.md"), generated, os.ModePerm) - assert.NoError(t, err, "Should not happen") -} diff --git a/pkg/ocm/reporter/reporter.go b/pkg/ocm/reporter/reporter.go index 7e2738f..113ccec 100644 --- a/pkg/ocm/reporter/reporter.go +++ b/pkg/ocm/reporter/reporter.go @@ -27,7 +27,6 @@ import ( "go.uber.org/zap" sigyaml "sigs.k8s.io/yaml" - v1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/util/sets" "github.com/IBM/compliance-to-policy/pkg/oscal" @@ -38,7 +37,6 @@ import ( typepolicy "github.com/IBM/compliance-to-policy/pkg/types/policy" typereport "github.com/IBM/compliance-to-policy/pkg/types/report" typeutils "github.com/IBM/compliance-to-policy/pkg/types/utils" - typepolr "sigs.k8s.io/wg-policy-prototypes/policy-report/pkg/api/wgpolicyk8s.io/v1beta1" ) var logger *zap.Logger = pkg.GetLogger("reporter") @@ -48,8 +46,6 @@ type Reporter struct { policies []*typepolicy.Policy policySets []*typepolicy.PolicySet placementDecisions []*typeplacementdecision.PlacementDecision - policyReports []*typepolr.PolicyReport - generationType GenerationType } type Reason struct { @@ -71,16 +67,10 @@ func NewReporter(c2pParsed typec2pcr.C2PCRParsed) *Reporter { policies: []*typepolicy.Policy{}, policySets: []*typepolicy.PolicySet{}, placementDecisions: []*typeplacementdecision.PlacementDecision{}, - policyReports: []*typepolr.PolicyReport{}, - generationType: GenerationTypeRaw, } return &r } -func (r *Reporter) SetGenerationType(generationType GenerationType) { - r.generationType = generationType -} - func (r *Reporter) Generate() (*typear.AssessmentResultsRoot, error) { traverseFunc := genTraverseFunc( func(policy typepolicy.Policy) { r.policies = append(r.policies, &policy) }, @@ -96,8 +86,6 @@ func (r *Reporter) Generate() (*typear.AssessmentResultsRoot, error) { inventories := []typear.InventoryItem{} clusternameIndex := map[string]bool{} for _, policy := range r.policies { - polr := ConvertToPolicyReport(*policy) - r.policyReports = append(r.policyReports, &polr) if policy.Namespace == r.c2pParsed.Namespace { for _, s := range policy.Status.Status { _, exist := clusternameIndex[s.ClusterName] @@ -159,12 +147,7 @@ func (r *Reporter) Generate() (*typear.AssessmentResultsRoot, error) { var ruleStatus typereport.RuleStatus subjects := []typear.Subject{} if policy != nil { - var reasons []Reason - if r.generationType == GenerationTypePolicyReport { - reasons = r.GenerateReasonsFromPolicyReports(*policy) - } else { - reasons = r.GenerateReasonsFromRawPolicies(*policy) - } + reasons := r.GenerateReasonsFromRawPolicies(*policy) ruleStatus = mapToRuleStatus(policy.Status.ComplianceState) for _, reason := range reasons { clusterName := "N/A" @@ -284,29 +267,6 @@ func (r *Reporter) GenerateReasonsFromRawPolicies(policy typepolicy.Policy) []Re } -func (r *Reporter) GenerateReasonsFromPolicyReports(policy typepolicy.Policy) []Reason { - reasons := []Reason{} - for _, status := range policy.Status.Status { - clusterName := status.ClusterName - policyReport := findPolicyReportByNamespaceName(r.policyReports, clusterName, policy.Namespace+"."+policy.Name) - clusterHistories := []typepolicy.ComplianceHistory{} - for _, result := range policyReport.Results { - clusterHistory := typepolicy.ComplianceHistory{ - LastTimestamp: v1.NewTime(time.Unix(result.Timestamp.Seconds, int64(result.Timestamp.Nanos))), - EventName: result.Properties["eventName"], - Message: result.Properties["details"], - } - clusterHistories = append(clusterHistories, clusterHistory) - } - reasons = append(reasons, Reason{ - ClusterName: policyReport.Namespace, - ComplianceState: aggregatePolicyReportSummaryToComplianceState(policyReport.Summary), - Messages: clusterHistories, - }) - } - return reasons -} - func mapToRuleStatus(complianceState typepolicy.ComplianceState) typereport.RuleStatus { switch complianceState { case typepolicy.Compliant: @@ -320,14 +280,6 @@ func mapToRuleStatus(complianceState typepolicy.ComplianceState) typereport.Rule } } -func aggregatePolicyReportSummaryToComplianceState(summary typepolr.PolicyReportSummary) typepolicy.ComplianceState { - if summary.Pass == 0 { - return typepolicy.NonCompliant - } else { - return typepolicy.Compliant - } -} - func genTraverseFunc(onPolicy func(typepolicy.Policy), onPolicySet func(typepolicy.PolicySet), onPlacementDesicion func(typeplacementdecision.PlacementDecision)) func(path string, info os.FileInfo, err error) error { return func(path string, info os.FileInfo, err error) error { if err != nil { diff --git a/pkg/ocm/reporter/template.md b/pkg/ocm/reporter/template.md deleted file mode 100644 index 58ed2ac..0000000 --- a/pkg/ocm/reporter/template.md +++ /dev/null @@ -1,27 +0,0 @@ -## Catalog -{{.Catalog}} - -{{- range $component := .Components}} -## Component: {{$component.ComponentTitle}} - -Compliance status: {{$component.ComplianceStatus}} - -Checked controls: [{{- range $checkedControl := $component.CheckedControls}}{{$checkedControl}},{{- end}}] - -{{- range $controlResult := $component.ControlResults}} -#### Result of control: {{$controlResult.ControlId}} -**Compliance status: {{$controlResult.ComplianceStatus}}** - -Rules: -{{- range $ruleResult := $controlResult.RuleResults}} -- Rule ID: {{$ruleResult.RuleId}} -- Policy ID: {{$ruleResult.PolicyId}} -- Status: {{$ruleResult.Status}} -- Reason: -``` -{{$ruleResult.Reason}} -``` -{{- end}} ---- -{{- end}} -{{- end}} diff --git a/pkg/testdata/reports/compliance-report.md b/pkg/testdata/reports/compliance-report.md deleted file mode 100755 index e69de29..0000000 diff --git a/pkg/testdata/reports/compliance-report.yaml b/pkg/testdata/reports/compliance-report.yaml deleted file mode 100755 index e59b522..0000000 --- a/pkg/testdata/reports/compliance-report.yaml +++ /dev/null @@ -1,107 +0,0 @@ -metadata: - creationTimestamp: "2023-07-13T04:51:54Z" - name: compliance-report -spec: - catalog: Electronic Version of NIST SP 800-53 Rev 5 Controls and SP 800-53A Rev - 5 Assessment Procedures - components: - - checkedControls: - - ac-6 - - cm-2 - - cm-6 - complianceStatus: NonCompliant - componentTitle: Managed Kubernetes - controlResults: - - complianceStatus: NonCompliant - controlId: cm-6 - ruleResults: - - policyId: policy-high-scan - reason: | - - clusterName: cluster1 - complianceState: NonCompliant - messages: - - eventName: c2p.policy-high-scan.176f1dcdc2b51b01 - lastTimestamp: "2023-07-05T23:52:34Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding, - please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1ddc44adf035 - lastTimestamp: "2023-07-05T23:53:37Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite, - please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1ddc441457e5 - lastTimestamp: "2023-07-05T23:53:37Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult, - please check if you have CRD deployed - - clusterName: cluster2 - complianceState: NonCompliant - messages: - - eventName: c2p.policy-high-scan.176f1dc3684f9eb6 - lastTimestamp: "2023-07-05T23:51:50Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding, - please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1dc426d20948 - lastTimestamp: "2023-07-05T23:51:53Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite, - please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1dc4e29e1221 - lastTimestamp: "2023-07-05T23:51:56Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult, - please check if you have CRD deployed - ruleId: test_configuration_check - status: fail - - complianceStatus: NonCompliant - controlId: cm-2 - ruleResults: - - policyId: policy-deployment - reason: | - - clusterName: cluster1 - complianceState: NonCompliant - messages: - - eventName: c2p.policy-deployment.176f1ddc5591cb1c - lastTimestamp: "2023-07-05T23:53:37Z" - message: 'NonCompliant; violation - deployments not found: [nginx-deployment] - in namespace cluster1 missing; [nginx-deployment] in namespace kube-node-lease - missing; [nginx-deployment] in namespace kube-public missing; [nginx-deployment] - in namespace local-path-storage missing' - - clusterName: cluster2 - complianceState: NonCompliant - messages: - - eventName: c2p.policy-deployment.176f1dc4e7de17cb - lastTimestamp: "2023-07-05T23:51:56Z" - message: 'NonCompliant; violation - deployments not found: [nginx-deployment] - in namespace cluster2 missing; [nginx-deployment] in namespace default missing; - [nginx-deployment] in namespace kube-node-lease missing; [nginx-deployment] - in namespace kube-public missing; [nginx-deployment] in namespace local-path-storage - missing' - ruleId: test_proxy_check - status: fail - - complianceStatus: Compliant - controlId: ac-6 - ruleResults: - - policyId: policy-disallowed-roles - reason: | - - clusterName: cluster1 - complianceState: Compliant - messages: - - eventName: c2p.policy-disallowed-roles.176f1dcdc4c8d17e - lastTimestamp: "2023-07-05T23:52:34Z" - message: Compliant; notification - roles in namespace cluster1; in namespace default; - in namespace kube-node-lease; in namespace kube-public; in namespace local-path-storage - missing as expected, therefore this Object template is compliant - - clusterName: cluster2 - complianceState: Compliant - messages: - - eventName: c2p.policy-disallowed-roles.176f1dc36e36b7b2 - lastTimestamp: "2023-07-05T23:51:50Z" - message: Compliant; notification - roles in namespace cluster2; in namespace default; - in namespace kube-node-lease; in namespace kube-public; in namespace local-path-storage - missing as expected, therefore this Object template is compliant - ruleId: test_rbac_check - status: pass - parameters: - minimum_nginx_deployment_replicas: "3" - requiredControls: - - ac-6 - - cm-2 - - cm-6 - profile: NIST Special Publication 800-53 Revision 5 Customized BASELINE diff --git a/pkg/testdata/reports/policy-report.c2p.policy-deployment.yaml b/pkg/testdata/reports/policy-report.c2p.policy-deployment.yaml deleted file mode 100755 index d65591e..0000000 --- a/pkg/testdata/reports/policy-report.c2p.policy-deployment.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: wgpolicyk8s.io/v1beta1 -kind: PolicyReport -metadata: - creationTimestamp: "2023-07-13T03:45:31Z" - name: policy-deployment - namespace: c2p -results: -- message: musthave Kind:Deployment Name:nginx-deployment - policy: policy-deployment - resources: - - apiVersion: apps/v1 - kind: Deployment - name: nginx-deployment - result: error - severity: low - source: "" - timestamp: - nanos: 0 - seconds: 0 -scope: - apiVersion: policy.open-cluster-management.io/v1 - kind: Policy - name: policy-deployment - namespace: c2p -source: "" -summary: - error: 1 - fail: 0 - pass: 0 - skip: 0 - warn: 0 diff --git a/pkg/testdata/reports/policy-report.c2p.policy-disallowed-roles.yaml b/pkg/testdata/reports/policy-report.c2p.policy-disallowed-roles.yaml deleted file mode 100755 index 560842b..0000000 --- a/pkg/testdata/reports/policy-report.c2p.policy-disallowed-roles.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: wgpolicyk8s.io/v1beta1 -kind: PolicyReport -metadata: - creationTimestamp: "2023-07-13T03:45:31Z" - name: policy-disallowed-roles - namespace: c2p -results: -- message: 'mustnothave Kind:Role Name:' - policy: policy-disallowed-roles - resources: - - apiVersion: rbac.authorization.k8s.io/v1 - kind: Role - result: error - severity: high - source: "" - timestamp: - nanos: 0 - seconds: 0 -scope: - apiVersion: policy.open-cluster-management.io/v1 - kind: Policy - name: policy-disallowed-roles - namespace: c2p -source: "" -summary: - error: 1 - fail: 0 - pass: 0 - skip: 0 - warn: 0 diff --git a/pkg/testdata/reports/policy-report.c2p.policy-high-scan.yaml b/pkg/testdata/reports/policy-report.c2p.policy-high-scan.yaml deleted file mode 100755 index b06dc5c..0000000 --- a/pkg/testdata/reports/policy-report.c2p.policy-high-scan.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: wgpolicyk8s.io/v1beta1 -kind: PolicyReport -metadata: - creationTimestamp: "2023-07-13T03:45:31Z" - name: policy-high-scan - namespace: c2p -results: -- message: musthave Kind:ScanSettingBinding Name:high - policy: policy-high-scan - resources: - - apiVersion: compliance.openshift.io/v1alpha1 - kind: ScanSettingBinding - name: high - namespace: openshift-compliance - result: error - severity: high - source: "" - timestamp: - nanos: 0 - seconds: 0 -- message: musthave Kind:ComplianceSuite Name:high - policy: policy-high-scan2 - resources: - - apiVersion: compliance.openshift.io/v1alpha1 - kind: ComplianceSuite - name: high - namespace: openshift-compliance - result: error - severity: high - source: "" - timestamp: - nanos: 0 - seconds: 0 -- message: 'mustnothave Kind:ComplianceCheckResult Name:' - policy: policy-high-scan3 - resources: - - apiVersion: compliance.openshift.io/v1alpha1 - kind: ComplianceCheckResult - namespace: openshift-compliance - result: error - severity: high - source: "" - timestamp: - nanos: 0 - seconds: 0 -scope: - apiVersion: policy.open-cluster-management.io/v1 - kind: Policy - name: policy-high-scan - namespace: c2p -source: "" -summary: - error: 3 - fail: 0 - pass: 0 - skip: 0 - warn: 0 diff --git a/pkg/testdata/reports/policy-report.cluster1.c2p.policy-deployment.yaml b/pkg/testdata/reports/policy-report.cluster1.c2p.policy-deployment.yaml deleted file mode 100755 index 07c616f..0000000 --- a/pkg/testdata/reports/policy-report.cluster1.c2p.policy-deployment.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: wgpolicyk8s.io/v1beta1 -kind: PolicyReport -metadata: - creationTimestamp: "2023-07-13T03:45:31Z" - name: c2p.policy-deployment - namespace: cluster1 -results: -- message: musthave Kind:Deployment Name:nginx-deployment - policy: policy-deployment - properties: - details: 'NonCompliant; violation - deployments not found: [nginx-deployment] - in namespace cluster1 missing; [nginx-deployment] in namespace kube-node-lease - missing; [nginx-deployment] in namespace kube-public missing; [nginx-deployment] - in namespace local-path-storage missing' - eventName: c2p.policy-deployment.176f1ddc5591cb1c - lastTimestamp: 2023-07-06 08:53:37 +0900 JST - resources: - - apiVersion: apps/v1 - kind: Deployment - name: nginx-deployment - result: fail - severity: low - source: "" - timestamp: - nanos: 0 - seconds: 1688601217 -scope: - apiVersion: policy.open-cluster-management.io/v1 - kind: Policy - name: c2p.policy-deployment - namespace: cluster1 -source: "" -summary: - error: 0 - fail: 1 - pass: 0 - skip: 0 - warn: 0 diff --git a/pkg/testdata/reports/policy-report.cluster1.c2p.policy-disallowed-roles.yaml b/pkg/testdata/reports/policy-report.cluster1.c2p.policy-disallowed-roles.yaml deleted file mode 100755 index 8291d08..0000000 --- a/pkg/testdata/reports/policy-report.cluster1.c2p.policy-disallowed-roles.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: wgpolicyk8s.io/v1beta1 -kind: PolicyReport -metadata: - creationTimestamp: "2023-07-13T03:45:31Z" - name: c2p.policy-disallowed-roles - namespace: cluster1 -results: -- message: 'mustnothave Kind:Role Name:' - policy: policy-disallowed-roles - properties: - details: Compliant; notification - roles in namespace cluster1; in namespace default; - in namespace kube-node-lease; in namespace kube-public; in namespace local-path-storage - missing as expected, therefore this Object template is compliant - eventName: c2p.policy-disallowed-roles.176f1dcdc4c8d17e - lastTimestamp: 2023-07-06 08:52:34 +0900 JST - resources: - - apiVersion: rbac.authorization.k8s.io/v1 - kind: Role - result: pass - severity: high - source: "" - timestamp: - nanos: 0 - seconds: 1688601154 -scope: - apiVersion: policy.open-cluster-management.io/v1 - kind: Policy - name: c2p.policy-disallowed-roles - namespace: cluster1 -source: "" -summary: - error: 0 - fail: 0 - pass: 1 - skip: 0 - warn: 0 diff --git a/pkg/testdata/reports/policy-report.cluster1.c2p.policy-high-scan.yaml b/pkg/testdata/reports/policy-report.cluster1.c2p.policy-high-scan.yaml deleted file mode 100755 index 56ac958..0000000 --- a/pkg/testdata/reports/policy-report.cluster1.c2p.policy-high-scan.yaml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: wgpolicyk8s.io/v1beta1 -kind: PolicyReport -metadata: - creationTimestamp: "2023-07-13T03:45:31Z" - name: c2p.policy-high-scan - namespace: cluster1 -results: -- message: musthave Kind:ScanSettingBinding Name:high - policy: policy-high-scan - properties: - details: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding, - please check if you have CRD deployed - eventName: c2p.policy-high-scan.176f1dcdc2b51b01 - lastTimestamp: 2023-07-06 08:52:34 +0900 JST - resources: - - apiVersion: compliance.openshift.io/v1alpha1 - kind: ScanSettingBinding - name: high - namespace: openshift-compliance - result: fail - severity: high - source: "" - timestamp: - nanos: 0 - seconds: 1688601154 -- message: musthave Kind:ComplianceSuite Name:high - policy: policy-high-scan2 - properties: - details: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite, - please check if you have CRD deployed - eventName: c2p.policy-high-scan.176f1ddc44adf035 - lastTimestamp: 2023-07-06 08:53:37 +0900 JST - resources: - - apiVersion: compliance.openshift.io/v1alpha1 - kind: ComplianceSuite - name: high - namespace: openshift-compliance - result: fail - severity: high - source: "" - timestamp: - nanos: 0 - seconds: 1688601217 -- message: 'mustnothave Kind:ComplianceCheckResult Name:' - policy: policy-high-scan3 - properties: - details: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult, - please check if you have CRD deployed - eventName: c2p.policy-high-scan.176f1ddc441457e5 - lastTimestamp: 2023-07-06 08:53:37 +0900 JST - resources: - - apiVersion: compliance.openshift.io/v1alpha1 - kind: ComplianceCheckResult - namespace: openshift-compliance - result: fail - severity: high - source: "" - timestamp: - nanos: 0 - seconds: 1688601217 -scope: - apiVersion: policy.open-cluster-management.io/v1 - kind: Policy - name: c2p.policy-high-scan - namespace: cluster1 -source: "" -summary: - error: 0 - fail: 3 - pass: 0 - skip: 0 - warn: 0 diff --git a/pkg/testdata/reports/policy-report.cluster2.c2p.policy-deployment.yaml b/pkg/testdata/reports/policy-report.cluster2.c2p.policy-deployment.yaml deleted file mode 100755 index c175001..0000000 --- a/pkg/testdata/reports/policy-report.cluster2.c2p.policy-deployment.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: wgpolicyk8s.io/v1beta1 -kind: PolicyReport -metadata: - creationTimestamp: "2023-07-13T03:45:31Z" - name: c2p.policy-deployment - namespace: cluster2 -results: -- message: musthave Kind:Deployment Name:nginx-deployment - policy: policy-deployment - properties: - details: 'NonCompliant; violation - deployments not found: [nginx-deployment] - in namespace cluster2 missing; [nginx-deployment] in namespace default missing; - [nginx-deployment] in namespace kube-node-lease missing; [nginx-deployment] - in namespace kube-public missing; [nginx-deployment] in namespace local-path-storage - missing' - eventName: c2p.policy-deployment.176f1dc4e7de17cb - lastTimestamp: 2023-07-06 08:51:56 +0900 JST - resources: - - apiVersion: apps/v1 - kind: Deployment - name: nginx-deployment - result: fail - severity: low - source: "" - timestamp: - nanos: 0 - seconds: 1688601116 -scope: - apiVersion: policy.open-cluster-management.io/v1 - kind: Policy - name: c2p.policy-deployment - namespace: cluster2 -source: "" -summary: - error: 0 - fail: 1 - pass: 0 - skip: 0 - warn: 0 diff --git a/pkg/testdata/reports/policy-report.cluster2.c2p.policy-disallowed-roles.yaml b/pkg/testdata/reports/policy-report.cluster2.c2p.policy-disallowed-roles.yaml deleted file mode 100755 index b5416e4..0000000 --- a/pkg/testdata/reports/policy-report.cluster2.c2p.policy-disallowed-roles.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: wgpolicyk8s.io/v1beta1 -kind: PolicyReport -metadata: - creationTimestamp: "2023-07-13T03:45:31Z" - name: c2p.policy-disallowed-roles - namespace: cluster2 -results: -- message: 'mustnothave Kind:Role Name:' - policy: policy-disallowed-roles - properties: - details: Compliant; notification - roles in namespace cluster2; in namespace default; - in namespace kube-node-lease; in namespace kube-public; in namespace local-path-storage - missing as expected, therefore this Object template is compliant - eventName: c2p.policy-disallowed-roles.176f1dc36e36b7b2 - lastTimestamp: 2023-07-06 08:51:50 +0900 JST - resources: - - apiVersion: rbac.authorization.k8s.io/v1 - kind: Role - result: pass - severity: high - source: "" - timestamp: - nanos: 0 - seconds: 1688601110 -scope: - apiVersion: policy.open-cluster-management.io/v1 - kind: Policy - name: c2p.policy-disallowed-roles - namespace: cluster2 -source: "" -summary: - error: 0 - fail: 0 - pass: 1 - skip: 0 - warn: 0 diff --git a/pkg/testdata/reports/policy-report.cluster2.c2p.policy-high-scan.yaml b/pkg/testdata/reports/policy-report.cluster2.c2p.policy-high-scan.yaml deleted file mode 100755 index 09dd187..0000000 --- a/pkg/testdata/reports/policy-report.cluster2.c2p.policy-high-scan.yaml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: wgpolicyk8s.io/v1beta1 -kind: PolicyReport -metadata: - creationTimestamp: "2023-07-13T03:45:31Z" - name: c2p.policy-high-scan - namespace: cluster2 -results: -- message: musthave Kind:ScanSettingBinding Name:high - policy: policy-high-scan - properties: - details: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding, - please check if you have CRD deployed - eventName: c2p.policy-high-scan.176f1dc3684f9eb6 - lastTimestamp: 2023-07-06 08:51:50 +0900 JST - resources: - - apiVersion: compliance.openshift.io/v1alpha1 - kind: ScanSettingBinding - name: high - namespace: openshift-compliance - result: fail - severity: high - source: "" - timestamp: - nanos: 0 - seconds: 1688601110 -- message: musthave Kind:ComplianceSuite Name:high - policy: policy-high-scan2 - properties: - details: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite, - please check if you have CRD deployed - eventName: c2p.policy-high-scan.176f1dc426d20948 - lastTimestamp: 2023-07-06 08:51:53 +0900 JST - resources: - - apiVersion: compliance.openshift.io/v1alpha1 - kind: ComplianceSuite - name: high - namespace: openshift-compliance - result: fail - severity: high - source: "" - timestamp: - nanos: 0 - seconds: 1688601113 -- message: 'mustnothave Kind:ComplianceCheckResult Name:' - policy: policy-high-scan3 - properties: - details: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult, - please check if you have CRD deployed - eventName: c2p.policy-high-scan.176f1dc4e29e1221 - lastTimestamp: 2023-07-06 08:51:56 +0900 JST - resources: - - apiVersion: compliance.openshift.io/v1alpha1 - kind: ComplianceCheckResult - namespace: openshift-compliance - result: fail - severity: high - source: "" - timestamp: - nanos: 0 - seconds: 1688601116 -scope: - apiVersion: policy.open-cluster-management.io/v1 - kind: Policy - name: c2p.policy-high-scan - namespace: cluster2 -source: "" -summary: - error: 0 - fail: 3 - pass: 0 - skip: 0 - warn: 0 From 4ca1c164c15010c3a8358594d807ef7e3039659f Mon Sep 17 00:00:00 2001 From: Takumi Yanagawa Date: Tue, 5 Dec 2023 16:25:02 +0900 Subject: [PATCH 04/13] Rename reporter to result2oscal Signed-off-by: Takumi Yanagawa --- cmd/ocm/result2oscal/cmd/cmd.go | 4 ++-- pkg/ocm/{reporter => }/helper.go | 2 +- pkg/ocm/{reporter/reporter.go => result2oscal.go} | 15 ++++++--------- .../reporter_test.go => result2oscal_test.go} | 6 +++--- 4 files changed, 12 insertions(+), 15 deletions(-) rename pkg/ocm/{reporter => }/helper.go (99%) rename pkg/ocm/{reporter/reporter.go => result2oscal.go} (96%) rename pkg/ocm/{reporter/reporter_test.go => result2oscal_test.go} (97%) diff --git a/cmd/ocm/result2oscal/cmd/cmd.go b/cmd/ocm/result2oscal/cmd/cmd.go index dc189fa..9c1b761 100644 --- a/cmd/ocm/result2oscal/cmd/cmd.go +++ b/cmd/ocm/result2oscal/cmd/cmd.go @@ -24,7 +24,7 @@ import ( "github.com/IBM/compliance-to-policy/cmd/ocm/result2oscal/options" "github.com/IBM/compliance-to-policy/pkg" "github.com/IBM/compliance-to-policy/pkg/c2pcr" - "github.com/IBM/compliance-to-policy/pkg/ocm/reporter" + "github.com/IBM/compliance-to-policy/pkg/ocm" typec2pcr "github.com/IBM/compliance-to-policy/pkg/types/c2pcr" ) @@ -69,7 +69,7 @@ func Run(options *options.Options) error { panic(err) } - r := reporter.NewReporter(c2pcrParsed) + r := ocm.NewResultToOscal(c2pcrParsed) arRoot, err := r.Generate() if err != nil { panic(err) diff --git a/pkg/ocm/reporter/helper.go b/pkg/ocm/helper.go similarity index 99% rename from pkg/ocm/reporter/helper.go rename to pkg/ocm/helper.go index 54f04f0..c99ef5f 100644 --- a/pkg/ocm/reporter/helper.go +++ b/pkg/ocm/helper.go @@ -14,7 +14,7 @@ See the License for the specific language governing permissions and limitations under the License. */ -package reporter +package ocm import ( typeconfigpolicy "github.com/IBM/compliance-to-policy/pkg/types/configurationpolicy" diff --git a/pkg/ocm/reporter/reporter.go b/pkg/ocm/result2oscal.go similarity index 96% rename from pkg/ocm/reporter/reporter.go rename to pkg/ocm/result2oscal.go index 113ccec..987952f 100644 --- a/pkg/ocm/reporter/reporter.go +++ b/pkg/ocm/result2oscal.go @@ -14,7 +14,7 @@ See the License for the specific language governing permissions and limitations under the License. */ -package reporter +package ocm import ( "fmt" @@ -24,7 +24,6 @@ import ( "time" "github.com/IBM/compliance-to-policy/pkg" - "go.uber.org/zap" sigyaml "sigs.k8s.io/yaml" "k8s.io/apimachinery/pkg/util/sets" @@ -39,9 +38,7 @@ import ( typeutils "github.com/IBM/compliance-to-policy/pkg/types/utils" ) -var logger *zap.Logger = pkg.GetLogger("reporter") - -type Reporter struct { +type ResultToOscal struct { c2pParsed typec2pcr.C2PCRParsed policies []*typepolicy.Policy policySets []*typepolicy.PolicySet @@ -61,8 +58,8 @@ const ( GenerationTypePolicyReport GenerationType = "policy-report" ) -func NewReporter(c2pParsed typec2pcr.C2PCRParsed) *Reporter { - r := Reporter{ +func NewResultToOscal(c2pParsed typec2pcr.C2PCRParsed) *ResultToOscal { + r := ResultToOscal{ c2pParsed: c2pParsed, policies: []*typepolicy.Policy{}, policySets: []*typepolicy.PolicySet{}, @@ -71,7 +68,7 @@ func NewReporter(c2pParsed typec2pcr.C2PCRParsed) *Reporter { return &r } -func (r *Reporter) Generate() (*typear.AssessmentResultsRoot, error) { +func (r *ResultToOscal) Generate() (*typear.AssessmentResultsRoot, error) { traverseFunc := genTraverseFunc( func(policy typepolicy.Policy) { r.policies = append(r.policies, &policy) }, func(policySet typepolicy.PolicySet) { r.policySets = append(r.policySets, &policySet) }, @@ -243,7 +240,7 @@ func (r *Reporter) Generate() (*typear.AssessmentResultsRoot, error) { return &arRoot, nil } -func (r *Reporter) GenerateReasonsFromRawPolicies(policy typepolicy.Policy) []Reason { +func (r *ResultToOscal) GenerateReasonsFromRawPolicies(policy typepolicy.Policy) []Reason { reasons := []Reason{} for _, status := range policy.Status.Status { clusterName := status.ClusterName diff --git a/pkg/ocm/reporter/reporter_test.go b/pkg/ocm/result2oscal_test.go similarity index 97% rename from pkg/ocm/reporter/reporter_test.go rename to pkg/ocm/result2oscal_test.go index 5d258ef..20a06df 100644 --- a/pkg/ocm/reporter/reporter_test.go +++ b/pkg/ocm/result2oscal_test.go @@ -14,7 +14,7 @@ See the License for the specific language governing permissions and limitations under the License. */ -package reporter +package ocm import ( "os" @@ -29,7 +29,7 @@ import ( "github.com/stretchr/testify/assert" ) -func TestReporter(t *testing.T) { +func TestResult2Oscal(t *testing.T) { policyDir := pkg.PathFromPkgDirectory("./testdata/ocm/policies") policyResultsDir := pkg.PathFromPkgDirectory("./testdata/ocm/policy-results") @@ -79,7 +79,7 @@ func TestReporter(t *testing.T) { c2pcrParsed, err := c2pcrParser.Parse(c2pcrSpec) assert.NoError(t, err, "Should not happen") - reporter := NewReporter(c2pcrParsed) + reporter := NewResultToOscal(c2pcrParsed) arRoot, err := reporter.Generate() assert.NoError(t, err, "Should not happen") From f9904654ee4b487d24f960ca717e6df19e7a59c4 Mon Sep 17 00:00:00 2001 From: Takumi Yanagawa Date: Tue, 5 Dec 2023 19:07:20 +0900 Subject: [PATCH 05/13] Use List typed object Signed-off-by: Takumi Yanagawa --- pkg/ocm/result2oscal.go | 89 ++++------ ...lacement-managed-kubernetes-decision-1.yml | 24 --- .../Policy.c2p.policy-deployment.yml | 72 -------- .../Policy.c2p.policy-disallowed-roles.yml | 60 ------- .../Policy.c2p.policy-high-scan.yml | 119 -------------- .../Policy.cluster1.c2p.policy-deployment.yml | 80 --------- ...y.cluster1.c2p.policy-disallowed-roles.yml | 68 -------- .../Policy.cluster1.c2p.policy-high-scan.yml | 155 ------------------ .../Policy.cluster2.c2p.policy-deployment.yml | 80 --------- ...y.cluster2.c2p.policy-disallowed-roles.yml | 65 -------- .../Policy.cluster2.c2p.policy-high-scan.yml | 146 ----------------- .../PolicySet.c2p.managed-kubernetes.yml | 25 --- ...s.cluster.open-cluster-management.io.yaml} | 0 ...es.policy.open-cluster-management.io.yaml} | 0 ...ts.policy.open-cluster-management.io.yaml} | 0 pkg/types/policy/policyset_types.go | 7 + 16 files changed, 37 insertions(+), 953 deletions(-) delete mode 100644 pkg/testdata/ocm/policy-results/PlacementDecision.c2p.placement-managed-kubernetes-decision-1.yml delete mode 100644 pkg/testdata/ocm/policy-results/Policy.c2p.policy-deployment.yml delete mode 100644 pkg/testdata/ocm/policy-results/Policy.c2p.policy-disallowed-roles.yml delete mode 100644 pkg/testdata/ocm/policy-results/Policy.c2p.policy-high-scan.yml delete mode 100644 pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-deployment.yml delete mode 100644 pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-disallowed-roles.yml delete mode 100644 pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-high-scan.yml delete mode 100644 pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-deployment.yml delete mode 100644 pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-disallowed-roles.yml delete mode 100644 pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-high-scan.yml delete mode 100644 pkg/testdata/ocm/policy-results/PolicySet.c2p.managed-kubernetes.yml rename pkg/testdata/ocm/policy-results/{00.placementdecisions.yaml => placementdecisions.cluster.open-cluster-management.io.yaml} (100%) rename pkg/testdata/ocm/policy-results/{00.policies.yaml => policies.policy.open-cluster-management.io.yaml} (100%) rename pkg/testdata/ocm/policy-results/{00.policysets.yaml => policysets.policy.open-cluster-management.io.yaml} (100%) diff --git a/pkg/ocm/result2oscal.go b/pkg/ocm/result2oscal.go index 987952f..01953b9 100644 --- a/pkg/ocm/result2oscal.go +++ b/pkg/ocm/result2oscal.go @@ -18,9 +18,6 @@ package ocm import ( "fmt" - "os" - "path/filepath" - "strings" "time" "github.com/IBM/compliance-to-policy/pkg" @@ -69,15 +66,29 @@ func NewResultToOscal(c2pParsed typec2pcr.C2PCRParsed) *ResultToOscal { } func (r *ResultToOscal) Generate() (*typear.AssessmentResultsRoot, error) { - traverseFunc := genTraverseFunc( - func(policy typepolicy.Policy) { r.policies = append(r.policies, &policy) }, - func(policySet typepolicy.PolicySet) { r.policySets = append(r.policySets, &policySet) }, - func(placementDecision typeplacementdecision.PlacementDecision) { - r.placementDecisions = append(r.placementDecisions, &placementDecision) - }, - ) - if err := filepath.Walk(r.c2pParsed.PolicyResultsDir, traverseFunc); err != nil { - logger.Error(err.Error()) + + var policyList typepolicy.PolicyList + if err := r.loadData("policies.policy.open-cluster-management.io.yaml", &policyList); err != nil { + return nil, err + } + for idx := range policyList.Items { + r.policies = append(r.policies, &policyList.Items[idx]) + } + + var policySetList typepolicy.PolicySetList + if err := r.loadData("policysets.policy.open-cluster-management.io.yaml", &policySetList); err != nil { + return nil, err + } + for idx := range policySetList.Items { + r.policySets = append(r.policySets, &policySetList.Items[idx]) + } + + var placementDecisionLost typeplacementdecision.PlacementDecisionList + if err := r.loadData("placementdecisions.cluster.open-cluster-management.io.yaml", &placementDecisionLost); err != nil { + return nil, err + } + for idx := range placementDecisionLost.Items { + r.placementDecisions = append(r.placementDecisions, &placementDecisionLost.Items[idx]) } inventories := []typear.InventoryItem{} @@ -264,6 +275,13 @@ func (r *ResultToOscal) GenerateReasonsFromRawPolicies(policy typepolicy.Policy) } +func (r *ResultToOscal) loadData(path string, out interface{}) error { + if err := pkg.LoadYamlFileToK8sTypedObject(r.c2pParsed.PolicyResultsDir+path, &out); err != nil { + return err + } + return nil +} + func mapToRuleStatus(complianceState typepolicy.ComplianceState) typereport.RuleStatus { switch complianceState { case typepolicy.Compliant: @@ -276,50 +294,3 @@ func mapToRuleStatus(complianceState typepolicy.ComplianceState) typereport.Rule return typereport.RuleStatusError } } - -func genTraverseFunc(onPolicy func(typepolicy.Policy), onPolicySet func(typepolicy.PolicySet), onPlacementDesicion func(typeplacementdecision.PlacementDecision)) func(path string, info os.FileInfo, err error) error { - return func(path string, info os.FileInfo, err error) error { - if err != nil { - return err - } - if !info.IsDir() { - kind, _, _, ok := parseFileName(info.Name()) - if ok { - switch kind { - case "Policy": - var policy typepolicy.Policy - if err := pkg.LoadYamlFileToK8sTypedObject(path, &policy); err != nil { - return err - } - onPolicy(policy) - case "PolicySet": - var policySet typepolicy.PolicySet - if err := pkg.LoadYamlFileToK8sTypedObject(path, &policySet); err != nil { - return err - } - onPolicySet(policySet) - case "PlacementDecision": - var placementDecision typeplacementdecision.PlacementDecision - if err := pkg.LoadYamlFileToK8sTypedObject(path, &placementDecision); err != nil { - return err - } - onPlacementDesicion(placementDecision) - } - } - } - return nil - } -} - -func parseFileName(fname string) (kind string, namespace string, name string, ok bool) { - splitted := strings.Split(fname, ".") - if len(splitted) >= 4 { - kind = splitted[0] - namespace = splitted[1] - name = strings.Join(splitted[2:len(splitted)-2], ".") - ok = true - } else { - ok = false - } - return -} diff --git a/pkg/testdata/ocm/policy-results/PlacementDecision.c2p.placement-managed-kubernetes-decision-1.yml b/pkg/testdata/ocm/policy-results/PlacementDecision.c2p.placement-managed-kubernetes-decision-1.yml deleted file mode 100644 index 841913a..0000000 --- a/pkg/testdata/ocm/policy-results/PlacementDecision.c2p.placement-managed-kubernetes-decision-1.yml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: cluster.open-cluster-management.io/v1beta1 -kind: PlacementDecision -metadata: - creationTimestamp: "2023-07-05T16:10:56Z" - generation: 1 - labels: - cluster.open-cluster-management.io/placement: placement-managed-kubernetes - name: placement-managed-kubernetes-decision-1 - namespace: c2p - ownerReferences: - - apiVersion: cluster.open-cluster-management.io/v1beta1 - blockOwnerDeletion: true - controller: true - kind: Placement - name: placement-managed-kubernetes - uid: fb698906-ffbc-4483-afc1-e87cd6048858 - resourceVersion: "127345" - uid: 78e9e593-8ca7-48f2-86af-0306238cdedc -status: - decisions: - - clusterName: cluster1 - reason: "" - - clusterName: cluster2 - reason: "" diff --git a/pkg/testdata/ocm/policy-results/Policy.c2p.policy-deployment.yml b/pkg/testdata/ocm/policy-results/Policy.c2p.policy-deployment.yml deleted file mode 100644 index a46f33d..0000000 --- a/pkg/testdata/ocm/policy-results/Policy.c2p.policy-deployment.yml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: policy.open-cluster-management.io/v1 -kind: Policy -metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"policy.open-cluster-management.io/v1","kind":"Policy","metadata":{"annotations":{"policy.open-cluster-management.io/categories":"","policy.open-cluster-management.io/controls":"cm-2","policy.open-cluster-management.io/standards":""},"name":"policy-deployment","namespace":"c2p"},"spec":{"disabled":false,"policy-templates":[{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-deployment"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"musthave","objectDefinition":{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"labels":{"app":"nginx"},"name":"nginx-deployment"},"spec":{"replicas":3,"selector":{"matchLabels":{"app":"nginx"}},"template":{"metadata":{"labels":{"app":"nginx"}},"spec":{"containers":[{"image":"nginx:1.21.4","name":"nginx","ports":[{"containerPort":80}]}]}}}}}],"remediationAction":"inform","severity":"low"}}}],"remediationAction":"inform"}} - policy.open-cluster-management.io/categories: "" - policy.open-cluster-management.io/controls: cm-2 - policy.open-cluster-management.io/standards: "" - creationTimestamp: "2023-07-05T16:10:56Z" - generation: 2 - name: policy-deployment - namespace: c2p - resourceVersion: "58942" - uid: 55fb6d11-cdf5-43a6-8848-7076ea3c02ba -spec: - disabled: false - policy-templates: - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-deployment - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: musthave - objectDefinition: - apiVersion: apps/v1 - kind: Deployment - metadata: - labels: - app: nginx - name: nginx-deployment - spec: - replicas: 3 - selector: - matchLabels: - app: nginx - template: - metadata: - labels: - app: nginx - spec: - containers: - - image: nginx:1.21.4 - name: nginx - ports: - - containerPort: 80 - remediationAction: inform - severity: low - remediationAction: inform -status: - compliant: NonCompliant - placement: - - placement: placement-managed-kubernetes - placementBinding: policy-set - policySet: managed-kubernetes - status: - - clustername: cluster1 - clusternamespace: cluster1 - compliant: NonCompliant - - clustername: cluster2 - clusternamespace: cluster2 - compliant: NonCompliant diff --git a/pkg/testdata/ocm/policy-results/Policy.c2p.policy-disallowed-roles.yml b/pkg/testdata/ocm/policy-results/Policy.c2p.policy-disallowed-roles.yml deleted file mode 100644 index 4a5b446..0000000 --- a/pkg/testdata/ocm/policy-results/Policy.c2p.policy-disallowed-roles.yml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: policy.open-cluster-management.io/v1 -kind: Policy -metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"policy.open-cluster-management.io/v1","kind":"Policy","metadata":{"annotations":{"policy.open-cluster-management.io/categories":"","policy.open-cluster-management.io/controls":"ac-6","policy.open-cluster-management.io/standards":""},"name":"policy-disallowed-roles","namespace":"c2p"},"spec":{"disabled":false,"policy-templates":[{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-disallowed-roles"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"mustnothave","objectDefinition":{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"Role","rules":[{"apiGroups":["*"],"resources":["*"],"verbs":["*"]}]}}],"remediationAction":"inform","severity":"high"}}}],"remediationAction":"inform"}} - policy.open-cluster-management.io/categories: "" - policy.open-cluster-management.io/controls: ac-6 - policy.open-cluster-management.io/standards: "" - creationTimestamp: "2023-07-05T16:10:56Z" - generation: 2 - name: policy-disallowed-roles - namespace: c2p - resourceVersion: "58945" - uid: 3aa8b4b0-6aa0-4635-a55d-342a9f38660e -spec: - disabled: false - policy-templates: - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-disallowed-roles - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: mustnothave - objectDefinition: - apiVersion: rbac.authorization.k8s.io/v1 - kind: Role - rules: - - apiGroups: - - '*' - resources: - - '*' - verbs: - - '*' - remediationAction: inform - severity: high - remediationAction: inform -status: - compliant: Compliant - placement: - - placement: placement-managed-kubernetes - placementBinding: policy-set - policySet: managed-kubernetes - status: - - clustername: cluster1 - clusternamespace: cluster1 - compliant: Compliant - - clustername: cluster2 - clusternamespace: cluster2 - compliant: Compliant diff --git a/pkg/testdata/ocm/policy-results/Policy.c2p.policy-high-scan.yml b/pkg/testdata/ocm/policy-results/Policy.c2p.policy-high-scan.yml deleted file mode 100644 index 1c76fe6..0000000 --- a/pkg/testdata/ocm/policy-results/Policy.c2p.policy-high-scan.yml +++ /dev/null @@ -1,119 +0,0 @@ -apiVersion: policy.open-cluster-management.io/v1 -kind: Policy -metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"policy.open-cluster-management.io/v1","kind":"Policy","metadata":{"annotations":{"policy.open-cluster-management.io/categories":"","policy.open-cluster-management.io/controls":"cm-6","policy.open-cluster-management.io/standards":""},"name":"policy-high-scan","namespace":"c2p"},"spec":{"disabled":false,"policy-templates":[{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-high-scan"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"musthave","objectDefinition":{"apiVersion":"compliance.openshift.io/v1alpha1","kind":"ScanSettingBinding","metadata":{"name":"high","namespace":"openshift-compliance"},"profiles":[{"apiGroup":"compliance.openshift.io/v1alpha1","kind":"Profile","name":"ocp4-high"},{"apiGroup":"compliance.openshift.io/v1alpha1","kind":"Profile","name":"ocp4-high-node"}],"settingsRef":{"apiGroup":"compliance.openshift.io/v1alpha1","kind":"ScanSetting","name":"default"}}}],"remediationAction":"inform","severity":"high"}}},{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-high-scan2"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"musthave","objectDefinition":{"apiVersion":"compliance.openshift.io/v1alpha1","kind":"ComplianceSuite","metadata":{"name":"high","namespace":"openshift-compliance"},"status":{"phase":"DONE"}}}],"remediationAction":"inform","severity":"high"}}},{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-high-scan3"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"mustnothave","objectDefinition":{"apiVersion":"compliance.openshift.io/v1alpha1","kind":"ComplianceCheckResult","metadata":{"labels":{"compliance.openshift.io/check-status":"FAIL","compliance.openshift.io/suite":"high"},"namespace":"openshift-compliance"}}}],"remediationAction":"inform","severity":"high"}}}],"remediationAction":"inform"}} - policy.open-cluster-management.io/categories: "" - policy.open-cluster-management.io/controls: cm-6 - policy.open-cluster-management.io/standards: "" - creationTimestamp: "2023-07-05T16:10:56Z" - generation: 2 - name: policy-high-scan - namespace: c2p - resourceVersion: "58952" - uid: 1e829f28-a2e6-4b5b-9b58-d18c11730841 -spec: - disabled: false - policy-templates: - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-high-scan - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: musthave - objectDefinition: - apiVersion: compliance.openshift.io/v1alpha1 - kind: ScanSettingBinding - metadata: - name: high - namespace: openshift-compliance - profiles: - - apiGroup: compliance.openshift.io/v1alpha1 - kind: Profile - name: ocp4-high - - apiGroup: compliance.openshift.io/v1alpha1 - kind: Profile - name: ocp4-high-node - settingsRef: - apiGroup: compliance.openshift.io/v1alpha1 - kind: ScanSetting - name: default - remediationAction: inform - severity: high - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-high-scan2 - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: musthave - objectDefinition: - apiVersion: compliance.openshift.io/v1alpha1 - kind: ComplianceSuite - metadata: - name: high - namespace: openshift-compliance - status: - phase: DONE - remediationAction: inform - severity: high - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-high-scan3 - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: mustnothave - objectDefinition: - apiVersion: compliance.openshift.io/v1alpha1 - kind: ComplianceCheckResult - metadata: - labels: - compliance.openshift.io/check-status: FAIL - compliance.openshift.io/suite: high - namespace: openshift-compliance - remediationAction: inform - severity: high - remediationAction: inform -status: - compliant: NonCompliant - placement: - - placement: placement-managed-kubernetes - placementBinding: policy-set - policySet: managed-kubernetes - status: - - clustername: cluster1 - clusternamespace: cluster1 - compliant: NonCompliant - - clustername: cluster2 - clusternamespace: cluster2 - compliant: NonCompliant diff --git a/pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-deployment.yml b/pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-deployment.yml deleted file mode 100644 index 76a31bd..0000000 --- a/pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-deployment.yml +++ /dev/null @@ -1,80 +0,0 @@ -apiVersion: policy.open-cluster-management.io/v1 -kind: Policy -metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"policy.open-cluster-management.io/v1","kind":"Policy","metadata":{"annotations":{"policy.open-cluster-management.io/categories":"","policy.open-cluster-management.io/controls":"cm-2","policy.open-cluster-management.io/standards":""},"name":"policy-deployment","namespace":"c2p"},"spec":{"disabled":false,"policy-templates":[{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-deployment"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"musthave","objectDefinition":{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"labels":{"app":"nginx"},"name":"nginx-deployment"},"spec":{"replicas":3,"selector":{"matchLabels":{"app":"nginx"}},"template":{"metadata":{"labels":{"app":"nginx"}},"spec":{"containers":[{"image":"nginx:1.21.4","name":"nginx","ports":[{"containerPort":80}]}]}}}}}],"remediationAction":"inform","severity":"low"}}}],"remediationAction":"inform"}} - policy.open-cluster-management.io/categories: "" - policy.open-cluster-management.io/controls: cm-2 - policy.open-cluster-management.io/standards: "" - creationTimestamp: "2023-07-05T23:52:32Z" - generation: 1 - labels: - policy.open-cluster-management.io/cluster-name: cluster1 - policy.open-cluster-management.io/cluster-namespace: cluster1 - policy.open-cluster-management.io/root-policy: c2p.policy-deployment - name: c2p.policy-deployment - namespace: cluster1 - resourceVersion: "58997" - uid: 3d7bf6b3-4332-4195-81b4-d343a847c3f8 -spec: - disabled: false - policy-templates: - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-deployment - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: musthave - objectDefinition: - apiVersion: apps/v1 - kind: Deployment - metadata: - labels: - app: nginx - name: nginx-deployment - spec: - replicas: 3 - selector: - matchLabels: - app: nginx - template: - metadata: - labels: - app: nginx - spec: - containers: - - image: nginx:1.21.4 - name: nginx - ports: - - containerPort: 80 - remediationAction: inform - severity: low - remediationAction: inform -status: - compliant: NonCompliant - details: - - compliant: NonCompliant - history: - - eventName: c2p.policy-deployment.176f1ddc5591cb1c - lastTimestamp: "2023-07-05T23:53:37Z" - message: 'NonCompliant; violation - deployments not found: [nginx-deployment] in namespace cluster1 missing; [nginx-deployment] in namespace kube-node-lease missing; [nginx-deployment] in namespace kube-public missing; [nginx-deployment] in namespace local-path-storage missing' - - eventName: c2p.policy-deployment.176f1dc090333b1b - lastTimestamp: "2023-07-05T23:51:38Z" - message: 'NonCompliant; violation - deployments not found: [nginx-deployment] in namespace cluster1 missing; [nginx-deployment] in namespace kube-node-lease missing; [nginx-deployment] in namespace kube-public missing; [nginx-deployment] in namespace local-path-storage missing' - - eventName: c2p.policy-deployment.176f1bee3daf20de - lastTimestamp: "2023-07-05T23:18:15Z" - message: 'NonCompliant; violation - deployments not found: [nginx-deployment] in namespace cluster1 missing; [nginx-deployment] in namespace kube-node-lease missing; [nginx-deployment] in namespace kube-public missing; [nginx-deployment] in namespace local-path-storage missing' - templateMeta: - creationTimestamp: null - name: policy-deployment diff --git a/pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-disallowed-roles.yml b/pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-disallowed-roles.yml deleted file mode 100644 index 8961127..0000000 --- a/pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-disallowed-roles.yml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: policy.open-cluster-management.io/v1 -kind: Policy -metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"policy.open-cluster-management.io/v1","kind":"Policy","metadata":{"annotations":{"policy.open-cluster-management.io/categories":"","policy.open-cluster-management.io/controls":"ac-6","policy.open-cluster-management.io/standards":""},"name":"policy-disallowed-roles","namespace":"c2p"},"spec":{"disabled":false,"policy-templates":[{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-disallowed-roles"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"mustnothave","objectDefinition":{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"Role","rules":[{"apiGroups":["*"],"resources":["*"],"verbs":["*"]}]}}],"remediationAction":"inform","severity":"high"}}}],"remediationAction":"inform"}} - policy.open-cluster-management.io/categories: "" - policy.open-cluster-management.io/controls: ac-6 - policy.open-cluster-management.io/standards: "" - creationTimestamp: "2023-07-05T23:52:32Z" - generation: 1 - labels: - policy.open-cluster-management.io/cluster-name: cluster1 - policy.open-cluster-management.io/cluster-namespace: cluster1 - policy.open-cluster-management.io/root-policy: c2p.policy-disallowed-roles - name: c2p.policy-disallowed-roles - namespace: cluster1 - resourceVersion: "58962" - uid: dea67078-25f4-4c45-9e55-01796af1999e -spec: - disabled: false - policy-templates: - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-disallowed-roles - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: mustnothave - objectDefinition: - apiVersion: rbac.authorization.k8s.io/v1 - kind: Role - rules: - - apiGroups: - - '*' - resources: - - '*' - verbs: - - '*' - remediationAction: inform - severity: high - remediationAction: inform -status: - compliant: Compliant - details: - - compliant: Compliant - history: - - eventName: c2p.policy-disallowed-roles.176f1dcdc4c8d17e - lastTimestamp: "2023-07-05T23:52:34Z" - message: Compliant; notification - roles in namespace cluster1; in namespace default; in namespace kube-node-lease; in namespace kube-public; in namespace local-path-storage missing as expected, therefore this Object template is compliant - - eventName: c2p.policy-disallowed-roles.176f1cd7a1623786 - lastTimestamp: "2023-07-05T23:34:57Z" - message: Compliant; notification - roles in namespace cluster1; in namespace default; in namespace kube-node-lease; in namespace kube-public; in namespace local-path-storage missing as expected, therefore this Object template is compliant - - eventName: c2p.policy-disallowed-roles.176f1bee3d61b1f3 - lastTimestamp: "2023-07-05T23:18:15Z" - message: Compliant; notification - roles in namespace cluster1; in namespace default; in namespace kube-node-lease; in namespace kube-public; in namespace local-path-storage missing as expected, therefore this Object template is compliant - templateMeta: - creationTimestamp: null - name: policy-disallowed-roles diff --git a/pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-high-scan.yml b/pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-high-scan.yml deleted file mode 100644 index d51355b..0000000 --- a/pkg/testdata/ocm/policy-results/Policy.cluster1.c2p.policy-high-scan.yml +++ /dev/null @@ -1,155 +0,0 @@ -apiVersion: policy.open-cluster-management.io/v1 -kind: Policy -metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"policy.open-cluster-management.io/v1","kind":"Policy","metadata":{"annotations":{"policy.open-cluster-management.io/categories":"","policy.open-cluster-management.io/controls":"cm-6","policy.open-cluster-management.io/standards":""},"name":"policy-high-scan","namespace":"c2p"},"spec":{"disabled":false,"policy-templates":[{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-high-scan"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"musthave","objectDefinition":{"apiVersion":"compliance.openshift.io/v1alpha1","kind":"ScanSettingBinding","metadata":{"name":"high","namespace":"openshift-compliance"},"profiles":[{"apiGroup":"compliance.openshift.io/v1alpha1","kind":"Profile","name":"ocp4-high"},{"apiGroup":"compliance.openshift.io/v1alpha1","kind":"Profile","name":"ocp4-high-node"}],"settingsRef":{"apiGroup":"compliance.openshift.io/v1alpha1","kind":"ScanSetting","name":"default"}}}],"remediationAction":"inform","severity":"high"}}},{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-high-scan2"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"musthave","objectDefinition":{"apiVersion":"compliance.openshift.io/v1alpha1","kind":"ComplianceSuite","metadata":{"name":"high","namespace":"openshift-compliance"},"status":{"phase":"DONE"}}}],"remediationAction":"inform","severity":"high"}}},{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-high-scan3"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"mustnothave","objectDefinition":{"apiVersion":"compliance.openshift.io/v1alpha1","kind":"ComplianceCheckResult","metadata":{"labels":{"compliance.openshift.io/check-status":"FAIL","compliance.openshift.io/suite":"high"},"namespace":"openshift-compliance"}}}],"remediationAction":"inform","severity":"high"}}}],"remediationAction":"inform"}} - policy.open-cluster-management.io/categories: "" - policy.open-cluster-management.io/controls: cm-6 - policy.open-cluster-management.io/standards: "" - creationTimestamp: "2023-07-05T23:52:32Z" - generation: 1 - labels: - policy.open-cluster-management.io/cluster-name: cluster1 - policy.open-cluster-management.io/cluster-namespace: cluster1 - policy.open-cluster-management.io/root-policy: c2p.policy-high-scan - name: c2p.policy-high-scan - namespace: cluster1 - resourceVersion: "58991" - uid: 4007f281-2977-42c4-ab42-cf0fb8563f56 -spec: - disabled: false - policy-templates: - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-high-scan - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: musthave - objectDefinition: - apiVersion: compliance.openshift.io/v1alpha1 - kind: ScanSettingBinding - metadata: - name: high - namespace: openshift-compliance - profiles: - - apiGroup: compliance.openshift.io/v1alpha1 - kind: Profile - name: ocp4-high - - apiGroup: compliance.openshift.io/v1alpha1 - kind: Profile - name: ocp4-high-node - settingsRef: - apiGroup: compliance.openshift.io/v1alpha1 - kind: ScanSetting - name: default - remediationAction: inform - severity: high - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-high-scan2 - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: musthave - objectDefinition: - apiVersion: compliance.openshift.io/v1alpha1 - kind: ComplianceSuite - metadata: - name: high - namespace: openshift-compliance - status: - phase: DONE - remediationAction: inform - severity: high - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-high-scan3 - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: mustnothave - objectDefinition: - apiVersion: compliance.openshift.io/v1alpha1 - kind: ComplianceCheckResult - metadata: - labels: - compliance.openshift.io/check-status: FAIL - compliance.openshift.io/suite: high - namespace: openshift-compliance - remediationAction: inform - severity: high - remediationAction: inform -status: - compliant: NonCompliant - details: - - compliant: NonCompliant - history: - - eventName: c2p.policy-high-scan.176f1dcdc2b51b01 - lastTimestamp: "2023-07-05T23:52:34Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding, please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1cd79ed5ce45 - lastTimestamp: "2023-07-05T23:34:57Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding, please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1bef5d9a8c7c - lastTimestamp: "2023-07-05T23:18:20Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding, please check if you have CRD deployed - templateMeta: - creationTimestamp: null - name: policy-high-scan - - compliant: NonCompliant - history: - - eventName: c2p.policy-high-scan.176f1ddc44adf035 - lastTimestamp: "2023-07-05T23:53:37Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite, please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1dc08583a394 - lastTimestamp: "2023-07-05T23:51:37Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite, please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1bef5e40c973 - lastTimestamp: "2023-07-05T23:18:20Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite, please check if you have CRD deployed - templateMeta: - creationTimestamp: null - name: policy-high-scan2 - - compliant: NonCompliant - history: - - eventName: c2p.policy-high-scan.176f1ddc441457e5 - lastTimestamp: "2023-07-05T23:53:37Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult, please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1dc085241b09 - lastTimestamp: "2023-07-05T23:51:37Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult, please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1bf01c04e351 - lastTimestamp: "2023-07-05T23:18:23Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult, please check if you have CRD deployed - templateMeta: - creationTimestamp: null - name: policy-high-scan3 diff --git a/pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-deployment.yml b/pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-deployment.yml deleted file mode 100644 index bacc5ec..0000000 --- a/pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-deployment.yml +++ /dev/null @@ -1,80 +0,0 @@ -apiVersion: policy.open-cluster-management.io/v1 -kind: Policy -metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"policy.open-cluster-management.io/v1","kind":"Policy","metadata":{"annotations":{"policy.open-cluster-management.io/categories":"","policy.open-cluster-management.io/controls":"cm-2","policy.open-cluster-management.io/standards":""},"name":"policy-deployment","namespace":"c2p"},"spec":{"disabled":false,"policy-templates":[{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-deployment"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"musthave","objectDefinition":{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"labels":{"app":"nginx"},"name":"nginx-deployment"},"spec":{"replicas":3,"selector":{"matchLabels":{"app":"nginx"}},"template":{"metadata":{"labels":{"app":"nginx"}},"spec":{"containers":[{"image":"nginx:1.21.4","name":"nginx","ports":[{"containerPort":80}]}]}}}}}],"remediationAction":"inform","severity":"low"}}}],"remediationAction":"inform"}} - policy.open-cluster-management.io/categories: "" - policy.open-cluster-management.io/controls: cm-2 - policy.open-cluster-management.io/standards: "" - creationTimestamp: "2023-07-05T23:51:43Z" - generation: 1 - labels: - policy.open-cluster-management.io/cluster-name: cluster2 - policy.open-cluster-management.io/cluster-namespace: cluster2 - policy.open-cluster-management.io/root-policy: c2p.policy-deployment - name: c2p.policy-deployment - namespace: cluster2 - resourceVersion: "58322" - uid: 25080d0e-e6cf-4f39-94cb-04a7d01d6cfe -spec: - disabled: false - policy-templates: - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-deployment - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: musthave - objectDefinition: - apiVersion: apps/v1 - kind: Deployment - metadata: - labels: - app: nginx - name: nginx-deployment - spec: - replicas: 3 - selector: - matchLabels: - app: nginx - template: - metadata: - labels: - app: nginx - spec: - containers: - - image: nginx:1.21.4 - name: nginx - ports: - - containerPort: 80 - remediationAction: inform - severity: low - remediationAction: inform -status: - compliant: NonCompliant - details: - - compliant: NonCompliant - history: - - eventName: c2p.policy-deployment.176f1dc4e7de17cb - lastTimestamp: "2023-07-05T23:51:56Z" - message: 'NonCompliant; violation - deployments not found: [nginx-deployment] in namespace cluster2 missing; [nginx-deployment] in namespace default missing; [nginx-deployment] in namespace kube-node-lease missing; [nginx-deployment] in namespace kube-public missing; [nginx-deployment] in namespace local-path-storage missing' - - eventName: c2p.policy-deployment.176f1bf28b594e3c - lastTimestamp: "2023-07-05T23:18:33Z" - message: 'NonCompliant; violation - deployments not found: [nginx-deployment] in namespace cluster2 missing; [nginx-deployment] in namespace default missing; [nginx-deployment] in namespace kube-node-lease missing; [nginx-deployment] in namespace kube-public missing; [nginx-deployment] in namespace local-path-storage missing' - - eventName: c2p.policy-deployment.176f1bf06f3be6c5 - lastTimestamp: "2023-07-05T23:18:24Z" - message: 'NonCompliant; violation - deployments not found: [nginx-deployment] in namespace cluster2 missing; [nginx-deployment] in namespace default missing; [nginx-deployment] in namespace kube-node-lease missing; [nginx-deployment] in namespace kube-public missing; [nginx-deployment] in namespace local-path-storage missing' - templateMeta: - creationTimestamp: null - name: policy-deployment diff --git a/pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-disallowed-roles.yml b/pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-disallowed-roles.yml deleted file mode 100644 index 901fc6a..0000000 --- a/pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-disallowed-roles.yml +++ /dev/null @@ -1,65 +0,0 @@ -apiVersion: policy.open-cluster-management.io/v1 -kind: Policy -metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"policy.open-cluster-management.io/v1","kind":"Policy","metadata":{"annotations":{"policy.open-cluster-management.io/categories":"","policy.open-cluster-management.io/controls":"ac-6","policy.open-cluster-management.io/standards":""},"name":"policy-disallowed-roles","namespace":"c2p"},"spec":{"disabled":false,"policy-templates":[{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-disallowed-roles"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"mustnothave","objectDefinition":{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"Role","rules":[{"apiGroups":["*"],"resources":["*"],"verbs":["*"]}]}}],"remediationAction":"inform","severity":"high"}}}],"remediationAction":"inform"}} - policy.open-cluster-management.io/categories: "" - policy.open-cluster-management.io/controls: ac-6 - policy.open-cluster-management.io/standards: "" - creationTimestamp: "2023-07-05T23:51:43Z" - generation: 1 - labels: - policy.open-cluster-management.io/cluster-name: cluster2 - policy.open-cluster-management.io/cluster-namespace: cluster2 - policy.open-cluster-management.io/root-policy: c2p.policy-disallowed-roles - name: c2p.policy-disallowed-roles - namespace: cluster2 - resourceVersion: "58171" - uid: fb2bed28-f7be-4ad3-9df2-00f26600feb7 -spec: - disabled: false - policy-templates: - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-disallowed-roles - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: mustnothave - objectDefinition: - apiVersion: rbac.authorization.k8s.io/v1 - kind: Role - rules: - - apiGroups: - - '*' - resources: - - '*' - verbs: - - '*' - remediationAction: inform - severity: high - remediationAction: inform -status: - compliant: Compliant - details: - - compliant: Compliant - history: - - eventName: c2p.policy-disallowed-roles.176f1dc36e36b7b2 - lastTimestamp: "2023-07-05T23:51:50Z" - message: Compliant; notification - roles in namespace cluster2; in namespace default; in namespace kube-node-lease; in namespace kube-public; in namespace local-path-storage missing as expected, therefore this Object template is compliant - - eventName: c2p.policy-disallowed-roles.176f1bf28b48947f - lastTimestamp: "2023-07-05T23:18:33Z" - message: Compliant; notification - roles in namespace cluster2; in namespace default; in namespace kube-node-lease; in namespace kube-public; in namespace local-path-storage missing as expected, therefore this Object template is compliant - templateMeta: - creationTimestamp: null - name: policy-disallowed-roles diff --git a/pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-high-scan.yml b/pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-high-scan.yml deleted file mode 100644 index 913e48d..0000000 --- a/pkg/testdata/ocm/policy-results/Policy.cluster2.c2p.policy-high-scan.yml +++ /dev/null @@ -1,146 +0,0 @@ -apiVersion: policy.open-cluster-management.io/v1 -kind: Policy -metadata: - annotations: - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"policy.open-cluster-management.io/v1","kind":"Policy","metadata":{"annotations":{"policy.open-cluster-management.io/categories":"","policy.open-cluster-management.io/controls":"cm-6","policy.open-cluster-management.io/standards":""},"name":"policy-high-scan","namespace":"c2p"},"spec":{"disabled":false,"policy-templates":[{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-high-scan"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"musthave","objectDefinition":{"apiVersion":"compliance.openshift.io/v1alpha1","kind":"ScanSettingBinding","metadata":{"name":"high","namespace":"openshift-compliance"},"profiles":[{"apiGroup":"compliance.openshift.io/v1alpha1","kind":"Profile","name":"ocp4-high"},{"apiGroup":"compliance.openshift.io/v1alpha1","kind":"Profile","name":"ocp4-high-node"}],"settingsRef":{"apiGroup":"compliance.openshift.io/v1alpha1","kind":"ScanSetting","name":"default"}}}],"remediationAction":"inform","severity":"high"}}},{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-high-scan2"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"musthave","objectDefinition":{"apiVersion":"compliance.openshift.io/v1alpha1","kind":"ComplianceSuite","metadata":{"name":"high","namespace":"openshift-compliance"},"status":{"phase":"DONE"}}}],"remediationAction":"inform","severity":"high"}}},{"objectDefinition":{"apiVersion":"policy.open-cluster-management.io/v1","kind":"ConfigurationPolicy","metadata":{"name":"policy-high-scan3"},"spec":{"namespaceSelector":{"exclude":["kube-system","open-cluster-management","open-cluster-management-agent","open-cluster-management-agent-addon"],"include":["*"]},"object-templates":[{"complianceType":"mustnothave","objectDefinition":{"apiVersion":"compliance.openshift.io/v1alpha1","kind":"ComplianceCheckResult","metadata":{"labels":{"compliance.openshift.io/check-status":"FAIL","compliance.openshift.io/suite":"high"},"namespace":"openshift-compliance"}}}],"remediationAction":"inform","severity":"high"}}}],"remediationAction":"inform"}} - policy.open-cluster-management.io/categories: "" - policy.open-cluster-management.io/controls: cm-6 - policy.open-cluster-management.io/standards: "" - creationTimestamp: "2023-07-05T23:51:43Z" - generation: 1 - labels: - policy.open-cluster-management.io/cluster-name: cluster2 - policy.open-cluster-management.io/cluster-namespace: cluster2 - policy.open-cluster-management.io/root-policy: c2p.policy-high-scan - name: c2p.policy-high-scan - namespace: cluster2 - resourceVersion: "58319" - uid: 38eb6af4-5b3f-4a8b-aa1b-f066cd7a3ed8 -spec: - disabled: false - policy-templates: - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-high-scan - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: musthave - objectDefinition: - apiVersion: compliance.openshift.io/v1alpha1 - kind: ScanSettingBinding - metadata: - name: high - namespace: openshift-compliance - profiles: - - apiGroup: compliance.openshift.io/v1alpha1 - kind: Profile - name: ocp4-high - - apiGroup: compliance.openshift.io/v1alpha1 - kind: Profile - name: ocp4-high-node - settingsRef: - apiGroup: compliance.openshift.io/v1alpha1 - kind: ScanSetting - name: default - remediationAction: inform - severity: high - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-high-scan2 - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: musthave - objectDefinition: - apiVersion: compliance.openshift.io/v1alpha1 - kind: ComplianceSuite - metadata: - name: high - namespace: openshift-compliance - status: - phase: DONE - remediationAction: inform - severity: high - - objectDefinition: - apiVersion: policy.open-cluster-management.io/v1 - kind: ConfigurationPolicy - metadata: - name: policy-high-scan3 - spec: - namespaceSelector: - exclude: - - kube-system - - open-cluster-management - - open-cluster-management-agent - - open-cluster-management-agent-addon - include: - - '*' - object-templates: - - complianceType: mustnothave - objectDefinition: - apiVersion: compliance.openshift.io/v1alpha1 - kind: ComplianceCheckResult - metadata: - labels: - compliance.openshift.io/check-status: FAIL - compliance.openshift.io/suite: high - namespace: openshift-compliance - remediationAction: inform - severity: high - remediationAction: inform -status: - compliant: NonCompliant - details: - - compliant: NonCompliant - history: - - eventName: c2p.policy-high-scan.176f1dc3684f9eb6 - lastTimestamp: "2023-07-05T23:51:50Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding, please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1ccd9a7768a0 - lastTimestamp: "2023-07-05T23:34:14Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding, please check if you have CRD deployed - templateMeta: - creationTimestamp: null - name: policy-high-scan - - compliant: NonCompliant - history: - - eventName: c2p.policy-high-scan.176f1dc426d20948 - lastTimestamp: "2023-07-05T23:51:53Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite, please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1ccd9a7af3da - lastTimestamp: "2023-07-05T23:34:14Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite, please check if you have CRD deployed - templateMeta: - creationTimestamp: null - name: policy-high-scan2 - - compliant: NonCompliant - history: - - eventName: c2p.policy-high-scan.176f1dc4e29e1221 - lastTimestamp: "2023-07-05T23:51:56Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult, please check if you have CRD deployed - - eventName: c2p.policy-high-scan.176f1cce592bc71e - lastTimestamp: "2023-07-05T23:34:17Z" - message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult, please check if you have CRD deployed - templateMeta: - creationTimestamp: null - name: policy-high-scan3 diff --git a/pkg/testdata/ocm/policy-results/PolicySet.c2p.managed-kubernetes.yml b/pkg/testdata/ocm/policy-results/PolicySet.c2p.managed-kubernetes.yml deleted file mode 100644 index 09b2109..0000000 --- a/pkg/testdata/ocm/policy-results/PolicySet.c2p.managed-kubernetes.yml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: policy.open-cluster-management.io/v1beta1 -kind: PolicySet -metadata: - annotations: - compliance-to-policy.component-title: Managed Kubernetes - kubectl.kubernetes.io/last-applied-configuration: | - {"apiVersion":"policy.open-cluster-management.io/v1beta1","kind":"PolicySet","metadata":{"annotations":{"compliance-to-policy.component-title":"Managed Kubernetes"},"name":"managed-kubernetes","namespace":"c2p"},"spec":{"description":"","policies":["policy-deployment","policy-disallowed-roles","policy-high-scan"]}} - creationTimestamp: "2023-07-05T16:10:56Z" - generation: 1 - name: managed-kubernetes - namespace: c2p - resourceVersion: "80787" - uid: 1ac57f03-4782-4ef8-8b65-08384e36971f -spec: - description: "" - policies: - - policy-deployment - - policy-disallowed-roles - - policy-high-scan -status: - compliant: NonCompliant - placement: - - placement: placement-managed-kubernetes - placementBinding: policy-set - statusMessage: All policies are reporting status diff --git a/pkg/testdata/ocm/policy-results/00.placementdecisions.yaml b/pkg/testdata/ocm/policy-results/placementdecisions.cluster.open-cluster-management.io.yaml similarity index 100% rename from pkg/testdata/ocm/policy-results/00.placementdecisions.yaml rename to pkg/testdata/ocm/policy-results/placementdecisions.cluster.open-cluster-management.io.yaml diff --git a/pkg/testdata/ocm/policy-results/00.policies.yaml b/pkg/testdata/ocm/policy-results/policies.policy.open-cluster-management.io.yaml similarity index 100% rename from pkg/testdata/ocm/policy-results/00.policies.yaml rename to pkg/testdata/ocm/policy-results/policies.policy.open-cluster-management.io.yaml diff --git a/pkg/testdata/ocm/policy-results/00.policysets.yaml b/pkg/testdata/ocm/policy-results/policysets.policy.open-cluster-management.io.yaml similarity index 100% rename from pkg/testdata/ocm/policy-results/00.policysets.yaml rename to pkg/testdata/ocm/policy-results/policysets.policy.open-cluster-management.io.yaml diff --git a/pkg/types/policy/policyset_types.go b/pkg/types/policy/policyset_types.go index 21eda2e..83a126b 100644 --- a/pkg/types/policy/policyset_types.go +++ b/pkg/types/policy/policyset_types.go @@ -58,3 +58,10 @@ type PolicySet struct { Spec PolicySetSpec `json:"spec"` Status PolicySetStatus `json:"status,omitempty"` } + +// PolicySetList contains a list of PolicySet +type PolicySetList struct { + metav1.TypeMeta `json:",inline"` + metav1.ListMeta `json:"metadata,omitempty"` + Items []PolicySet `json:"items"` +} From 882baa53abaa46b4fbd3504a63963eba1874f4e4 Mon Sep 17 00:00:00 2001 From: Takumi Yanagawa Date: Tue, 5 Dec 2023 19:57:15 +0900 Subject: [PATCH 06/13] -o option in result2oscal points output file instead of directory Signed-off-by: Takumi Yanagawa --- cmd/kyverno/result2oscal/cmd/cmd.go | 9 ++------- cmd/kyverno/result2oscal/options/options.go | 4 ++-- cmd/ocm/result2oscal/cmd/cmd.go | 11 +++-------- cmd/ocm/result2oscal/options/options.go | 4 ++-- 4 files changed, 9 insertions(+), 19 deletions(-) diff --git a/cmd/kyverno/result2oscal/cmd/cmd.go b/cmd/kyverno/result2oscal/cmd/cmd.go index 2cf4860..3024cd4 100644 --- a/cmd/kyverno/result2oscal/cmd/cmd.go +++ b/cmd/kyverno/result2oscal/cmd/cmd.go @@ -17,8 +17,6 @@ limitations under the License. package cmd import ( - "os" - "github.com/spf13/cobra" "github.com/IBM/compliance-to-policy/cmd/kyverno/result2oscal/options" @@ -51,10 +49,7 @@ func New() *cobra.Command { } func Run(options *options.Options) error { - outputDir, c2pcrPath, tempDirPath := options.OutputDir, options.C2PCRPath, options.TempDirPath - if err := os.MkdirAll(outputDir, os.ModePerm); err != nil { - panic(err) - } + outputPath, c2pcrPath, tempDirPath := options.OutputPath, options.C2PCRPath, options.TempDirPath var c2pcrSpec typec2pcr.Spec if err := pkg.LoadYamlFileToObject(c2pcrPath, &c2pcrSpec); err != nil { @@ -74,7 +69,7 @@ func Run(options *options.Options) error { return err } - err = pkg.WriteObjToJsonFile(outputDir+"/assessment-results.json", ar) + err = pkg.WriteObjToJsonFile(outputPath, ar) if err != nil { return err } diff --git a/cmd/kyverno/result2oscal/options/options.go b/cmd/kyverno/result2oscal/options/options.go index bbb31d5..333a2c5 100644 --- a/cmd/kyverno/result2oscal/options/options.go +++ b/cmd/kyverno/result2oscal/options/options.go @@ -25,7 +25,7 @@ import ( type Options struct { C2PCRPath string TempDirPath string - OutputDir string + OutputPath string } func NewOptions() *Options { @@ -35,7 +35,7 @@ func NewOptions() *Options { func (o *Options) AddFlags(fs *pflag.FlagSet) { fs.StringVarP(&o.C2PCRPath, "config", "c", "", "path to c2p-config.yaml") fs.StringVar(&o.TempDirPath, "temp-dir", "", "path to temp directory") - fs.StringVarP(&o.OutputDir, "out", "o", ".", "path to a directory for output files") + fs.StringVarP(&o.OutputPath, "out", "o", "./assessment-results.json", "path to output OSCAL Assessment Results") } func (o *Options) Complete() error { diff --git a/cmd/ocm/result2oscal/cmd/cmd.go b/cmd/ocm/result2oscal/cmd/cmd.go index 9c1b761..47ac5d9 100644 --- a/cmd/ocm/result2oscal/cmd/cmd.go +++ b/cmd/ocm/result2oscal/cmd/cmd.go @@ -17,8 +17,6 @@ limitations under the License. package cmd import ( - "os" - "github.com/spf13/cobra" "github.com/IBM/compliance-to-policy/cmd/ocm/result2oscal/options" @@ -52,10 +50,7 @@ func New() *cobra.Command { } func Run(options *options.Options) error { - outputDir, c2pcrPath, tempDirPath := options.OutputDir, options.C2PCRPath, options.TempDirPath - if err := os.MkdirAll(outputDir, os.ModePerm); err != nil { - panic(err) - } + outputPath, c2pcrPath, tempDirPath := options.OutputPath, options.C2PCRPath, options.TempDirPath var c2pcrSpec typec2pcr.Spec if err := pkg.LoadYamlFileToObject(c2pcrPath, &c2pcrSpec); err != nil { @@ -75,9 +70,9 @@ func Run(options *options.Options) error { panic(err) } - err = pkg.WriteObjToJsonFile(outputDir+"/assessment-results.json", arRoot) + err = pkg.WriteObjToJsonFile(outputPath, arRoot) if err != nil { - panic(err) + return err } return nil diff --git a/cmd/ocm/result2oscal/options/options.go b/cmd/ocm/result2oscal/options/options.go index 01ab6b3..9571886 100644 --- a/cmd/ocm/result2oscal/options/options.go +++ b/cmd/ocm/result2oscal/options/options.go @@ -25,7 +25,7 @@ import ( type Options struct { C2PCRPath string TempDirPath string - OutputDir string + OutputPath string } func NewOptions() *Options { @@ -35,7 +35,7 @@ func NewOptions() *Options { func (o *Options) AddFlags(fs *pflag.FlagSet) { fs.StringVarP(&o.C2PCRPath, "config", "c", "", "path to c2p config file") fs.StringVar(&o.TempDirPath, "temp-dir", "", "path to temp directory") - fs.StringVarP(&o.OutputDir, "out", "o", ".", "path to a directory for output files") + fs.StringVarP(&o.OutputPath, "out", "o", "./assessment-results.json", "path to output OSCAL Assessment Results") } func (o *Options) Complete() error { From 87450ea2c45134ee753996dca04987b296cc2db5 Mon Sep 17 00:00:00 2001 From: Takumi Yanagawa Date: Tue, 5 Dec 2023 20:01:54 +0900 Subject: [PATCH 07/13] consolidate c2p configfile parser in each pvp Signed-off-by: Takumi Yanagawa --- cmd/ocm/oscal2policy/cmd/cmd.go | 3 +-- cmd/ocm/result2oscal/cmd/cmd.go | 3 +-- pkg/kyverno/oscal2policy_test.go | 3 +-- pkg/{c2pcr/parser.go => ocm/configparser.go} | 5 +---- pkg/ocm/oscal2policy_test.go | 3 +-- pkg/ocm/result2oscal_test.go | 3 +-- 6 files changed, 6 insertions(+), 14 deletions(-) rename pkg/{c2pcr/parser.go => ocm/configparser.go} (97%) diff --git a/cmd/ocm/oscal2policy/cmd/cmd.go b/cmd/ocm/oscal2policy/cmd/cmd.go index 4984b91..c3df179 100644 --- a/cmd/ocm/oscal2policy/cmd/cmd.go +++ b/cmd/ocm/oscal2policy/cmd/cmd.go @@ -24,7 +24,6 @@ import ( "github.com/IBM/compliance-to-policy/cmd/ocm/oscal2policy/options" "github.com/IBM/compliance-to-policy/pkg" - "github.com/IBM/compliance-to-policy/pkg/c2pcr" "github.com/IBM/compliance-to-policy/pkg/ocm" typec2pcr "github.com/IBM/compliance-to-policy/pkg/types/c2pcr" ) @@ -63,7 +62,7 @@ func Run(options *options.Options) error { } gitUtils := pkg.NewGitUtils(pkg.NewTempDirectory(options.TempDirPath)) - c2pcrParser := c2pcr.NewParser(gitUtils) + c2pcrParser := ocm.NewParser(gitUtils) c2pcrParsed, err := c2pcrParser.Parse(c2pcrSpec) if err != nil { panic(err) diff --git a/cmd/ocm/result2oscal/cmd/cmd.go b/cmd/ocm/result2oscal/cmd/cmd.go index 47ac5d9..e0a50ca 100644 --- a/cmd/ocm/result2oscal/cmd/cmd.go +++ b/cmd/ocm/result2oscal/cmd/cmd.go @@ -21,7 +21,6 @@ import ( "github.com/IBM/compliance-to-policy/cmd/ocm/result2oscal/options" "github.com/IBM/compliance-to-policy/pkg" - "github.com/IBM/compliance-to-policy/pkg/c2pcr" "github.com/IBM/compliance-to-policy/pkg/ocm" typec2pcr "github.com/IBM/compliance-to-policy/pkg/types/c2pcr" ) @@ -58,7 +57,7 @@ func Run(options *options.Options) error { } gitUtils := pkg.NewGitUtils(pkg.NewTempDirectory(tempDirPath)) - c2pcrParser := c2pcr.NewParser(gitUtils) + c2pcrParser := ocm.NewParser(gitUtils) c2pcrParsed, err := c2pcrParser.Parse(c2pcrSpec) if err != nil { panic(err) diff --git a/pkg/kyverno/oscal2policy_test.go b/pkg/kyverno/oscal2policy_test.go index bedc8d9..f708fde 100644 --- a/pkg/kyverno/oscal2policy_test.go +++ b/pkg/kyverno/oscal2policy_test.go @@ -21,7 +21,6 @@ import ( "testing" "github.com/IBM/compliance-to-policy/pkg" - "github.com/IBM/compliance-to-policy/pkg/c2pcr" typec2pcr "github.com/IBM/compliance-to-policy/pkg/types/c2pcr" "github.com/stretchr/testify/assert" ) @@ -71,7 +70,7 @@ func TestOscal2Policy(t *testing.T) { Namespace: "", }, } - c2pcrParser := c2pcr.NewParser(gitUtils) + c2pcrParser := NewParser(gitUtils) c2pcrParsed, err := c2pcrParser.Parse(c2pcrSpec) assert.NoError(t, err, "Should not happen") diff --git a/pkg/c2pcr/parser.go b/pkg/ocm/configparser.go similarity index 97% rename from pkg/c2pcr/parser.go rename to pkg/ocm/configparser.go index a2c12dd..ec023aa 100644 --- a/pkg/c2pcr/parser.go +++ b/pkg/ocm/configparser.go @@ -14,7 +14,7 @@ See the License for the specific language governing permissions and limitations under the License. */ -package c2pcr +package ocm import ( "fmt" @@ -22,11 +22,8 @@ import ( "github.com/IBM/compliance-to-policy/pkg" "github.com/IBM/compliance-to-policy/pkg/oscal" "github.com/IBM/compliance-to-policy/pkg/types/c2pcr" - "go.uber.org/zap" ) -var logger *zap.Logger = pkg.GetLogger("c2pcr") - type C2PCRParser struct { gitUtils pkg.GitUtils } diff --git a/pkg/ocm/oscal2policy_test.go b/pkg/ocm/oscal2policy_test.go index 8b09b08..fc4a0ee 100644 --- a/pkg/ocm/oscal2policy_test.go +++ b/pkg/ocm/oscal2policy_test.go @@ -21,7 +21,6 @@ import ( "testing" "github.com/IBM/compliance-to-policy/pkg" - "github.com/IBM/compliance-to-policy/pkg/c2pcr" typec2pcr "github.com/IBM/compliance-to-policy/pkg/types/c2pcr" "github.com/stretchr/testify/assert" ) @@ -70,7 +69,7 @@ func TestOscal2Policy(t *testing.T) { Namespace: "", }, } - c2pcrParser := c2pcr.NewParser(gitUtils) + c2pcrParser := NewParser(gitUtils) c2pcrParsed, err := c2pcrParser.Parse(c2pcrSpec) assert.NoError(t, err, "Should not happen") diff --git a/pkg/ocm/result2oscal_test.go b/pkg/ocm/result2oscal_test.go index 20a06df..849b4a6 100644 --- a/pkg/ocm/result2oscal_test.go +++ b/pkg/ocm/result2oscal_test.go @@ -21,7 +21,6 @@ import ( "testing" "github.com/IBM/compliance-to-policy/pkg" - "github.com/IBM/compliance-to-policy/pkg/c2pcr" typec2pcr "github.com/IBM/compliance-to-policy/pkg/types/c2pcr" typear "github.com/IBM/compliance-to-policy/pkg/types/oscal/assessmentresults" "github.com/google/go-cmp/cmp" @@ -75,7 +74,7 @@ func TestResult2Oscal(t *testing.T) { Namespace: "c2p", }, } - c2pcrParser := c2pcr.NewParser(gitUtils) + c2pcrParser := NewParser(gitUtils) c2pcrParsed, err := c2pcrParser.Parse(c2pcrSpec) assert.NoError(t, err, "Should not happen") From 4352401f0ed8edbff4757e63e89896d8b5c24ae1 Mon Sep 17 00:00:00 2001 From: Takumi Yanagawa Date: Tue, 5 Dec 2023 20:39:34 +0900 Subject: [PATCH 08/13] add --results option to specify path to the directory of Policy Results Signed-off-by: Takumi Yanagawa --- cmd/kyverno/result2oscal/cmd/cmd.go | 4 ++-- cmd/kyverno/result2oscal/options/options.go | 11 ++++++--- cmd/ocm/oscal2policy/c2p-config.yaml | 22 ------------------ cmd/ocm/result2oscal/c2p-config.yaml | 22 ------------------ cmd/ocm/result2oscal/cmd/cmd.go | 4 ++-- cmd/ocm/result2oscal/options/options.go | 11 ++++++--- docs/ocm.md | 25 +++++++++++++++++++++ pkg/kyverno/configparser.go | 4 ---- pkg/kyverno/oscal2policy_test.go | 3 --- pkg/kyverno/result2oscal.go | 6 +++-- pkg/ocm/configparser.go | 4 ---- pkg/ocm/oscal2policy_test.go | 3 --- pkg/ocm/result2oscal.go | 6 +++-- pkg/ocm/result2oscal_test.go | 9 +------- 14 files changed, 54 insertions(+), 80 deletions(-) delete mode 100644 cmd/ocm/oscal2policy/c2p-config.yaml delete mode 100644 cmd/ocm/result2oscal/c2p-config.yaml diff --git a/cmd/kyverno/result2oscal/cmd/cmd.go b/cmd/kyverno/result2oscal/cmd/cmd.go index 3024cd4..4fcaae7 100644 --- a/cmd/kyverno/result2oscal/cmd/cmd.go +++ b/cmd/kyverno/result2oscal/cmd/cmd.go @@ -49,7 +49,7 @@ func New() *cobra.Command { } func Run(options *options.Options) error { - outputPath, c2pcrPath, tempDirPath := options.OutputPath, options.C2PCRPath, options.TempDirPath + outputPath, c2pcrPath, policyResultsDir, tempDirPath := options.OutputPath, options.C2PCRPath, options.PolicyResultsDir, options.TempDirPath var c2pcrSpec typec2pcr.Spec if err := pkg.LoadYamlFileToObject(c2pcrPath, &c2pcrSpec); err != nil { @@ -63,7 +63,7 @@ func Run(options *options.Options) error { panic(err) } - r := kyverno.NewResultToOscal(c2pcrParsed) + r := kyverno.NewResultToOscal(c2pcrParsed, policyResultsDir) ar, err := r.GenerateAssessmentResults() if err != nil { return err diff --git a/cmd/kyverno/result2oscal/options/options.go b/cmd/kyverno/result2oscal/options/options.go index 333a2c5..4cda40d 100644 --- a/cmd/kyverno/result2oscal/options/options.go +++ b/cmd/kyverno/result2oscal/options/options.go @@ -23,9 +23,10 @@ import ( ) type Options struct { - C2PCRPath string - TempDirPath string - OutputPath string + C2PCRPath string + PolicyResultsDir string + TempDirPath string + OutputPath string } func NewOptions() *Options { @@ -34,6 +35,7 @@ func NewOptions() *Options { func (o *Options) AddFlags(fs *pflag.FlagSet) { fs.StringVarP(&o.C2PCRPath, "config", "c", "", "path to c2p-config.yaml") + fs.StringVar(&o.PolicyResultsDir, "results", "", "path to directory containing Kyverno Policies List (policies.kyverno.io.yaml), ClusterPolicies List (clusterpolicies.kyverno.io.yaml), PolicyReports List (policyreports.wgpolicyk8s.io.yaml), and ClusterPolicyReports List (clusterpolicyreports.wgpolicyk8s.io.yaml)") fs.StringVar(&o.TempDirPath, "temp-dir", "", "path to temp directory") fs.StringVarP(&o.OutputPath, "out", "o", "./assessment-results.json", "path to output OSCAL Assessment Results") } @@ -46,5 +48,8 @@ func (o *Options) Validate() error { if o.C2PCRPath == "" { return errors.New("-c or --config is required") } + if o.PolicyResultsDir == "" { + return errors.New("--results is required") + } return nil } diff --git a/cmd/ocm/oscal2policy/c2p-config.yaml b/cmd/ocm/oscal2policy/c2p-config.yaml deleted file mode 100644 index 1cd541a..0000000 --- a/cmd/ocm/oscal2policy/c2p-config.yaml +++ /dev/null @@ -1,22 +0,0 @@ -compliance: - name: Test Compliance # name of compliance - catalog: - url: ./pkg/composer/testdata/oscal/catalog.json - profile: - url: ./pkg/composer/testdata/oscal/profile.json - componentDefinition: - url: ./pkg/composer/testdata/oscal/component-definition.json -policyResources: - url: ./pkg/composer/testdata/ocm/policies -policyResults: - url: a/b/c -clusterGroups: - - name: cluster-nist-high # name of clusterGroup - matchLabels: - level: nist-high # label's key value pair of clusterlabel -binding: - compliance: NIST_SP-800-53-HIGH # compliance name - clusterGroups: - - cluster-nist-high # clusterGroup name -target: - namespace: "" # namespace to which C2P deploys generated resources \ No newline at end of file diff --git a/cmd/ocm/result2oscal/c2p-config.yaml b/cmd/ocm/result2oscal/c2p-config.yaml deleted file mode 100644 index 225c511..0000000 --- a/cmd/ocm/result2oscal/c2p-config.yaml +++ /dev/null @@ -1,22 +0,0 @@ -compliance: - name: Test Compliance # name of compliance - catalog: - url: ./pkg/testdata/oscal/reporter-test/catalog.json - profile: - url: ./pkg/testdata/oscal/reporter-test/profile.json - componentDefinition: - url: ./pkg/testdata/oscal/reporter-test/component-definition.json -policyResources: - url: ./pkg/testdata/ocm/policies -policyResults: - url: ./pkg/testdata/ocm/policy-results -clusterGroups: - - name: test-group # name of clusterGroup - matchLabels: - environment: test # label's key value pair of clusterlabel -binding: - compliance: Test Complianc # compliance name - clusterGroups: - - test-group # clusterGroup name -target: - namespace: c2p # namespace to which C2P deploys generated resources \ No newline at end of file diff --git a/cmd/ocm/result2oscal/cmd/cmd.go b/cmd/ocm/result2oscal/cmd/cmd.go index e0a50ca..87cb305 100644 --- a/cmd/ocm/result2oscal/cmd/cmd.go +++ b/cmd/ocm/result2oscal/cmd/cmd.go @@ -49,7 +49,7 @@ func New() *cobra.Command { } func Run(options *options.Options) error { - outputPath, c2pcrPath, tempDirPath := options.OutputPath, options.C2PCRPath, options.TempDirPath + outputPath, c2pcrPath, policyResultsDir, tempDirPath := options.OutputPath, options.C2PCRPath, options.PolicyResultsDir, options.TempDirPath var c2pcrSpec typec2pcr.Spec if err := pkg.LoadYamlFileToObject(c2pcrPath, &c2pcrSpec); err != nil { @@ -63,7 +63,7 @@ func Run(options *options.Options) error { panic(err) } - r := ocm.NewResultToOscal(c2pcrParsed) + r := ocm.NewResultToOscal(c2pcrParsed, policyResultsDir) arRoot, err := r.Generate() if err != nil { panic(err) diff --git a/cmd/ocm/result2oscal/options/options.go b/cmd/ocm/result2oscal/options/options.go index 9571886..7a9e3fe 100644 --- a/cmd/ocm/result2oscal/options/options.go +++ b/cmd/ocm/result2oscal/options/options.go @@ -23,9 +23,10 @@ import ( ) type Options struct { - C2PCRPath string - TempDirPath string - OutputPath string + C2PCRPath string + PolicyResultsDir string + TempDirPath string + OutputPath string } func NewOptions() *Options { @@ -34,6 +35,7 @@ func NewOptions() *Options { func (o *Options) AddFlags(fs *pflag.FlagSet) { fs.StringVarP(&o.C2PCRPath, "config", "c", "", "path to c2p config file") + fs.StringVar(&o.PolicyResultsDir, "results", "", "path to directory containing OCM Policy List (placementdecisions.cluster.open-cluster-management.io.yaml), OCM PolicySet List (policysets.policy.open-cluster-management.io.yaml), and OCM PlacementDecisions List (placementdecisions.cluster.open-cluster-management.io.yaml)") fs.StringVar(&o.TempDirPath, "temp-dir", "", "path to temp directory") fs.StringVarP(&o.OutputPath, "out", "o", "./assessment-results.json", "path to output OSCAL Assessment Results") } @@ -46,5 +48,8 @@ func (o *Options) Validate() error { if o.C2PCRPath == "" { return errors.New("-c or --config is required") } + if o.PolicyResultsDir == "" { + return errors.New("--results is required") + } return nil } diff --git a/docs/ocm.md b/docs/ocm.md index b30ac71..039fb1d 100644 --- a/docs/ocm.md +++ b/docs/ocm.md @@ -3,6 +3,31 @@ ### Prerequisites 1. Install [Policy Generator Plugin](https://github.com/open-cluster-management-io/policy-generator-plugin#as-a-kustomize-plugin) +### Manual end-to-end use case +1. Run oscal2policy + ``` + c2pcli ocm oscal2policy -c c2p-config.yaml -o ./ocm-policies + ``` +1. Deploy generated OCM Policies to OCM Hub + ``` + kubectl create -f ./ocm-policies + ``` +1. Get OCM Policies from OCM Hub + ``` + mkdir results + kubectl get policies.policy.open-cluster-management.io -A -o yaml > ./results/policies.policy.open-cluster-management.io.yaml + kubectl get policies.policy.open-cluster-management.io -A -o yaml > ./results/policies.policy.open-cluster-management.io.yaml + kubectl get policysets.policy.open-cluster-management.io -A -o yaml > ./results/policysets.policy.open-cluster-management.io.yaml + ``` +1. Run result2oscal + ``` + c2pcli ocm result2oscal -c c2p-config.yaml --results ./results -o ./assessment-results.json + ``` +1. (Optional) Prettify OSCAL Assessment Results in .md format + ``` + c2pcli ocm oscal2posture -c c2p-config.yaml --assessment-results ./assessment-results.json -o compliance-posture.md + ``` + ### C2P Decomposer Decompose OCM poicy collection to kubernetes resources composing each OCM policy (we call it policy resource). diff --git a/pkg/kyverno/configparser.go b/pkg/kyverno/configparser.go index b6a39c7..a85b70d 100644 --- a/pkg/kyverno/configparser.go +++ b/pkg/kyverno/configparser.go @@ -46,10 +46,6 @@ func (p *C2PCRParser) Parse(c2pcrSpec c2pcr.Spec) (c2pcr.C2PCRParsed, error) { if err != nil { return parsed, err } - parsed.PolicyResultsDir, err = p.loadResourceFromUrl(c2pcrSpec.PolicyRersults.Url) - if err != nil { - return parsed, err - } logger.Info(fmt.Sprintf("Component-definition is loaded from %s", c2pcrSpec.Compliance.ComponentDefinition.Url)) if err := p.gitUtils.LoadFromGit(c2pcrSpec.Compliance.ComponentDefinition.Url, &parsed.ComponentDefinition); err != nil { diff --git a/pkg/kyverno/oscal2policy_test.go b/pkg/kyverno/oscal2policy_test.go index f708fde..8dc2d5c 100644 --- a/pkg/kyverno/oscal2policy_test.go +++ b/pkg/kyverno/oscal2policy_test.go @@ -55,9 +55,6 @@ func TestOscal2Policy(t *testing.T) { PolicyResources: typec2pcr.ResourceRef{ Url: policyDir, }, - PolicyRersults: typec2pcr.ResourceRef{ - Url: "/1/2/3", - }, ClusterGroups: []typec2pcr.ClusterGroup{{ Name: "test-group", MatchLabels: &map[string]string{"environment": "test"}, diff --git a/pkg/kyverno/result2oscal.go b/pkg/kyverno/result2oscal.go index 3dfcb12..7cb7500 100644 --- a/pkg/kyverno/result2oscal.go +++ b/pkg/kyverno/result2oscal.go @@ -35,6 +35,7 @@ import ( type ResultToOscal struct { logger *zap.Logger c2pParsed typec2pcr.C2PCRParsed + policyResultsDir string policyReportList *typepolr.PolicyReportList clusterPolicyReportList *typepolr.ClusterPolicyReportList policyList *kyvernov1.PolicyList @@ -51,10 +52,11 @@ type PolicyResourceIndexContainer struct { ControlIds []string } -func NewResultToOscal(c2pParsed typec2pcr.C2PCRParsed) *ResultToOscal { +func NewResultToOscal(c2pParsed typec2pcr.C2PCRParsed, policyResultsDir string) *ResultToOscal { r := ResultToOscal{ logger: pkg.GetLogger("kyverno/result2oscal"), c2pParsed: c2pParsed, + policyResultsDir: policyResultsDir, policyReportList: &typepolr.PolicyReportList{}, clusterPolicyReportList: &typepolr.ClusterPolicyReportList{}, policyList: &kyvernov1.PolicyList{}, @@ -121,7 +123,7 @@ func (r *ResultToOscal) retrievePolicyReportResults(name string) []*typepolr.Pol } func (r *ResultToOscal) loadData(path string, out interface{}) error { - if err := pkg.LoadYamlFileToK8sTypedObject(r.c2pParsed.PolicyResultsDir+path, &out); err != nil { + if err := pkg.LoadYamlFileToK8sTypedObject(r.policyResultsDir+"/"+path, &out); err != nil { return err } return nil diff --git a/pkg/ocm/configparser.go b/pkg/ocm/configparser.go index ec023aa..2ce0fed 100644 --- a/pkg/ocm/configparser.go +++ b/pkg/ocm/configparser.go @@ -43,10 +43,6 @@ func (p *C2PCRParser) Parse(c2pcrSpec c2pcr.Spec) (c2pcr.C2PCRParsed, error) { if err != nil { return parsed, err } - parsed.PolicyResultsDir, err = p.loadResourceFromUrl(c2pcrSpec.PolicyRersults.Url) - if err != nil { - return parsed, err - } logger.Info(fmt.Sprintf("Component-definition is loaded from %s", c2pcrSpec.Compliance.ComponentDefinition.Url)) if err := p.gitUtils.LoadFromGit(c2pcrSpec.Compliance.ComponentDefinition.Url, &parsed.ComponentDefinition); err != nil { diff --git a/pkg/ocm/oscal2policy_test.go b/pkg/ocm/oscal2policy_test.go index fc4a0ee..1e62d8f 100644 --- a/pkg/ocm/oscal2policy_test.go +++ b/pkg/ocm/oscal2policy_test.go @@ -54,9 +54,6 @@ func TestOscal2Policy(t *testing.T) { PolicyResources: typec2pcr.ResourceRef{ Url: policyDir, }, - PolicyRersults: typec2pcr.ResourceRef{ - Url: "/1/2/3", - }, ClusterGroups: []typec2pcr.ClusterGroup{{ Name: "test-group", MatchLabels: &map[string]string{"environment": "test"}, diff --git a/pkg/ocm/result2oscal.go b/pkg/ocm/result2oscal.go index 01953b9..b7e6a5b 100644 --- a/pkg/ocm/result2oscal.go +++ b/pkg/ocm/result2oscal.go @@ -37,6 +37,7 @@ import ( type ResultToOscal struct { c2pParsed typec2pcr.C2PCRParsed + policyResultsDir string policies []*typepolicy.Policy policySets []*typepolicy.PolicySet placementDecisions []*typeplacementdecision.PlacementDecision @@ -55,9 +56,10 @@ const ( GenerationTypePolicyReport GenerationType = "policy-report" ) -func NewResultToOscal(c2pParsed typec2pcr.C2PCRParsed) *ResultToOscal { +func NewResultToOscal(c2pParsed typec2pcr.C2PCRParsed, policyResultsDir string) *ResultToOscal { r := ResultToOscal{ c2pParsed: c2pParsed, + policyResultsDir: policyResultsDir, policies: []*typepolicy.Policy{}, policySets: []*typepolicy.PolicySet{}, placementDecisions: []*typeplacementdecision.PlacementDecision{}, @@ -276,7 +278,7 @@ func (r *ResultToOscal) GenerateReasonsFromRawPolicies(policy typepolicy.Policy) } func (r *ResultToOscal) loadData(path string, out interface{}) error { - if err := pkg.LoadYamlFileToK8sTypedObject(r.c2pParsed.PolicyResultsDir+path, &out); err != nil { + if err := pkg.LoadYamlFileToK8sTypedObject(r.policyResultsDir+"/"+path, &out); err != nil { return err } return nil diff --git a/pkg/ocm/result2oscal_test.go b/pkg/ocm/result2oscal_test.go index 849b4a6..b8b6226 100644 --- a/pkg/ocm/result2oscal_test.go +++ b/pkg/ocm/result2oscal_test.go @@ -59,17 +59,10 @@ func TestResult2Oscal(t *testing.T) { PolicyResources: typec2pcr.ResourceRef{ Url: policyDir, }, - PolicyRersults: typec2pcr.ResourceRef{ - Url: policyResultsDir, - }, ClusterGroups: []typec2pcr.ClusterGroup{{ Name: "test-group", MatchLabels: &map[string]string{"environment": "test"}, }}, - Binding: typec2pcr.Binding{ - Compliance: "Test Compliance", - ClusterGroups: []string{"test-group"}, - }, Target: typec2pcr.Target{ Namespace: "c2p", }, @@ -78,7 +71,7 @@ func TestResult2Oscal(t *testing.T) { c2pcrParsed, err := c2pcrParser.Parse(c2pcrSpec) assert.NoError(t, err, "Should not happen") - reporter := NewResultToOscal(c2pcrParsed) + reporter := NewResultToOscal(c2pcrParsed, policyResultsDir) arRoot, err := reporter.Generate() assert.NoError(t, err, "Should not happen") From 34d1ba23d8cb14a082f42a86266451f46c5ee2be Mon Sep 17 00:00:00 2001 From: Takumi Yanagawa Date: Tue, 5 Dec 2023 21:03:45 +0900 Subject: [PATCH 09/13] Add version command Signed-off-by: Takumi Yanagawa --- cmd/c2pcli/main.go | 25 ++++++++++++++++++++++++- 1 file changed, 24 insertions(+), 1 deletion(-) diff --git a/cmd/c2pcli/main.go b/cmd/c2pcli/main.go index 01d00d5..ed58863 100644 --- a/cmd/c2pcli/main.go +++ b/cmd/c2pcli/main.go @@ -17,13 +17,36 @@ limitations under the License. package main import ( + "fmt" "os" "github.com/IBM/compliance-to-policy/cmd/c2pcli/cmd" + "github.com/spf13/cobra" ) +var ( + version = "none" + commit = "none" + date = "unknown" +) + +func newVersionSubCommand() *cobra.Command { + command := &cobra.Command{ + Use: "version", + Short: "Display version", + RunE: func(cmd *cobra.Command, args []string) error { + message := fmt.Sprintf("version: %s, commit: %s, date: %s", version, commit, date) + fmt.Fprintln(os.Stdout, message) + return nil + }, + } + return command +} + func main() { - err := cmd.New().Execute() + command := cmd.New() + command.AddCommand(newVersionSubCommand()) + err := command.Execute() if err != nil { os.Exit(1) } From 01d215e34a223fd833db59f5bd9ae6ae0d45f675 Mon Sep 17 00:00:00 2001 From: Takumi Yanagawa Date: Wed, 6 Dec 2023 15:07:10 +0900 Subject: [PATCH 10/13] Add end-to-end use case in .md Signed-off-by: Takumi Yanagawa --- docs/kyverno/kyverno-workflow.drawio | 219 + .../oscal-vs-kyverno-result-mapping.csv | 14 + docs/{ocm.md => ocm/README.md} | 80 +- docs/ocm/c2p-config.yaml | 16 + .../ocm/final-outputs/assessment-results.json | 284 + docs/ocm/final-outputs/compliance-posture.md | 401 + .../ConfigMap.c2p.c2p-parameters.yaml | 8 + ...ment.c2p.placement-managed-kubernetes.yaml | 14 + .../PlacementBinding.c2p.policy-set.yaml | 13 + .../Policy.c2p.policy-deployment.yaml | 53 + .../Policy.c2p.policy-high-scan.yaml | 100 + ...policy-install-kyverno-from-manifests.yaml | 32668 ++++++++++++++++ ...icy.c2p.policy-kyverno-require-labels.yaml | 73 + .../PolicySet.c2p.managed-kubernetes.yaml | 14 + .../oscal-ar-vs-ocm-status-mapping.csv} | 0 docs/ocm/oscal/component-definition.csv | 6 + docs/ocm/oscal/component-definition.json | 201 + docs/ocm/oscal/profile.json | 75 + .../kustomization.yaml | 2 + .../policy-generator.yaml | 17 + .../ClusterRole.kyverno.yaml | 18 + ...terRole.kyverno:admin-generaterequest.yaml | 27 + .../ClusterRole.kyverno:admin-policies.yaml | 28 + ...lusterRole.kyverno:admin-policyreport.yaml | 28 + .../ClusterRole.kyverno:admin-reports.yaml | 30 + ...usterRole.kyverno:admin-updaterequest.yaml | 27 + .../ClusterRole.kyverno:events.yaml | 23 + .../ClusterRole.kyverno:generate.yaml | 48 + .../ClusterRole.kyverno:policies.yaml | 54 + .../ClusterRole.kyverno:userinfo.yaml | 24 + .../ClusterRole.kyverno:view.yaml | 22 + .../ClusterRole.kyverno:webhook.yaml | 27 + .../ClusterRoleBinding.kyverno.yaml | 21 + .../ConfigMap.kyverno-metrics.yaml | 16 + .../ConfigMap.kyverno.yaml | 17 + ...efinition.admissionreports.kyverno.io.yaml | 348 + ...tion.backgroundscanreports.kyverno.io.yaml | 308 + ...on.clusteradmissionreports.kyverno.io.yaml | 349 + ...usterbackgroundscanreports.kyverno.io.yaml | 308 + ...Definition.clusterpolicies.kyverno.io.yaml | 11930 ++++++ ...n.clusterpolicyreports.wgpolicyk8s.io.yaml | 370 + ...efinition.generaterequests.kyverno.io.yaml | 191 + ...esourceDefinition.policies.kyverno.io.yaml | 11934 ++++++ ...finition.policyreports.wgpolicyk8s.io.yaml | 369 + ...eDefinition.updaterequests.kyverno.io.yaml | 394 + .../Deployment.kyverno.yaml | 172 + .../Namespace.kyverno.yaml | 13 + .../Role.kyverno:leaderelection.yaml | 35 + .../RoleBinding.kyverno:leaderelection.yaml | 22 + .../Service.kyverno-svc-metrics.yaml | 25 + .../Service.kyverno-svc.yaml | 25 + .../ServiceAccount.kyverno.yaml | 14 + .../check-kyverno-reports/require-lables.yaml | 5 + .../kustomization.yaml | 2 + .../policy-generator.yaml | 23 + .../ClusterPolicy.require-labels.0.yaml | 18 + 56 files changed, 61513 insertions(+), 10 deletions(-) create mode 100644 docs/kyverno/kyverno-workflow.drawio create mode 100644 docs/kyverno/oscal-vs-kyverno-result-mapping.csv rename docs/{ocm.md => ocm/README.md} (65%) create mode 100644 docs/ocm/c2p-config.yaml create mode 100755 docs/ocm/final-outputs/assessment-results.json create mode 100755 docs/ocm/final-outputs/compliance-posture.md create mode 100755 docs/ocm/final-outputs/ocm-policies/ConfigMap.c2p.c2p-parameters.yaml create mode 100755 docs/ocm/final-outputs/ocm-policies/Placement.c2p.placement-managed-kubernetes.yaml create mode 100755 docs/ocm/final-outputs/ocm-policies/PlacementBinding.c2p.policy-set.yaml create mode 100755 docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-deployment.yaml create mode 100755 docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-high-scan.yaml create mode 100755 docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-install-kyverno-from-manifests.yaml create mode 100755 docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-kyverno-require-labels.yaml create mode 100755 docs/ocm/final-outputs/ocm-policies/PolicySet.c2p.managed-kubernetes.yaml rename docs/{oscal-vs-ocm-status-mapping.csv => ocm/oscal-ar-vs-ocm-status-mapping.csv} (100%) create mode 100644 docs/ocm/oscal/component-definition.csv create mode 100644 docs/ocm/oscal/component-definition.json create mode 100644 docs/ocm/oscal/profile.json create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/kustomization.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-generator.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-generaterequest.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-policies.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-policyreport.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-reports.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-updaterequest.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:events.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:generate.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:policies.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:userinfo.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:view.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:webhook.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRoleBinding.kyverno.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ConfigMap.kyverno-metrics.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ConfigMap.kyverno.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.admissionreports.kyverno.io.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.backgroundscanreports.kyverno.io.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusteradmissionreports.kyverno.io.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusterbackgroundscanreports.kyverno.io.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusterpolicies.kyverno.io.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusterpolicyreports.wgpolicyk8s.io.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.generaterequests.kyverno.io.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.policies.kyverno.io.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.policyreports.wgpolicyk8s.io.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.updaterequests.kyverno.io.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Deployment.kyverno.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Namespace.kyverno.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Role.kyverno:leaderelection.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/RoleBinding.kyverno:leaderelection.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Service.kyverno-svc-metrics.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Service.kyverno-svc.yaml create mode 100755 pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ServiceAccount.kyverno.yaml create mode 100644 pkg/testdata/ocm/policies/policy-kyverno-require-labels/check-kyverno-reports/require-lables.yaml create mode 100755 pkg/testdata/ocm/policies/policy-kyverno-require-labels/kustomization.yaml create mode 100755 pkg/testdata/ocm/policies/policy-kyverno-require-labels/policy-generator.yaml create mode 100755 pkg/testdata/ocm/policies/policy-kyverno-require-labels/policy-kyverno-require-labels/ClusterPolicy.require-labels.0.yaml diff --git a/docs/kyverno/kyverno-workflow.drawio b/docs/kyverno/kyverno-workflow.drawio new file mode 100644 index 0000000..84cf800 --- /dev/null +++ b/docs/kyverno/kyverno-workflow.drawio @@ -0,0 +1,219 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/docs/kyverno/oscal-vs-kyverno-result-mapping.csv b/docs/kyverno/oscal-vs-kyverno-result-mapping.csv new file mode 100644 index 0000000..b5c2dfa --- /dev/null +++ b/docs/kyverno/oscal-vs-kyverno-result-mapping.csv @@ -0,0 +1,14 @@ +Field of OSCAL Assessment Result,How is Auditree check_results.json mapped,Field of Auditree check_results.json +local-definitions.inventory-items[],Per check_result,check_results[] +local-definitions.inventory-items[].props[].check_path,check_result key name,check_results[].$key +local-definitions.inventory-items[].props[].accreditations,accreditations in check_result,check_results[].accreditations +observations[],Per rule, +observations[].subjects[],"Per check (filter(check_id in rule, check_results.$key.checks))","filter(lambda check: check in rule, check_results[].checks)" +observations[].subjects[].subject_uuid,Inventory item id of the check,local-definitions.inventory-items[].uuid +observations[].subjects[].props[].result,Status of check (pass/fail),check.status +observations[].subjects[].props[].reason,Reason of the status,str(check.successes/failures/warnings) +observations[].subjects[].props[].resource-id,Fully qualified check name ,f‘{check_result.$key}.{check.$key}’ +observations[].subjects[].props[].evaluate-on,Evaluation timestamp,check.timestamp_formatted +observations[].relevant_references[].description,Evidence description,check_result.evidence[].description +observations[].relevant_references[].href,Evidence urls,locker_url + check_result.evidence[].path +observations[].links[].href,Report urls,locker_url + check_result.reports[] \ No newline at end of file diff --git a/docs/ocm.md b/docs/ocm/README.md similarity index 65% rename from docs/ocm.md rename to docs/ocm/README.md index 039fb1d..a48945e 100644 --- a/docs/ocm.md +++ b/docs/ocm/README.md @@ -1,32 +1,92 @@ ## C2P for OCM +### Usage +``` +$ c2pcli ocm -h +C2P CLI OCM plugin + +Usage: + c2pcli ocm [command] + +Available Commands: + oscal2policy Compose deliverable OCM Policies from OSCAL + oscal2posture Generate Compliance Posture from OSCAL artifacts + result2oscal Generate OSCAL Assessment Results from OCM Policy statuses + +Flags: + -h, --help help for ocm + +Use "c2pcli ocm [command] --help" for more information about a command. +``` + ### Prerequisites 1. Install [Policy Generator Plugin](https://github.com/open-cluster-management-io/policy-generator-plugin#as-a-kustomize-plugin) ### Manual end-to-end use case + +1. Prerequisites + 1. OCM is configured to manage two k8s clusters (cluster1 and cluster2) and installed Policy Governance Framework. + 1. Namespace `c2p` is created in OCM Hub + 1. The managed clusters are labeled `my-cluster=true` and bound to `c2p` namespace + ``` + $ clusteradm get clustersets + + + └── + │ ├── + │ ├── 2 ManagedClusters selected + │ ├── [cluster1 cluster2] + └── + │ ├── + │ ├── 2 ManagedClusters selected + │ ├── [cluster1 cluster2] + └── + └── c2p + └── 2 ManagedClusters selected + └── [cluster1 cluster2] + ``` 1. Run oscal2policy ``` - c2pcli ocm oscal2policy -c c2p-config.yaml -o ./ocm-policies + c2pcli ocm oscal2policy -c ./docs/ocm/c2p-config.yaml -o /tmp/ocm-policies ``` + - The generated ocm-policies directory looks like [./final-outputs/ocm-policies](./final-outputs/ocm-policies) 1. Deploy generated OCM Policies to OCM Hub ``` - kubectl create -f ./ocm-policies + kubectl create -f /tmp/ocm-policies + ``` +1. Wait for policies to be delivered + ``` + $ kubectl get policy -A + NAMESPACE NAME REMEDIATION ACTION COMPLIANCE STATE AGE + c2p policy-deployment inform NonCompliant 5m15s + c2p policy-high-scan inform NonCompliant 5m15s + c2p policy-install-kyverno-from-manifests enforce Compliant 5m14s + c2p policy-kyverno-require-labels NonCompliant 5m14s + cluster1 c2p.policy-deployment inform NonCompliant 2m15s + cluster1 c2p.policy-high-scan inform NonCompliant 2m15s + cluster1 c2p.policy-install-kyverno-from-manifests enforce Compliant 2m14s + cluster1 c2p.policy-kyverno-require-labels NonCompliant 2m11s + cluster2 c2p.policy-deployment inform NonCompliant 2m15s + cluster2 c2p.policy-high-scan inform NonCompliant 2m15s + cluster2 c2p.policy-install-kyverno-from-manifests enforce Compliant 2m14s + cluster2 c2p.policy-kyverno-require-labels NonCompliant 2m11s ``` -1. Get OCM Policies from OCM Hub +1. Get OCM Policy Results (Policy, PolicySet, PlacementDecision) from OCM Hub ``` - mkdir results - kubectl get policies.policy.open-cluster-management.io -A -o yaml > ./results/policies.policy.open-cluster-management.io.yaml - kubectl get policies.policy.open-cluster-management.io -A -o yaml > ./results/policies.policy.open-cluster-management.io.yaml - kubectl get policysets.policy.open-cluster-management.io -A -o yaml > ./results/policysets.policy.open-cluster-management.io.yaml + mkdir /tmp/results + kubectl get policies.policy.open-cluster-management.io -A -o yaml > /tmp/results/policies.policy.open-cluster-management.io.yaml + kubectl get policysets.policy.open-cluster-management.io -A -o yaml > /tmp/results/policysets.policy.open-cluster-management.io.yaml + kubectl get placementdecisions.cluster.open-cluster-management.io -A -o yaml > /tmp/results/placementdecisions.cluster.open-cluster-management.io.yaml ``` 1. Run result2oscal ``` - c2pcli ocm result2oscal -c c2p-config.yaml --results ./results -o ./assessment-results.json + c2pcli ocm result2oscal -c ./docs/ocm/c2p-config.yaml --results /tmp/results -o /tmp/assessment-results.json ``` -1. (Optional) Prettify OSCAL Assessment Results in .md format +1. Prettify OSCAL Assessment Results in .md format ``` - c2pcli ocm oscal2posture -c c2p-config.yaml --assessment-results ./assessment-results.json -o compliance-posture.md + c2pcli ocm oscal2posture -c ./docs/ocm/c2p-config.yaml --assessment-results /tmp/assessment-results.json -o /tmp/compliance-posture.md ``` + - You can view the compliance posture like [./final-outputs/compliance-posture.md](./final-outputs/compliance-posture.md) ### C2P Decomposer Decompose OCM poicy collection to kubernetes resources composing each OCM policy (we call it policy resource). diff --git a/docs/ocm/c2p-config.yaml b/docs/ocm/c2p-config.yaml new file mode 100644 index 0000000..4ac0a1f --- /dev/null +++ b/docs/ocm/c2p-config.yaml @@ -0,0 +1,16 @@ +compliance: + name: Demo Compliance + catalog: + url: https://raw.githubusercontent.com/usnistgov/oscal-content/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_catalog.json + profile: + url: ./docs/ocm/oscal/profile.json + componentDefinition: + url: ./docs/ocm/oscal/component-definition.json +policyResources: + url: ./pkg/testdata/ocm/policies # example policy resources +clusterGroups: + - name: myclusters + matchLabels: + my-cluster: 'true' +target: + namespace: c2p \ No newline at end of file diff --git a/docs/ocm/final-outputs/assessment-results.json b/docs/ocm/final-outputs/assessment-results.json new file mode 100755 index 0000000..012f242 --- /dev/null +++ b/docs/ocm/final-outputs/assessment-results.json @@ -0,0 +1,284 @@ +{ + "assessment-results": { + "uuid": "6fae0aac-93fc-11ee-a02a-62f79297f1b7", + "metadata": { + "title": "OSCAL Assessment Results", + "last-modified": "2023-12-06T14:58:10.97827+09:00", + "version": "0.0.1", + "oscal-version": "1.0.4" + }, + "import-ap": { + "href": "http://..." + }, + "results": [ + { + "uuid": "6fae0aac-93fc-11ee-a02b-62f79297f1b7", + "title": "Assessment Results by OCM", + "description": "Assessment Results by OCM...", + "start": "2023-12-06T14:58:10.97827+09:00", + "local-definitions": { + "inventory-items": [ + { + "uuid": "6fade0d6-93fc-11ee-a029-62f79297f1b7", + "description": "", + "props": [ + { + "name": "cluster-name", + "value": "cluster1" + } + ] + }, + { + "uuid": "6fade374-93fc-11ee-a029-62f79297f1b7", + "description": "", + "props": [ + { + "name": "cluster-name", + "value": "cluster2" + } + ] + } + ] + }, + "observations": [ + { + "uuid": "6fade810-93fc-11ee-a029-62f79297f1b7", + "description": "Observation of policy policy-high-scan", + "props": [ + { + "name": "assessment-rule-id", + "value": "test_configuration_check" + }, + { + "name": "policy-id", + "value": "policy-high-scan" + }, + { + "name": "control-id", + "value": "cm-6" + }, + { + "name": "result", + "value": "fail" + } + ], + "methods": [ + "TEST-AUTOMATED" + ], + "subjects": [ + { + "subject-uuid": "6fade0d6-93fc-11ee-a029-62f79297f1b7", + "type": "resource", + "title": "Cluster Name: cluster1", + "props": [ + { + "name": "result", + "value": "fail" + }, + { + "name": "reason", + "value": "- eventName: c2p.policy-high-scan.179e2849d01e8567\n lastTimestamp: \"2023-12-06T05:53:26Z\"\n message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding,\n please check if you have CRD deployed\n- eventName: c2p.policy-high-scan.179e2848595f9ba9\n lastTimestamp: \"2023-12-06T05:53:20Z\"\n message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite,\n please check if you have CRD deployed\n- eventName: c2p.policy-high-scan.179e284a97812778\n lastTimestamp: \"2023-12-06T05:53:30Z\"\n message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult,\n please check if you have CRD deployed\n" + } + ] + }, + { + "subject-uuid": "6fade374-93fc-11ee-a029-62f79297f1b7", + "type": "resource", + "title": "Cluster Name: cluster2", + "props": [ + { + "name": "result", + "value": "fail" + }, + { + "name": "reason", + "value": "- eventName: c2p.policy-high-scan.179e284863bfbfab\n lastTimestamp: \"2023-12-06T05:53:20Z\"\n message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding,\n please check if you have CRD deployed\n- eventName: c2p.policy-high-scan.179e284a53812e10\n lastTimestamp: \"2023-12-06T05:53:28Z\"\n message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite,\n please check if you have CRD deployed\n- eventName: c2p.policy-high-scan.179e2849950d51e5\n lastTimestamp: \"2023-12-06T05:53:25Z\"\n message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult,\n please check if you have CRD deployed\n" + } + ] + } + ], + "collected": "0001-01-01T00:00:00Z", + "expires": "0001-01-01T00:00:00Z" + }, + { + "uuid": "6fae067e-93fc-11ee-a029-62f79297f1b7", + "description": "Observation of policy policy-install-kyverno-from-manifests", + "props": [ + { + "name": "assessment-rule-id", + "value": "install_kyverno" + }, + { + "name": "policy-id", + "value": "policy-install-kyverno-from-manifests" + }, + { + "name": "control-id", + "value": "cm-6" + }, + { + "name": "result", + "value": "pass" + } + ], + "methods": [ + "TEST-AUTOMATED" + ], + "subjects": [ + { + "subject-uuid": "6fade0d6-93fc-11ee-a029-62f79297f1b7", + "type": "resource", + "title": "Cluster Name: cluster1", + "props": [ + { + "name": "result", + "value": "pass" + }, + { + "name": "reason", + "value": "- eventName: c2p.policy-install-kyverno-from-manifests.179e284be703d42d\n lastTimestamp: \"2023-12-06T05:53:35Z\"\n message: Compliant; notification - clusterroles [kyverno] found as specified, therefore\n this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284c7ace2ebf\n lastTimestamp: \"2023-12-06T05:53:38Z\"\n message: Compliant; notification - clusterroles [kyverno:admin-generaterequest]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284c9f4c379e\n lastTimestamp: \"2023-12-06T05:53:38Z\"\n message: Compliant; notification - clusterroles [kyverno:admin-policies] found as\n specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e28504ffc7000\n lastTimestamp: \"2023-12-06T05:53:54Z\"\n message: Compliant; notification - clusterroles [kyverno:admin-policyreport] found\n as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284befa43976\n lastTimestamp: \"2023-12-06T05:53:35Z\"\n message: Compliant; notification - clusterroles [kyverno:admin-reports] found as\n specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284e6ff55461\n lastTimestamp: \"2023-12-06T05:53:46Z\"\n message: Compliant; notification - clusterroles [kyverno:admin-updaterequest] found\n as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e285349215bae\n lastTimestamp: \"2023-12-06T05:54:07Z\"\n message: Compliant; notification - clusterroles [kyverno:events] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284d380ed6df\n lastTimestamp: \"2023-12-06T05:53:41Z\"\n message: Compliant; notification - clusterroles [kyverno:generate] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2853548333b1\n lastTimestamp: \"2023-12-06T05:54:07Z\"\n message: Compliant; notification - clusterroles [kyverno:policies] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284f80c03d5d\n lastTimestamp: \"2023-12-06T05:53:51Z\"\n message: Compliant; notification - clusterroles [kyverno:userinfo] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284ba3c9f6ea\n lastTimestamp: \"2023-12-06T05:53:34Z\"\n message: Compliant; notification - clusterroles [kyverno:view] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e28535e612839\n lastTimestamp: \"2023-12-06T05:54:07Z\"\n message: Compliant; notification - clusterroles [kyverno:webhook] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284fcb71f4df\n lastTimestamp: \"2023-12-06T05:53:52Z\"\n message: Compliant; notification - clusterrolebindings [kyverno] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e285680fe6ac8\n lastTimestamp: \"2023-12-06T05:54:21Z\"\n message: Compliant; notification - configmaps [kyverno-metrics] in namespace kyverno\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e28524f386c75\n lastTimestamp: \"2023-12-06T05:54:03Z\"\n message: Compliant; notification - configmaps [kyverno] in namespace kyverno found\n as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284bf8f4b48b\n lastTimestamp: \"2023-12-06T05:53:35Z\"\n message: Compliant; notification - customresourcedefinitions [admissionreports.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284bba53764a\n lastTimestamp: \"2023-12-06T05:53:34Z\"\n message: Compliant; notification - customresourcedefinitions [backgroundscanreports.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284fd5dac2d0\n lastTimestamp: \"2023-12-06T05:53:52Z\"\n message: Compliant; notification - customresourcedefinitions [clusteradmissionreports.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284f91c7ac2d\n lastTimestamp: \"2023-12-06T05:53:51Z\"\n message: Compliant; notification - customresourcedefinitions [clusterbackgroundscanreports.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2853336f0121\n lastTimestamp: \"2023-12-06T05:54:07Z\"\n message: Compliant; notification - customresourcedefinitions [clusterpolicies.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2853ae517829\n lastTimestamp: \"2023-12-06T05:54:09Z\"\n message: Compliant; notification - customresourcedefinitions [clusterpolicyreports.wgpolicyk8s.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2853bb96886f\n lastTimestamp: \"2023-12-06T05:54:09Z\"\n message: Compliant; notification - customresourcedefinitions [generaterequests.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e28567b4ab101\n lastTimestamp: \"2023-12-06T05:54:21Z\"\n message: Compliant; notification - customresourcedefinitions [policies.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e285155b5a7dc\n lastTimestamp: \"2023-12-06T05:53:58Z\"\n message: Compliant; notification - customresourcedefinitions [policyreports.wgpolicyk8s.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e285258c5e5f7\n lastTimestamp: \"2023-12-06T05:54:03Z\"\n message: Compliant; notification - customresourcedefinitions [updaterequests.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2856c0192717\n lastTimestamp: \"2023-12-06T05:54:22Z\"\n message: Compliant; notification - deployments [kyverno] in namespace kyverno found\n as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2851d0ebe5d4\n lastTimestamp: \"2023-12-06T05:54:01Z\"\n message: Compliant; notification - namespaces [kyverno] found as specified, therefore\n this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2851d422c597\n lastTimestamp: \"2023-12-06T05:54:01Z\"\n message: Compliant; notification - roles [kyverno:leaderelection] in namespace kyverno\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e28526cb03284\n lastTimestamp: \"2023-12-06T05:54:03Z\"\n message: Compliant; notification - rolebindings [kyverno:leaderelection] in namespace\n kyverno found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e285684956927\n lastTimestamp: \"2023-12-06T05:54:21Z\"\n message: Compliant; notification - services [kyverno-svc-metrics] in namespace kyverno\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e285277e643d2\n lastTimestamp: \"2023-12-06T05:54:03Z\"\n message: Compliant; notification - services [kyverno-svc] in namespace kyverno found\n as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2855b441709c\n lastTimestamp: \"2023-12-06T05:54:17Z\"\n message: Compliant; notification - serviceaccounts [kyverno] in namespace kyverno\n found as specified, therefore this Object template is compliant\n" + } + ] + }, + { + "subject-uuid": "6fade374-93fc-11ee-a029-62f79297f1b7", + "type": "resource", + "title": "Cluster Name: cluster2", + "props": [ + { + "name": "result", + "value": "pass" + }, + { + "name": "reason", + "value": "- eventName: c2p.policy-install-kyverno-from-manifests.179e284c9a97c784\n lastTimestamp: \"2023-12-06T05:53:38Z\"\n message: Compliant; notification - clusterroles [kyverno] found as specified, therefore\n this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284b35375584\n lastTimestamp: \"2023-12-06T05:53:32Z\"\n message: Compliant; notification - clusterroles [kyverno:admin-generaterequest]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284ef4862c6a\n lastTimestamp: \"2023-12-06T05:53:48Z\"\n message: Compliant; notification - clusterroles [kyverno:admin-policies] found as\n specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284dfd646310\n lastTimestamp: \"2023-12-06T05:53:44Z\"\n message: Compliant; notification - clusterroles [kyverno:admin-policyreport] found\n as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284dc9cf5a21\n lastTimestamp: \"2023-12-06T05:53:43Z\"\n message: Compliant; notification - clusterroles [kyverno:admin-reports] found as\n specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284b3482ad78\n lastTimestamp: \"2023-12-06T05:53:32Z\"\n message: Compliant; notification - clusterroles [kyverno:admin-updaterequest] found\n as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284f07938a0b\n lastTimestamp: \"2023-12-06T05:53:49Z\"\n message: Compliant; notification - clusterroles [kyverno:events] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284f17ff00f6\n lastTimestamp: \"2023-12-06T05:53:49Z\"\n message: Compliant; notification - clusterroles [kyverno:generate] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284ca95ae428\n lastTimestamp: \"2023-12-06T05:53:38Z\"\n message: Compliant; notification - clusterroles [kyverno:policies] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284e30919d74\n lastTimestamp: \"2023-12-06T05:53:45Z\"\n message: Compliant; notification - clusterroles [kyverno:userinfo] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284e4527ba38\n lastTimestamp: \"2023-12-06T05:53:45Z\"\n message: Compliant; notification - clusterroles [kyverno:view] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284c5820f7b0\n lastTimestamp: \"2023-12-06T05:53:37Z\"\n message: Compliant; notification - clusterroles [kyverno:webhook] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284dccc3cae5\n lastTimestamp: \"2023-12-06T05:53:43Z\"\n message: Compliant; notification - clusterrolebindings [kyverno] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e285889d4069c\n lastTimestamp: \"2023-12-06T05:54:29Z\"\n message: Compliant; notification - configmaps [kyverno-metrics] in namespace kyverno\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2853e3c830c7\n lastTimestamp: \"2023-12-06T05:54:09Z\"\n message: Compliant; notification - configmaps [kyverno] in namespace kyverno found\n as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2851c8b54cb1\n lastTimestamp: \"2023-12-06T05:54:00Z\"\n message: Compliant; notification - customresourcedefinitions [admissionreports.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284dda99ee7e\n lastTimestamp: \"2023-12-06T05:53:44Z\"\n message: Compliant; notification - customresourcedefinitions [backgroundscanreports.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e284cbfda9c70\n lastTimestamp: \"2023-12-06T05:53:39Z\"\n message: Compliant; notification - customresourcedefinitions [clusteradmissionreports.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2854d3f7806a\n lastTimestamp: \"2023-12-06T05:54:13Z\"\n message: Compliant; notification - customresourcedefinitions [clusterbackgroundscanreports.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2856e1ae7593\n lastTimestamp: \"2023-12-06T05:54:22Z\"\n message: Compliant; notification - customresourcedefinitions [clusterpolicies.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2851eb3a6bea\n lastTimestamp: \"2023-12-06T05:54:01Z\"\n message: Compliant; notification - customresourcedefinitions [clusterpolicyreports.wgpolicyk8s.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2851282fb972\n lastTimestamp: \"2023-12-06T05:53:58Z\"\n message: Compliant; notification - customresourcedefinitions [generaterequests.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2851fa561a0e\n lastTimestamp: \"2023-12-06T05:54:01Z\"\n message: Compliant; notification - customresourcedefinitions [policies.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2854e6af9e7a\n lastTimestamp: \"2023-12-06T05:54:14Z\"\n message: Compliant; notification - customresourcedefinitions [policyreports.wgpolicyk8s.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e285334bd6234\n lastTimestamp: \"2023-12-06T05:54:07Z\"\n message: Compliant; notification - customresourcedefinitions [updaterequests.kyverno.io]\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e28588a2bd302\n lastTimestamp: \"2023-12-06T05:54:29Z\"\n message: Compliant; notification - deployments [kyverno] in namespace kyverno found\n as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2851d0e23da9\n lastTimestamp: \"2023-12-06T05:54:01Z\"\n message: Compliant; notification - namespaces [kyverno] found as specified, therefore\n this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2853398624f1\n lastTimestamp: \"2023-12-06T05:54:07Z\"\n message: Compliant; notification - roles [kyverno:leaderelection] in namespace kyverno\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2858b1db4b8e\n lastTimestamp: \"2023-12-06T05:54:30Z\"\n message: Compliant; notification - rolebindings [kyverno:leaderelection] in namespace\n kyverno found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2857bc2aa4bd\n lastTimestamp: \"2023-12-06T05:54:26Z\"\n message: Compliant; notification - services [kyverno-svc-metrics] in namespace kyverno\n found as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e285346ad8e3c\n lastTimestamp: \"2023-12-06T05:54:07Z\"\n message: Compliant; notification - services [kyverno-svc] in namespace kyverno found\n as specified, therefore this Object template is compliant\n- eventName: c2p.policy-install-kyverno-from-manifests.179e2857c388cf77\n lastTimestamp: \"2023-12-06T05:54:26Z\"\n message: Compliant; notification - serviceaccounts [kyverno] in namespace kyverno\n found as specified, therefore this Object template is compliant\n" + } + ] + } + ], + "collected": "0001-01-01T00:00:00Z", + "expires": "0001-01-01T00:00:00Z" + }, + { + "uuid": "6fae08e0-93fc-11ee-a029-62f79297f1b7", + "description": "Observation of policy policy-kyverno-require-labels", + "props": [ + { + "name": "assessment-rule-id", + "value": "test_required_label" + }, + { + "name": "policy-id", + "value": "policy-kyverno-require-labels" + }, + { + "name": "control-id", + "value": "cm-6" + }, + { + "name": "result", + "value": "fail" + } + ], + "methods": [ + "TEST-AUTOMATED" + ], + "subjects": [ + { + "subject-uuid": "6fade0d6-93fc-11ee-a029-62f79297f1b7", + "type": "resource", + "title": "Cluster Name: cluster1", + "props": [ + { + "name": "result", + "value": "fail" + }, + { + "name": "reason", + "value": "- eventName: c2p.policy-kyverno-require-labels.179e2851c11fe04c\n lastTimestamp: \"2023-12-06T05:54:00Z\"\n message: Compliant; notification - clusterpolicies [require-labels] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-kyverno-require-labels.179e2862688eaee7\n lastTimestamp: \"2023-12-06T05:55:12Z\"\n message: 'NonCompliant; violation - policyreports found: [cpol-require-labels] in\n namespace local-path-storage'\n" + } + ] + }, + { + "subject-uuid": "6fade374-93fc-11ee-a029-62f79297f1b7", + "type": "resource", + "title": "Cluster Name: cluster2", + "props": [ + { + "name": "result", + "value": "fail" + }, + { + "name": "reason", + "value": "- eventName: c2p.policy-kyverno-require-labels.179e2855f5ab92dd\n lastTimestamp: \"2023-12-06T05:54:18Z\"\n message: Compliant; notification - clusterpolicies [require-labels] found as specified,\n therefore this Object template is compliant\n- eventName: c2p.policy-kyverno-require-labels.179e2862e1802d28\n lastTimestamp: \"2023-12-06T05:55:14Z\"\n message: 'NonCompliant; violation - policyreports found: [cpol-require-labels] in\n namespace local-path-storage'\n" + } + ] + } + ], + "collected": "0001-01-01T00:00:00Z", + "expires": "0001-01-01T00:00:00Z" + }, + { + "uuid": "6fae0aac-93fc-11ee-a029-62f79297f1b7", + "description": "Observation of policy policy-deployment", + "props": [ + { + "name": "assessment-rule-id", + "value": "test_proxy_check" + }, + { + "name": "policy-id", + "value": "policy-deployment" + }, + { + "name": "control-id", + "value": "cm-2" + }, + { + "name": "result", + "value": "fail" + } + ], + "methods": [ + "TEST-AUTOMATED" + ], + "subjects": [ + { + "subject-uuid": "6fade0d6-93fc-11ee-a029-62f79297f1b7", + "type": "resource", + "title": "Cluster Name: cluster1", + "props": [ + { + "name": "result", + "value": "fail" + }, + { + "name": "reason", + "value": "- eventName: c2p.policy-deployment.179e284f776397b3\n lastTimestamp: \"2023-12-06T05:53:50Z\"\n message: 'NonCompliant; violation - deployments not found: [nginx-deployment] in\n namespace cluster1 missing; [nginx-deployment] in namespace default missing; [nginx-deployment]\n in namespace kube-node-lease missing; [nginx-deployment] in namespace kube-public\n missing; [nginx-deployment] in namespace kyverno missing; [nginx-deployment] in\n namespace local-path-storage missing'\n" + } + ] + }, + { + "subject-uuid": "6fade374-93fc-11ee-a029-62f79297f1b7", + "type": "resource", + "title": "Cluster Name: cluster2", + "props": [ + { + "name": "result", + "value": "fail" + }, + { + "name": "reason", + "value": "- eventName: c2p.policy-deployment.179e2854bed6d22e\n lastTimestamp: \"2023-12-06T05:54:13Z\"\n message: 'NonCompliant; violation - deployments not found: [nginx-deployment] in\n namespace cluster2 missing; [nginx-deployment] in namespace default missing; [nginx-deployment]\n in namespace kube-node-lease missing; [nginx-deployment] in namespace kube-public\n missing; [nginx-deployment] in namespace kyverno missing; [nginx-deployment] in\n namespace local-path-storage missing'\n" + } + ] + } + ], + "collected": "0001-01-01T00:00:00Z", + "expires": "0001-01-01T00:00:00Z" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/docs/ocm/final-outputs/compliance-posture.md b/docs/ocm/final-outputs/compliance-posture.md new file mode 100755 index 0000000..f8d4366 --- /dev/null +++ b/docs/ocm/final-outputs/compliance-posture.md @@ -0,0 +1,401 @@ +## Catalog +Electronic Version of NIST SP 800-53 Rev 5.1.1 Controls and SP 800-53A Rev 5.1.1 Assessment Procedures +## Component: Managed Kubernetes +#### Result of control: cm-6 + +Rule ID: test_configuration_check +
Details + + - Subject UUID: 6fade0d6-93fc-11ee-a029-62f79297f1b7 + - Title: Cluster Name: cluster1 + - Result: fail + - Reason: + ``` + - eventName: c2p.policy-high-scan.179e2849d01e8567 + lastTimestamp: "2023-12-06T05:53:26Z" + message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding, + please check if you have CRD deployed + - eventName: c2p.policy-high-scan.179e2848595f9ba9 + lastTimestamp: "2023-12-06T05:53:20Z" + message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite, + please check if you have CRD deployed + - eventName: c2p.policy-high-scan.179e284a97812778 + lastTimestamp: "2023-12-06T05:53:30Z" + message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult, + please check if you have CRD deployed + + ``` + + - Subject UUID: 6fade374-93fc-11ee-a029-62f79297f1b7 + - Title: Cluster Name: cluster2 + - Result: fail + - Reason: + ``` + - eventName: c2p.policy-high-scan.179e284863bfbfab + lastTimestamp: "2023-12-06T05:53:20Z" + message: NonCompliant; violation - couldn't find mapping resource with kind ScanSettingBinding, + please check if you have CRD deployed + - eventName: c2p.policy-high-scan.179e284a53812e10 + lastTimestamp: "2023-12-06T05:53:28Z" + message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceSuite, + please check if you have CRD deployed + - eventName: c2p.policy-high-scan.179e2849950d51e5 + lastTimestamp: "2023-12-06T05:53:25Z" + message: NonCompliant; violation - couldn't find mapping resource with kind ComplianceCheckResult, + please check if you have CRD deployed + + ``` +
+ + +Rule ID: install_kyverno +
Details + + - Subject UUID: 6fade0d6-93fc-11ee-a029-62f79297f1b7 + - Title: Cluster Name: cluster1 + - Result: pass + - Reason: + ``` + - eventName: c2p.policy-install-kyverno-from-manifests.179e284be703d42d + lastTimestamp: "2023-12-06T05:53:35Z" + message: Compliant; notification - clusterroles [kyverno] found as specified, therefore + this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284c7ace2ebf + lastTimestamp: "2023-12-06T05:53:38Z" + message: Compliant; notification - clusterroles [kyverno:admin-generaterequest] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284c9f4c379e + lastTimestamp: "2023-12-06T05:53:38Z" + message: Compliant; notification - clusterroles [kyverno:admin-policies] found as + specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e28504ffc7000 + lastTimestamp: "2023-12-06T05:53:54Z" + message: Compliant; notification - clusterroles [kyverno:admin-policyreport] found + as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284befa43976 + lastTimestamp: "2023-12-06T05:53:35Z" + message: Compliant; notification - clusterroles [kyverno:admin-reports] found as + specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284e6ff55461 + lastTimestamp: "2023-12-06T05:53:46Z" + message: Compliant; notification - clusterroles [kyverno:admin-updaterequest] found + as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e285349215bae + lastTimestamp: "2023-12-06T05:54:07Z" + message: Compliant; notification - clusterroles [kyverno:events] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284d380ed6df + lastTimestamp: "2023-12-06T05:53:41Z" + message: Compliant; notification - clusterroles [kyverno:generate] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2853548333b1 + lastTimestamp: "2023-12-06T05:54:07Z" + message: Compliant; notification - clusterroles [kyverno:policies] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284f80c03d5d + lastTimestamp: "2023-12-06T05:53:51Z" + message: Compliant; notification - clusterroles [kyverno:userinfo] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284ba3c9f6ea + lastTimestamp: "2023-12-06T05:53:34Z" + message: Compliant; notification - clusterroles [kyverno:view] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e28535e612839 + lastTimestamp: "2023-12-06T05:54:07Z" + message: Compliant; notification - clusterroles [kyverno:webhook] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284fcb71f4df + lastTimestamp: "2023-12-06T05:53:52Z" + message: Compliant; notification - clusterrolebindings [kyverno] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e285680fe6ac8 + lastTimestamp: "2023-12-06T05:54:21Z" + message: Compliant; notification - configmaps [kyverno-metrics] in namespace kyverno + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e28524f386c75 + lastTimestamp: "2023-12-06T05:54:03Z" + message: Compliant; notification - configmaps [kyverno] in namespace kyverno found + as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284bf8f4b48b + lastTimestamp: "2023-12-06T05:53:35Z" + message: Compliant; notification - customresourcedefinitions [admissionreports.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284bba53764a + lastTimestamp: "2023-12-06T05:53:34Z" + message: Compliant; notification - customresourcedefinitions [backgroundscanreports.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284fd5dac2d0 + lastTimestamp: "2023-12-06T05:53:52Z" + message: Compliant; notification - customresourcedefinitions [clusteradmissionreports.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284f91c7ac2d + lastTimestamp: "2023-12-06T05:53:51Z" + message: Compliant; notification - customresourcedefinitions [clusterbackgroundscanreports.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2853336f0121 + lastTimestamp: "2023-12-06T05:54:07Z" + message: Compliant; notification - customresourcedefinitions [clusterpolicies.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2853ae517829 + lastTimestamp: "2023-12-06T05:54:09Z" + message: Compliant; notification - customresourcedefinitions [clusterpolicyreports.wgpolicyk8s.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2853bb96886f + lastTimestamp: "2023-12-06T05:54:09Z" + message: Compliant; notification - customresourcedefinitions [generaterequests.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e28567b4ab101 + lastTimestamp: "2023-12-06T05:54:21Z" + message: Compliant; notification - customresourcedefinitions [policies.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e285155b5a7dc + lastTimestamp: "2023-12-06T05:53:58Z" + message: Compliant; notification - customresourcedefinitions [policyreports.wgpolicyk8s.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e285258c5e5f7 + lastTimestamp: "2023-12-06T05:54:03Z" + message: Compliant; notification - customresourcedefinitions [updaterequests.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2856c0192717 + lastTimestamp: "2023-12-06T05:54:22Z" + message: Compliant; notification - deployments [kyverno] in namespace kyverno found + as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2851d0ebe5d4 + lastTimestamp: "2023-12-06T05:54:01Z" + message: Compliant; notification - namespaces [kyverno] found as specified, therefore + this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2851d422c597 + lastTimestamp: "2023-12-06T05:54:01Z" + message: Compliant; notification - roles [kyverno:leaderelection] in namespace kyverno + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e28526cb03284 + lastTimestamp: "2023-12-06T05:54:03Z" + message: Compliant; notification - rolebindings [kyverno:leaderelection] in namespace + kyverno found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e285684956927 + lastTimestamp: "2023-12-06T05:54:21Z" + message: Compliant; notification - services [kyverno-svc-metrics] in namespace kyverno + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e285277e643d2 + lastTimestamp: "2023-12-06T05:54:03Z" + message: Compliant; notification - services [kyverno-svc] in namespace kyverno found + as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2855b441709c + lastTimestamp: "2023-12-06T05:54:17Z" + message: Compliant; notification - serviceaccounts [kyverno] in namespace kyverno + found as specified, therefore this Object template is compliant + + ``` + + - Subject UUID: 6fade374-93fc-11ee-a029-62f79297f1b7 + - Title: Cluster Name: cluster2 + - Result: pass + - Reason: + ``` + - eventName: c2p.policy-install-kyverno-from-manifests.179e284c9a97c784 + lastTimestamp: "2023-12-06T05:53:38Z" + message: Compliant; notification - clusterroles [kyverno] found as specified, therefore + this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284b35375584 + lastTimestamp: "2023-12-06T05:53:32Z" + message: Compliant; notification - clusterroles [kyverno:admin-generaterequest] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284ef4862c6a + lastTimestamp: "2023-12-06T05:53:48Z" + message: Compliant; notification - clusterroles [kyverno:admin-policies] found as + specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284dfd646310 + lastTimestamp: "2023-12-06T05:53:44Z" + message: Compliant; notification - clusterroles [kyverno:admin-policyreport] found + as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284dc9cf5a21 + lastTimestamp: "2023-12-06T05:53:43Z" + message: Compliant; notification - clusterroles [kyverno:admin-reports] found as + specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284b3482ad78 + lastTimestamp: "2023-12-06T05:53:32Z" + message: Compliant; notification - clusterroles [kyverno:admin-updaterequest] found + as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284f07938a0b + lastTimestamp: "2023-12-06T05:53:49Z" + message: Compliant; notification - clusterroles [kyverno:events] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284f17ff00f6 + lastTimestamp: "2023-12-06T05:53:49Z" + message: Compliant; notification - clusterroles [kyverno:generate] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284ca95ae428 + lastTimestamp: "2023-12-06T05:53:38Z" + message: Compliant; notification - clusterroles [kyverno:policies] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284e30919d74 + lastTimestamp: "2023-12-06T05:53:45Z" + message: Compliant; notification - clusterroles [kyverno:userinfo] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284e4527ba38 + lastTimestamp: "2023-12-06T05:53:45Z" + message: Compliant; notification - clusterroles [kyverno:view] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284c5820f7b0 + lastTimestamp: "2023-12-06T05:53:37Z" + message: Compliant; notification - clusterroles [kyverno:webhook] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284dccc3cae5 + lastTimestamp: "2023-12-06T05:53:43Z" + message: Compliant; notification - clusterrolebindings [kyverno] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e285889d4069c + lastTimestamp: "2023-12-06T05:54:29Z" + message: Compliant; notification - configmaps [kyverno-metrics] in namespace kyverno + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2853e3c830c7 + lastTimestamp: "2023-12-06T05:54:09Z" + message: Compliant; notification - configmaps [kyverno] in namespace kyverno found + as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2851c8b54cb1 + lastTimestamp: "2023-12-06T05:54:00Z" + message: Compliant; notification - customresourcedefinitions [admissionreports.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284dda99ee7e + lastTimestamp: "2023-12-06T05:53:44Z" + message: Compliant; notification - customresourcedefinitions [backgroundscanreports.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e284cbfda9c70 + lastTimestamp: "2023-12-06T05:53:39Z" + message: Compliant; notification - customresourcedefinitions [clusteradmissionreports.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2854d3f7806a + lastTimestamp: "2023-12-06T05:54:13Z" + message: Compliant; notification - customresourcedefinitions [clusterbackgroundscanreports.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2856e1ae7593 + lastTimestamp: "2023-12-06T05:54:22Z" + message: Compliant; notification - customresourcedefinitions [clusterpolicies.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2851eb3a6bea + lastTimestamp: "2023-12-06T05:54:01Z" + message: Compliant; notification - customresourcedefinitions [clusterpolicyreports.wgpolicyk8s.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2851282fb972 + lastTimestamp: "2023-12-06T05:53:58Z" + message: Compliant; notification - customresourcedefinitions [generaterequests.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2851fa561a0e + lastTimestamp: "2023-12-06T05:54:01Z" + message: Compliant; notification - customresourcedefinitions [policies.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2854e6af9e7a + lastTimestamp: "2023-12-06T05:54:14Z" + message: Compliant; notification - customresourcedefinitions [policyreports.wgpolicyk8s.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e285334bd6234 + lastTimestamp: "2023-12-06T05:54:07Z" + message: Compliant; notification - customresourcedefinitions [updaterequests.kyverno.io] + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e28588a2bd302 + lastTimestamp: "2023-12-06T05:54:29Z" + message: Compliant; notification - deployments [kyverno] in namespace kyverno found + as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2851d0e23da9 + lastTimestamp: "2023-12-06T05:54:01Z" + message: Compliant; notification - namespaces [kyverno] found as specified, therefore + this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2853398624f1 + lastTimestamp: "2023-12-06T05:54:07Z" + message: Compliant; notification - roles [kyverno:leaderelection] in namespace kyverno + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2858b1db4b8e + lastTimestamp: "2023-12-06T05:54:30Z" + message: Compliant; notification - rolebindings [kyverno:leaderelection] in namespace + kyverno found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2857bc2aa4bd + lastTimestamp: "2023-12-06T05:54:26Z" + message: Compliant; notification - services [kyverno-svc-metrics] in namespace kyverno + found as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e285346ad8e3c + lastTimestamp: "2023-12-06T05:54:07Z" + message: Compliant; notification - services [kyverno-svc] in namespace kyverno found + as specified, therefore this Object template is compliant + - eventName: c2p.policy-install-kyverno-from-manifests.179e2857c388cf77 + lastTimestamp: "2023-12-06T05:54:26Z" + message: Compliant; notification - serviceaccounts [kyverno] in namespace kyverno + found as specified, therefore this Object template is compliant + + ``` +
+ + +Rule ID: test_required_label +
Details + + - Subject UUID: 6fade0d6-93fc-11ee-a029-62f79297f1b7 + - Title: Cluster Name: cluster1 + - Result: fail + - Reason: + ``` + - eventName: c2p.policy-kyverno-require-labels.179e2851c11fe04c + lastTimestamp: "2023-12-06T05:54:00Z" + message: Compliant; notification - clusterpolicies [require-labels] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-kyverno-require-labels.179e2862688eaee7 + lastTimestamp: "2023-12-06T05:55:12Z" + message: 'NonCompliant; violation - policyreports found: [cpol-require-labels] in + namespace local-path-storage' + + ``` + + - Subject UUID: 6fade374-93fc-11ee-a029-62f79297f1b7 + - Title: Cluster Name: cluster2 + - Result: fail + - Reason: + ``` + - eventName: c2p.policy-kyverno-require-labels.179e2855f5ab92dd + lastTimestamp: "2023-12-06T05:54:18Z" + message: Compliant; notification - clusterpolicies [require-labels] found as specified, + therefore this Object template is compliant + - eventName: c2p.policy-kyverno-require-labels.179e2862e1802d28 + lastTimestamp: "2023-12-06T05:55:14Z" + message: 'NonCompliant; violation - policyreports found: [cpol-require-labels] in + namespace local-path-storage' + + ``` +
+ +--- +#### Result of control: cm-2 + +Rule ID: test_proxy_check +
Details + + - Subject UUID: 6fade0d6-93fc-11ee-a029-62f79297f1b7 + - Title: Cluster Name: cluster1 + - Result: fail + - Reason: + ``` + - eventName: c2p.policy-deployment.179e284f776397b3 + lastTimestamp: "2023-12-06T05:53:50Z" + message: 'NonCompliant; violation - deployments not found: [nginx-deployment] in + namespace cluster1 missing; [nginx-deployment] in namespace default missing; [nginx-deployment] + in namespace kube-node-lease missing; [nginx-deployment] in namespace kube-public + missing; [nginx-deployment] in namespace kyverno missing; [nginx-deployment] in + namespace local-path-storage missing' + + ``` + + - Subject UUID: 6fade374-93fc-11ee-a029-62f79297f1b7 + - Title: Cluster Name: cluster2 + - Result: fail + - Reason: + ``` + - eventName: c2p.policy-deployment.179e2854bed6d22e + lastTimestamp: "2023-12-06T05:54:13Z" + message: 'NonCompliant; violation - deployments not found: [nginx-deployment] in + namespace cluster2 missing; [nginx-deployment] in namespace default missing; [nginx-deployment] + in namespace kube-node-lease missing; [nginx-deployment] in namespace kube-public + missing; [nginx-deployment] in namespace kyverno missing; [nginx-deployment] in + namespace local-path-storage missing' + + ``` +
+ +--- diff --git a/docs/ocm/final-outputs/ocm-policies/ConfigMap.c2p.c2p-parameters.yaml b/docs/ocm/final-outputs/ocm-policies/ConfigMap.c2p.c2p-parameters.yaml new file mode 100755 index 0000000..fe7cae6 --- /dev/null +++ b/docs/ocm/final-outputs/ocm-policies/ConfigMap.c2p.c2p-parameters.yaml @@ -0,0 +1,8 @@ +apiVersion: v1 +data: + minimum_nginx_deployment_replicas: "3" +kind: ConfigMap +metadata: + creationTimestamp: null + name: c2p-parameters + namespace: c2p diff --git a/docs/ocm/final-outputs/ocm-policies/Placement.c2p.placement-managed-kubernetes.yaml b/docs/ocm/final-outputs/ocm-policies/Placement.c2p.placement-managed-kubernetes.yaml new file mode 100755 index 0000000..98cc439 --- /dev/null +++ b/docs/ocm/final-outputs/ocm-policies/Placement.c2p.placement-managed-kubernetes.yaml @@ -0,0 +1,14 @@ +apiVersion: cluster.open-cluster-management.io/v1beta1 +kind: Placement +metadata: + name: placement-managed-kubernetes + namespace: c2p +spec: + predicates: + - requiredClusterSelector: + labelSelector: + matchExpressions: + - key: my-cluster + operator: In + values: + - "true" diff --git a/docs/ocm/final-outputs/ocm-policies/PlacementBinding.c2p.policy-set.yaml b/docs/ocm/final-outputs/ocm-policies/PlacementBinding.c2p.policy-set.yaml new file mode 100755 index 0000000..b9de447 --- /dev/null +++ b/docs/ocm/final-outputs/ocm-policies/PlacementBinding.c2p.policy-set.yaml @@ -0,0 +1,13 @@ +apiVersion: policy.open-cluster-management.io/v1 +kind: PlacementBinding +metadata: + name: policy-set + namespace: c2p +placementRef: + apiGroup: cluster.open-cluster-management.io + kind: Placement + name: placement-managed-kubernetes +subjects: +- apiGroup: policy.open-cluster-management.io + kind: PolicySet + name: managed-kubernetes diff --git a/docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-deployment.yaml b/docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-deployment.yaml new file mode 100755 index 0000000..a8c458e --- /dev/null +++ b/docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-deployment.yaml @@ -0,0 +1,53 @@ +apiVersion: policy.open-cluster-management.io/v1 +kind: Policy +metadata: + annotations: + policy.open-cluster-management.io/categories: "" + policy.open-cluster-management.io/controls: cm-2 + policy.open-cluster-management.io/standards: "" + name: policy-deployment + namespace: c2p +spec: + disabled: false + policy-templates: + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-deployment + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: apps/v1 + kind: Deployment + metadata: + labels: + app: nginx + name: nginx-deployment + spec: + replicas: 3 + selector: + matchLabels: + app: nginx + template: + metadata: + labels: + app: nginx + spec: + containers: + - image: nginx:1.21.4 + name: nginx + ports: + - containerPort: 80 + remediationAction: inform + severity: low + remediationAction: inform diff --git a/docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-high-scan.yaml b/docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-high-scan.yaml new file mode 100755 index 0000000..390b861 --- /dev/null +++ b/docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-high-scan.yaml @@ -0,0 +1,100 @@ +apiVersion: policy.open-cluster-management.io/v1 +kind: Policy +metadata: + annotations: + policy.open-cluster-management.io/categories: "" + policy.open-cluster-management.io/controls: cm-6 + policy.open-cluster-management.io/standards: "" + name: policy-high-scan + namespace: c2p +spec: + disabled: false + policy-templates: + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-high-scan + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: compliance.openshift.io/v1alpha1 + kind: ScanSettingBinding + metadata: + name: high + namespace: openshift-compliance + profiles: + - apiGroup: compliance.openshift.io/v1alpha1 + kind: Profile + name: ocp4-high + - apiGroup: compliance.openshift.io/v1alpha1 + kind: Profile + name: ocp4-high-node + settingsRef: + apiGroup: compliance.openshift.io/v1alpha1 + kind: ScanSetting + name: default + remediationAction: inform + severity: high + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-high-scan2 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: compliance.openshift.io/v1alpha1 + kind: ComplianceSuite + metadata: + name: high + namespace: openshift-compliance + status: + phase: DONE + remediationAction: inform + severity: high + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-high-scan3 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: mustnothave + objectDefinition: + apiVersion: compliance.openshift.io/v1alpha1 + kind: ComplianceCheckResult + metadata: + labels: + compliance.openshift.io/check-status: FAIL + compliance.openshift.io/suite: high + namespace: openshift-compliance + remediationAction: inform + severity: high + remediationAction: inform diff --git a/docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-install-kyverno-from-manifests.yaml b/docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-install-kyverno-from-manifests.yaml new file mode 100755 index 0000000..04db4e2 --- /dev/null +++ b/docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-install-kyverno-from-manifests.yaml @@ -0,0 +1,32668 @@ +apiVersion: policy.open-cluster-management.io/v1 +kind: Policy +metadata: + annotations: + policy.open-cluster-management.io/categories: "" + policy.open-cluster-management.io/controls: cm-6 + policy.open-cluster-management.io/standards: "" + name: policy-install-kyverno-from-manifests + namespace: c2p +spec: + disabled: false + policy-templates: + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + aggregationRule: + clusterRoleSelectors: + - matchLabels: + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests2 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + rbac.authorization.k8s.io/aggregate-to-admin: "true" + name: kyverno:admin-generaterequest + rules: + - apiGroups: + - kyverno.io + resources: + - generaterequests + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests3 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + rbac.authorization.k8s.io/aggregate-to-admin: "true" + name: kyverno:admin-policies + rules: + - apiGroups: + - kyverno.io + resources: + - policies + - clusterpolicies + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests4 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + rbac.authorization.k8s.io/aggregate-to-admin: "true" + name: kyverno:admin-policyreport + rules: + - apiGroups: + - wgpolicyk8s.io + resources: + - policyreports + - clusterpolicyreports + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests5 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + rbac.authorization.k8s.io/aggregate-to-admin: "true" + name: kyverno:admin-reports + rules: + - apiGroups: + - kyverno.io + resources: + - admissionreports + - clusteradmissionreports + - backgroundscanreports + - clusterbackgroundscanreports + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests6 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + rbac.authorization.k8s.io/aggregate-to-admin: "true" + name: kyverno:admin-updaterequest + rules: + - apiGroups: + - kyverno.io + resources: + - updaterequests + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests7 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:events + rules: + - apiGroups: + - '*' + resources: + - events + verbs: + - create + - update + - patch + - delete + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests8 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:generate + rules: + - apiGroups: + - networking.k8s.io + resources: + - ingresses + - ingressclasses + - networkpolicies + verbs: + - create + - update + - patch + - delete + - apiGroups: + - "" + resources: + - namespaces + - configmaps + - secrets + - resourcequotas + - limitranges + verbs: + - create + - update + - patch + - delete + - apiGroups: + - rbac.authorization.k8s.io + resources: + - rolebindings + - roles + verbs: + - create + - update + - patch + - delete + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests9 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:policies + rules: + - apiGroups: + - kyverno.io + resources: + - policies + - policies/status + - clusterpolicies + - clusterpolicies/status + - generaterequests + - generaterequests/status + - updaterequests + - updaterequests/status + - admissionreports + - clusteradmissionreports + - backgroundscanreports + - clusterbackgroundscanreports + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + - deletecollection + - apiGroups: + - wgpolicyk8s.io + resources: + - policyreports + - policyreports/status + - clusterpolicyreports + - clusterpolicyreports/status + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + - deletecollection + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests10 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:userinfo + rules: + - apiGroups: + - rbac.authorization.k8s.io + resources: + - roles + - clusterroles + - rolebindings + - clusterrolebindings + verbs: + - watch + - list + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests11 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:view + rules: + - apiGroups: + - '*' + resources: + - '*' + verbs: + - get + - list + - watch + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests12 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRole + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:webhook + rules: + - apiGroups: + - admissionregistration.k8s.io + resources: + - mutatingwebhookconfigurations + - validatingwebhookconfigurations + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests13 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: rbac.authorization.k8s.io/v1 + kind: ClusterRoleBinding + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: kyverno + subjects: + - kind: ServiceAccount + name: kyverno + namespace: kyverno + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests14 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: v1 + data: + namespaces: '{"exclude":[],"include":[]}' + kind: ConfigMap + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno-metrics + namespace: kyverno + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests15 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: v1 + data: + resourceFilters: '[*,kyverno,*][Event,*,*][*,kube-system,*][*,kube-public,*][*,kube-node-lease,*][Node,*,*][APIService,*,*][TokenReview,*,*][SubjectAccessReview,*,*][SelfSubjectAccessReview,*,*][Binding,*,*][ReplicaSet,*,*][AdmissionReport,*,*][ClusterAdmissionReport,*,*][BackgroundScanReport,*,*][ClusterBackgroundScanReport,*,*][ClusterRole,*,kyverno:*][ClusterRoleBinding,*,kyverno:*][ServiceAccount,kyverno,kyverno][ConfigMap,kyverno,kyverno][ConfigMap,kyverno,kyverno-metrics][Deployment,kyverno,kyverno][Job,kyverno,kyverno-hook-pre-delete][NetworkPolicy,kyverno,kyverno][PodDisruptionBudget,kyverno,kyverno][Role,kyverno,kyverno:*][RoleBinding,kyverno,kyverno:*][Secret,kyverno,kyverno-svc.kyverno.svc.*][Service,kyverno,kyverno-svc][Service,kyverno,kyverno-svc-metrics][ServiceMonitor,kyverno,kyverno-svc-service-monitor][Pod,kyverno,kyverno-test]' + webhooks: '[{"namespaceSelector": {"matchExpressions": [{"key":"kubernetes.io/metadata.name","operator":"NotIn","values":["kyverno"]}]}}]' + kind: ConfigMap + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno + namespace: kyverno + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests16 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: apiextensions.k8s.io/v1 + kind: CustomResourceDefinition + metadata: + annotations: + config.kubernetes.io/index: "1" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "1" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: admissionreports.kyverno.io + spec: + group: kyverno.io + names: + categories: + - kyverno + kind: AdmissionReport + listKind: AdmissionReportList + plural: admissionreports + shortNames: + - admr + singular: admissionreport + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .metadata.ownerReferences[0].apiVersion + name: ApiVersion + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].kind + name: Kind + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].name + name: Subject + priority: 1 + type: string + - jsonPath: .spec.summary.pass + name: Pass + type: integer + - jsonPath: .spec.summary.fail + name: Fail + type: integer + - jsonPath: .spec.summary.warn + name: Warn + type: integer + - jsonPath: .spec.summary.error + name: Error + type: integer + - jsonPath: .spec.summary.skip + name: Skip + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + - jsonPath: .metadata.labels['audit\.kyverno\.io/resource\.hash'] + name: Hash + priority: 1 + type: string + - jsonPath: .metadata.labels['audit\.kyverno\.io/report\.aggregate'] + name: AGGREGATE + priority: 1 + type: string + name: v1alpha2 + schema: + openAPIV3Schema: + description: AdmissionReport is the Schema for the AdmissionReports + API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this + representation of an object. Servers should convert recognized + schemas to the latest internal value, and may reject unrecognized + values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST + resource this object represents. Servers may infer this + from the endpoint the client submits requests to. Cannot + be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + properties: + owner: + description: Owner is a reference to the report owner + (e.g. a Deployment, Namespace, or Node) + properties: + apiVersion: + description: API version of the referent. + type: string + blockOwnerDeletion: + description: If true, AND if the owner has the "foregroundDeletion" + finalizer, then the owner cannot be deleted from + the key-value store until this reference is removed. + See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion + for how the garbage collector interacts with this + field and enforces the foreground deletion. Defaults + to false. To set this field, a user needs "delete" + permission of the owner, otherwise 422 (Unprocessable + Entity) will be returned. + type: boolean + controller: + description: If true, this reference points to the + managing controller. + type: boolean + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#names' + type: string + uid: + description: 'UID of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#uids' + type: string + required: + - apiVersion + - kind + - name + - uid + type: object + x-kubernetes-map-type: atomic + results: + description: PolicyReportResult provides result details + items: + description: PolicyReportResult provides the result + for an individual policy + properties: + category: + description: Category indicates policy category + type: string + message: + description: Description is a short user friendly + message for the policy rule + type: string + policy: + description: Policy is the name or identifier of + the policy + type: string + properties: + additionalProperties: + type: string + description: Properties provides additional information + for the policy rule + type: object + resourceSelector: + description: SubjectSelector is an optional label + selector for checked Kubernetes resources. For + example, a policy result may apply to all pods + that match a label. Either a Subject or a SubjectSelector + can be specified. If neither are provided, the + result is assumed to be for the policy report + scope. + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + resources: + description: Subjects is an optional reference to + the checked Kubernetes resources + items: + description: "ObjectReference contains enough + information to let you inspect or modify the + referred object. --- New uses of this type are + discouraged because of difficulty describing + its usage when embedded in APIs. 1. Ignored + fields. It includes many fields which are not + generally honored. For instance, ResourceVersion + and FieldPath are both very rarely valid in + actual usage. 2. Invalid usage help. It is + impossible to add specific help for individual + usage. In most embedded usages, there are particular + restrictions like, \"must refer only to types + A and B\" or \"UID not honored\" or \"name must + be restricted\". Those cannot be well described + when embedded. 3. Inconsistent validation. Because + the usages are different, the validation rules + are different by usage, which makes it hard + for users to predict what will happen. 4. The + fields are both imprecise and overly precise. + \ Kind is not a precise mapping to a URL. This + can produce ambiguity during interpretation + and require a REST mapping. In most cases, + the dependency is on the group,resource tuple + and the version of the actual struct is irrelevant. + 5. We cannot easily change it. Because this + type is embedded in many locations, updates + to this type will affect numerous schemas. Don't + make new APIs embed an underspecified API type + they do not control. \n Instead of using this + type, create a locally provided and used type + that is well-focused on your reference. For + example, ServiceReferences for admission registration: + https://github.com/kubernetes/api/blob/release-1.17/admissionregistration/v1/types.go#L533 + ." + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an + object instead of an entire object, this + string should contain a valid JSON/Go field + access statement, such as desiredState.manifest.containers[2]. + For example, if the object reference is + to a container within a pod, this would + take on a value like: "spec.containers{name}" + (where "name" refers to the name of the + container that triggered the event) or if + no container name is specified "spec.containers[2]" + (container with index 2 in this pod). This + syntax is chosen only to have some well-defined + way of referencing a part of an object. + TODO: this design is not final and this + field is subject to change in the future.' + type: string + kind: + description: 'Kind of the referent. More info: + https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: + https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More + info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to + which this reference is made, if any. More + info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: + https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + type: array + result: + description: Result indicates the outcome of the + policy rule execution + enum: + - pass + - fail + - warn + - error + - skip + type: string + rule: + description: Rule is the name or identifier of the + rule within the policy + type: string + scored: + description: Scored indicates if this result is + scored + type: boolean + severity: + description: Severity indicates policy check result + criticality + enum: + - critical + - high + - low + - medium + - info + type: string + source: + description: Source is an identifier for the policy + engine that manages this report + type: string + timestamp: + description: Timestamp indicates the time the result + was found + properties: + nanos: + description: Non-negative fractions of a second + at nanosecond resolution. Negative second + values with fractions must still have non-negative + nanos values that count forward in time. Must + be from 0 to 999,999,999 inclusive. This field + may be limited in precision depending on context. + format: int32 + type: integer + seconds: + description: Represents seconds of UTC time + since Unix epoch 1970-01-01T00:00:00Z. Must + be from 0001-01-01T00:00:00Z to 9999-12-31T23:59:59Z + inclusive. + format: int64 + type: integer + required: + - nanos + - seconds + type: object + required: + - policy + type: object + type: array + summary: + description: PolicyReportSummary provides a summary of + results + properties: + error: + description: Error provides the count of policies + that could not be evaluated + type: integer + fail: + description: Fail provides the count of policies whose + requirements were not met + type: integer + pass: + description: Pass provides the count of policies whose + requirements were met + type: integer + skip: + description: Skip indicates the count of policies + that were not selected for evaluation + type: integer + warn: + description: Warn provides the count of non-scored + policies whose requirements were not met + type: integer + type: object + required: + - owner + type: object + required: + - spec + type: object + served: true + storage: true + subresources: {} + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests17 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: apiextensions.k8s.io/v1 + kind: CustomResourceDefinition + metadata: + annotations: + config.kubernetes.io/index: "2" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "2" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: backgroundscanreports.kyverno.io + spec: + group: kyverno.io + names: + categories: + - kyverno + kind: BackgroundScanReport + listKind: BackgroundScanReportList + plural: backgroundscanreports + shortNames: + - bgscanr + singular: backgroundscanreport + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .metadata.ownerReferences[0].apiVersion + name: ApiVersion + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].kind + name: Kind + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].name + name: Subject + priority: 1 + type: string + - jsonPath: .spec.summary.pass + name: Pass + type: integer + - jsonPath: .spec.summary.fail + name: Fail + type: integer + - jsonPath: .spec.summary.warn + name: Warn + type: integer + - jsonPath: .spec.summary.error + name: Error + type: integer + - jsonPath: .spec.summary.skip + name: Skip + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + - jsonPath: .metadata.labels['audit\.kyverno\.io/resource\.hash'] + name: Hash + priority: 1 + type: string + name: v1alpha2 + schema: + openAPIV3Schema: + description: BackgroundScanReport is the Schema for the BackgroundScanReports + API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this + representation of an object. Servers should convert recognized + schemas to the latest internal value, and may reject unrecognized + values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST + resource this object represents. Servers may infer this + from the endpoint the client submits requests to. Cannot + be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + properties: + results: + description: PolicyReportResult provides result details + items: + description: PolicyReportResult provides the result + for an individual policy + properties: + category: + description: Category indicates policy category + type: string + message: + description: Description is a short user friendly + message for the policy rule + type: string + policy: + description: Policy is the name or identifier of + the policy + type: string + properties: + additionalProperties: + type: string + description: Properties provides additional information + for the policy rule + type: object + resourceSelector: + description: SubjectSelector is an optional label + selector for checked Kubernetes resources. For + example, a policy result may apply to all pods + that match a label. Either a Subject or a SubjectSelector + can be specified. If neither are provided, the + result is assumed to be for the policy report + scope. + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + resources: + description: Subjects is an optional reference to + the checked Kubernetes resources + items: + description: "ObjectReference contains enough + information to let you inspect or modify the + referred object. --- New uses of this type are + discouraged because of difficulty describing + its usage when embedded in APIs. 1. Ignored + fields. It includes many fields which are not + generally honored. For instance, ResourceVersion + and FieldPath are both very rarely valid in + actual usage. 2. Invalid usage help. It is + impossible to add specific help for individual + usage. In most embedded usages, there are particular + restrictions like, \"must refer only to types + A and B\" or \"UID not honored\" or \"name must + be restricted\". Those cannot be well described + when embedded. 3. Inconsistent validation. Because + the usages are different, the validation rules + are different by usage, which makes it hard + for users to predict what will happen. 4. The + fields are both imprecise and overly precise. + \ Kind is not a precise mapping to a URL. This + can produce ambiguity during interpretation + and require a REST mapping. In most cases, + the dependency is on the group,resource tuple + and the version of the actual struct is irrelevant. + 5. We cannot easily change it. Because this + type is embedded in many locations, updates + to this type will affect numerous schemas. Don't + make new APIs embed an underspecified API type + they do not control. \n Instead of using this + type, create a locally provided and used type + that is well-focused on your reference. For + example, ServiceReferences for admission registration: + https://github.com/kubernetes/api/blob/release-1.17/admissionregistration/v1/types.go#L533 + ." + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an + object instead of an entire object, this + string should contain a valid JSON/Go field + access statement, such as desiredState.manifest.containers[2]. + For example, if the object reference is + to a container within a pod, this would + take on a value like: "spec.containers{name}" + (where "name" refers to the name of the + container that triggered the event) or if + no container name is specified "spec.containers[2]" + (container with index 2 in this pod). This + syntax is chosen only to have some well-defined + way of referencing a part of an object. + TODO: this design is not final and this + field is subject to change in the future.' + type: string + kind: + description: 'Kind of the referent. More info: + https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: + https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More + info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to + which this reference is made, if any. More + info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: + https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + type: array + result: + description: Result indicates the outcome of the + policy rule execution + enum: + - pass + - fail + - warn + - error + - skip + type: string + rule: + description: Rule is the name or identifier of the + rule within the policy + type: string + scored: + description: Scored indicates if this result is + scored + type: boolean + severity: + description: Severity indicates policy check result + criticality + enum: + - critical + - high + - low + - medium + - info + type: string + source: + description: Source is an identifier for the policy + engine that manages this report + type: string + timestamp: + description: Timestamp indicates the time the result + was found + properties: + nanos: + description: Non-negative fractions of a second + at nanosecond resolution. Negative second + values with fractions must still have non-negative + nanos values that count forward in time. Must + be from 0 to 999,999,999 inclusive. This field + may be limited in precision depending on context. + format: int32 + type: integer + seconds: + description: Represents seconds of UTC time + since Unix epoch 1970-01-01T00:00:00Z. Must + be from 0001-01-01T00:00:00Z to 9999-12-31T23:59:59Z + inclusive. + format: int64 + type: integer + required: + - nanos + - seconds + type: object + required: + - policy + type: object + type: array + summary: + description: PolicyReportSummary provides a summary of + results + properties: + error: + description: Error provides the count of policies + that could not be evaluated + type: integer + fail: + description: Fail provides the count of policies whose + requirements were not met + type: integer + pass: + description: Pass provides the count of policies whose + requirements were met + type: integer + skip: + description: Skip indicates the count of policies + that were not selected for evaluation + type: integer + warn: + description: Warn provides the count of non-scored + policies whose requirements were not met + type: integer + type: object + type: object + required: + - spec + type: object + served: true + storage: true + subresources: {} + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests18 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: apiextensions.k8s.io/v1 + kind: CustomResourceDefinition + metadata: + annotations: + config.kubernetes.io/index: "3" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "3" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: clusteradmissionreports.kyverno.io + spec: + group: kyverno.io + names: + categories: + - kyverno + kind: ClusterAdmissionReport + listKind: ClusterAdmissionReportList + plural: clusteradmissionreports + shortNames: + - cadmr + singular: clusteradmissionreport + scope: Cluster + versions: + - additionalPrinterColumns: + - jsonPath: .metadata.ownerReferences[0].apiVersion + name: ApiVersion + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].kind + name: Kind + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].name + name: Subject + priority: 1 + type: string + - jsonPath: .spec.summary.pass + name: Pass + type: integer + - jsonPath: .spec.summary.fail + name: Fail + type: integer + - jsonPath: .spec.summary.warn + name: Warn + type: integer + - jsonPath: .spec.summary.error + name: Error + type: integer + - jsonPath: .spec.summary.skip + name: Skip + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + - jsonPath: .metadata.labels['audit\.kyverno\.io/resource\.hash'] + name: Hash + priority: 1 + type: string + - jsonPath: .metadata.labels['audit\.kyverno\.io/report\.aggregate'] + name: AGGREGATE + priority: 1 + type: string + name: v1alpha2 + schema: + openAPIV3Schema: + description: ClusterAdmissionReport is the Schema for the ClusterAdmissionReports + API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this + representation of an object. Servers should convert recognized + schemas to the latest internal value, and may reject unrecognized + values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST + resource this object represents. Servers may infer this + from the endpoint the client submits requests to. Cannot + be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + properties: + owner: + description: Owner is a reference to the report owner + (e.g. a Deployment, Namespace, or Node) + properties: + apiVersion: + description: API version of the referent. + type: string + blockOwnerDeletion: + description: If true, AND if the owner has the "foregroundDeletion" + finalizer, then the owner cannot be deleted from + the key-value store until this reference is removed. + See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion + for how the garbage collector interacts with this + field and enforces the foreground deletion. Defaults + to false. To set this field, a user needs "delete" + permission of the owner, otherwise 422 (Unprocessable + Entity) will be returned. + type: boolean + controller: + description: If true, this reference points to the + managing controller. + type: boolean + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#names' + type: string + uid: + description: 'UID of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#uids' + type: string + required: + - apiVersion + - kind + - name + - uid + type: object + x-kubernetes-map-type: atomic + results: + description: PolicyReportResult provides result details + items: + description: PolicyReportResult provides the result + for an individual policy + properties: + category: + description: Category indicates policy category + type: string + message: + description: Description is a short user friendly + message for the policy rule + type: string + policy: + description: Policy is the name or identifier of + the policy + type: string + properties: + additionalProperties: + type: string + description: Properties provides additional information + for the policy rule + type: object + resourceSelector: + description: SubjectSelector is an optional label + selector for checked Kubernetes resources. For + example, a policy result may apply to all pods + that match a label. Either a Subject or a SubjectSelector + can be specified. If neither are provided, the + result is assumed to be for the policy report + scope. + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + resources: + description: Subjects is an optional reference to + the checked Kubernetes resources + items: + description: "ObjectReference contains enough + information to let you inspect or modify the + referred object. --- New uses of this type are + discouraged because of difficulty describing + its usage when embedded in APIs. 1. Ignored + fields. It includes many fields which are not + generally honored. For instance, ResourceVersion + and FieldPath are both very rarely valid in + actual usage. 2. Invalid usage help. It is + impossible to add specific help for individual + usage. In most embedded usages, there are particular + restrictions like, \"must refer only to types + A and B\" or \"UID not honored\" or \"name must + be restricted\". Those cannot be well described + when embedded. 3. Inconsistent validation. Because + the usages are different, the validation rules + are different by usage, which makes it hard + for users to predict what will happen. 4. The + fields are both imprecise and overly precise. + \ Kind is not a precise mapping to a URL. This + can produce ambiguity during interpretation + and require a REST mapping. In most cases, + the dependency is on the group,resource tuple + and the version of the actual struct is irrelevant. + 5. We cannot easily change it. Because this + type is embedded in many locations, updates + to this type will affect numerous schemas. Don't + make new APIs embed an underspecified API type + they do not control. \n Instead of using this + type, create a locally provided and used type + that is well-focused on your reference. For + example, ServiceReferences for admission registration: + https://github.com/kubernetes/api/blob/release-1.17/admissionregistration/v1/types.go#L533 + ." + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an + object instead of an entire object, this + string should contain a valid JSON/Go field + access statement, such as desiredState.manifest.containers[2]. + For example, if the object reference is + to a container within a pod, this would + take on a value like: "spec.containers{name}" + (where "name" refers to the name of the + container that triggered the event) or if + no container name is specified "spec.containers[2]" + (container with index 2 in this pod). This + syntax is chosen only to have some well-defined + way of referencing a part of an object. + TODO: this design is not final and this + field is subject to change in the future.' + type: string + kind: + description: 'Kind of the referent. More info: + https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: + https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More + info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to + which this reference is made, if any. More + info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: + https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + type: array + result: + description: Result indicates the outcome of the + policy rule execution + enum: + - pass + - fail + - warn + - error + - skip + type: string + rule: + description: Rule is the name or identifier of the + rule within the policy + type: string + scored: + description: Scored indicates if this result is + scored + type: boolean + severity: + description: Severity indicates policy check result + criticality + enum: + - critical + - high + - low + - medium + - info + type: string + source: + description: Source is an identifier for the policy + engine that manages this report + type: string + timestamp: + description: Timestamp indicates the time the result + was found + properties: + nanos: + description: Non-negative fractions of a second + at nanosecond resolution. Negative second + values with fractions must still have non-negative + nanos values that count forward in time. Must + be from 0 to 999,999,999 inclusive. This field + may be limited in precision depending on context. + format: int32 + type: integer + seconds: + description: Represents seconds of UTC time + since Unix epoch 1970-01-01T00:00:00Z. Must + be from 0001-01-01T00:00:00Z to 9999-12-31T23:59:59Z + inclusive. + format: int64 + type: integer + required: + - nanos + - seconds + type: object + required: + - policy + type: object + type: array + summary: + description: PolicyReportSummary provides a summary of + results + properties: + error: + description: Error provides the count of policies + that could not be evaluated + type: integer + fail: + description: Fail provides the count of policies whose + requirements were not met + type: integer + pass: + description: Pass provides the count of policies whose + requirements were met + type: integer + skip: + description: Skip indicates the count of policies + that were not selected for evaluation + type: integer + warn: + description: Warn provides the count of non-scored + policies whose requirements were not met + type: integer + type: object + required: + - owner + type: object + required: + - spec + type: object + served: true + storage: true + subresources: {} + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests19 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: apiextensions.k8s.io/v1 + kind: CustomResourceDefinition + metadata: + annotations: + config.kubernetes.io/index: "4" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "4" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: clusterbackgroundscanreports.kyverno.io + spec: + group: kyverno.io + names: + categories: + - kyverno + kind: ClusterBackgroundScanReport + listKind: ClusterBackgroundScanReportList + plural: clusterbackgroundscanreports + shortNames: + - cbgscanr + singular: clusterbackgroundscanreport + scope: Cluster + versions: + - additionalPrinterColumns: + - jsonPath: .metadata.ownerReferences[0].apiVersion + name: ApiVersion + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].kind + name: Kind + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].name + name: Subject + priority: 1 + type: string + - jsonPath: .spec.summary.pass + name: Pass + type: integer + - jsonPath: .spec.summary.fail + name: Fail + type: integer + - jsonPath: .spec.summary.warn + name: Warn + type: integer + - jsonPath: .spec.summary.error + name: Error + type: integer + - jsonPath: .spec.summary.skip + name: Skip + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + - jsonPath: .metadata.labels['audit\.kyverno\.io/resource\.hash'] + name: Hash + priority: 1 + type: string + name: v1alpha2 + schema: + openAPIV3Schema: + description: ClusterBackgroundScanReport is the Schema for the + ClusterBackgroundScanReports API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this + representation of an object. Servers should convert recognized + schemas to the latest internal value, and may reject unrecognized + values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST + resource this object represents. Servers may infer this + from the endpoint the client submits requests to. Cannot + be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + properties: + results: + description: PolicyReportResult provides result details + items: + description: PolicyReportResult provides the result + for an individual policy + properties: + category: + description: Category indicates policy category + type: string + message: + description: Description is a short user friendly + message for the policy rule + type: string + policy: + description: Policy is the name or identifier of + the policy + type: string + properties: + additionalProperties: + type: string + description: Properties provides additional information + for the policy rule + type: object + resourceSelector: + description: SubjectSelector is an optional label + selector for checked Kubernetes resources. For + example, a policy result may apply to all pods + that match a label. Either a Subject or a SubjectSelector + can be specified. If neither are provided, the + result is assumed to be for the policy report + scope. + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + resources: + description: Subjects is an optional reference to + the checked Kubernetes resources + items: + description: "ObjectReference contains enough + information to let you inspect or modify the + referred object. --- New uses of this type are + discouraged because of difficulty describing + its usage when embedded in APIs. 1. Ignored + fields. It includes many fields which are not + generally honored. For instance, ResourceVersion + and FieldPath are both very rarely valid in + actual usage. 2. Invalid usage help. It is + impossible to add specific help for individual + usage. In most embedded usages, there are particular + restrictions like, \"must refer only to types + A and B\" or \"UID not honored\" or \"name must + be restricted\". Those cannot be well described + when embedded. 3. Inconsistent validation. Because + the usages are different, the validation rules + are different by usage, which makes it hard + for users to predict what will happen. 4. The + fields are both imprecise and overly precise. + \ Kind is not a precise mapping to a URL. This + can produce ambiguity during interpretation + and require a REST mapping. In most cases, + the dependency is on the group,resource tuple + and the version of the actual struct is irrelevant. + 5. We cannot easily change it. Because this + type is embedded in many locations, updates + to this type will affect numerous schemas. Don't + make new APIs embed an underspecified API type + they do not control. \n Instead of using this + type, create a locally provided and used type + that is well-focused on your reference. For + example, ServiceReferences for admission registration: + https://github.com/kubernetes/api/blob/release-1.17/admissionregistration/v1/types.go#L533 + ." + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an + object instead of an entire object, this + string should contain a valid JSON/Go field + access statement, such as desiredState.manifest.containers[2]. + For example, if the object reference is + to a container within a pod, this would + take on a value like: "spec.containers{name}" + (where "name" refers to the name of the + container that triggered the event) or if + no container name is specified "spec.containers[2]" + (container with index 2 in this pod). This + syntax is chosen only to have some well-defined + way of referencing a part of an object. + TODO: this design is not final and this + field is subject to change in the future.' + type: string + kind: + description: 'Kind of the referent. More info: + https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: + https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More + info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to + which this reference is made, if any. More + info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: + https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + type: array + result: + description: Result indicates the outcome of the + policy rule execution + enum: + - pass + - fail + - warn + - error + - skip + type: string + rule: + description: Rule is the name or identifier of the + rule within the policy + type: string + scored: + description: Scored indicates if this result is + scored + type: boolean + severity: + description: Severity indicates policy check result + criticality + enum: + - critical + - high + - low + - medium + - info + type: string + source: + description: Source is an identifier for the policy + engine that manages this report + type: string + timestamp: + description: Timestamp indicates the time the result + was found + properties: + nanos: + description: Non-negative fractions of a second + at nanosecond resolution. Negative second + values with fractions must still have non-negative + nanos values that count forward in time. Must + be from 0 to 999,999,999 inclusive. This field + may be limited in precision depending on context. + format: int32 + type: integer + seconds: + description: Represents seconds of UTC time + since Unix epoch 1970-01-01T00:00:00Z. Must + be from 0001-01-01T00:00:00Z to 9999-12-31T23:59:59Z + inclusive. + format: int64 + type: integer + required: + - nanos + - seconds + type: object + required: + - policy + type: object + type: array + summary: + description: PolicyReportSummary provides a summary of + results + properties: + error: + description: Error provides the count of policies + that could not be evaluated + type: integer + fail: + description: Fail provides the count of policies whose + requirements were not met + type: integer + pass: + description: Pass provides the count of policies whose + requirements were met + type: integer + skip: + description: Skip indicates the count of policies + that were not selected for evaluation + type: integer + warn: + description: Warn provides the count of non-scored + policies whose requirements were not met + type: integer + type: object + type: object + required: + - spec + type: object + served: true + storage: true + subresources: {} + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests20 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: apiextensions.k8s.io/v1 + kind: CustomResourceDefinition + metadata: + annotations: + config.kubernetes.io/index: "5" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "5" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: clusterpolicies.kyverno.io + spec: + group: kyverno.io + names: + categories: + - kyverno + kind: ClusterPolicy + listKind: ClusterPolicyList + plural: clusterpolicies + shortNames: + - cpol + singular: clusterpolicy + scope: Cluster + versions: + - additionalPrinterColumns: + - jsonPath: .spec.background + name: Background + type: boolean + - jsonPath: .spec.validationFailureAction + name: Validate Action + type: string + - jsonPath: .spec.failurePolicy + name: Failure Policy + priority: 1 + type: string + - jsonPath: .status.ready + name: Ready + type: boolean + name: v1 + schema: + openAPIV3Schema: + description: ClusterPolicy declares validation, mutation, and + generation behaviors for matching resources. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this + representation of an object. Servers should convert recognized + schemas to the latest internal value, and may reject unrecognized + values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST + resource this object represents. Servers may infer this + from the endpoint the client submits requests to. Cannot + be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: Spec declares policy behaviors. + properties: + applyRules: + description: ApplyRules controls how rules in a policy + are applied. Rule are processed in the order of declaration. + When set to `One` processing stops after a rule has + been applied i.e. the rule matches and results in a + pass, fail, or error. When set to `All` all rules in + the policy are processed. The default is `All`. + enum: + - All + - One + type: string + background: + default: true + description: Background controls if rules are applied + to existing resources during a background scan. Optional. + Default value is "true". The value must be set to "false" + if the policy rule uses variables that are only available + in the admission review request (e.g. user name). + type: boolean + failurePolicy: + description: FailurePolicy defines how unexpected policy + errors and webhook response timeout errors are handled. + Rules within the same policy share the same failure + behavior. Allowed values are Ignore or Fail. Defaults + to Fail. + enum: + - Ignore + - Fail + type: string + generateExistingOnPolicyUpdate: + description: GenerateExistingOnPolicyUpdate controls whether + to trigger generate rule in existing resources If is + set to "true" generate rule will be triggered and applied + to existing matched resources. Defaults to "false" if + not specified. + type: boolean + mutateExistingOnPolicyUpdate: + description: MutateExistingOnPolicyUpdate controls if + a mutateExisting policy is applied on policy events. + Default value is "false". + type: boolean + rules: + description: Rules is a list of Rule instances. A Policy + contains multiple rules and each rule can validate, + mutate, or generate resources. + items: + description: Rule defines a validation, mutation, or + generation control for matching resources. Each rules + contains a match declaration to select resources, + and an optional exclude declaration to specify which + resources to exclude. + properties: + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and data + sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON data + retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to + transform the JSON response returned + from the API server. For example a JMESPath + of "items | length(@)" applied to the + API server response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to + be used in the HTTP GET request to the + Kubernetes API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). The + format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to + transform the ImageData struct returned + as a result of processing the image + reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be defined + inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take + if the JMESPath expression evaluates + to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary JSON + object representable in YAML or JSON + form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this + policy rule should not be applied. The exclude + criteria can include resource information (e.g. + kind, name, namespace, labels) and admission review + request information like the name or role. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + Requires at least one tag to be specified + when under MatchResources. Specifying ResourceDescription + directly under match is being deprecated. + Please specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) + and "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). NOTE: + "Name" is being deprecated in favor of + "Names".' + type: string + names: + description: Names are the names of the + resources. Each name supports wildcard + characters "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. + This array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of + {key,value} pairs. A single {key,value} + in the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are + ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` + support the wildcard characters `*` (matches + zero or many characters) and `?` (matches + one character). Wildcards allows writing + label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] matches + any key and value but does not match an + empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. + This array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of + {key,value} pairs. A single {key,value} + in the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are + ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a role + binding applies to. This can either hold + a direct API object reference, or a value + for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults + to "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are + "User", "Group", and "ServiceAccount". + If the Authorizer does not recognized + the kind value, the Authorizer should + report an error. + type: string + name: + description: Name of the object being + referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this + value is not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + generate: + description: Generation is used to create new resources. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + clone: + description: Clone specifies the source resource + used to populate each generated resource. + At most one of Data or Clone can be specified. + If neither are provided, the generated resource + will be created with default data only. + properties: + name: + description: Name specifies name of the + resource. + type: string + namespace: + description: Namespace specifies source + resource namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list of + source resource used to populate each generated + resource. + properties: + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source + resource namespace. + type: string + selector: + description: Selector is a label selector. + Label keys and values in `matchLabels`. + wildcard characters are not supported. + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. + This array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of + {key,value} pairs. A single {key,value} + in the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are + ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource declaration + used to populate each generated resource. + At most one of Data or Clone must be specified. + If neither are provided, the generated resource + will be created with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + synchronize: + description: Synchronize controls if generated + resources should be kept in-sync with their + source resource. If Synchronize is set to + "true" changes to generated resources will + be overwritten with resource data from Data + or the resource specified in the Clone declaration. + Optional. Defaults to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name of + the field within 'path' that will be used + to uniquely identify an image. Note - + this field MUST be unique. + type: string + name: + description: Name is the entry the image + will be available under 'images.' + in the context. If this field is not defined, + image entries will appear under 'images.custom'. + type: string + path: + description: Path is the path to the object + containing the image field in a custom + resource. It should be slash-separated. + Each slash-separated key must be a valid + YAML key or a wildcard '*'. Wildcard keys + are expanded in case of arrays or objects. + type: string + value: + description: Value is an optional name of + the field within 'path' that points to + the image URI. This is useful when a custom + 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping from + kinds to ImageExtractorConfigs. This config is + only valid for verifyImages rules. + type: object + match: + description: MatchResources defines when this policy + rule should be applied. The match criteria can + include resource information (e.g. kind, name, + namespace, labels) and admission review request + information like the user name or role. At least + one kind is required. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + Requires at least one tag to be specified + when under MatchResources. Specifying ResourceDescription + directly under match is being deprecated. + Please specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) + and "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). NOTE: + "Name" is being deprecated in favor of + "Names".' + type: string + names: + description: Names are the names of the + resources. Each name supports wildcard + characters "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. + This array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of + {key,value} pairs. A single {key,value} + in the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are + ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` + support the wildcard characters `*` (matches + zero or many characters) and `?` (matches + one character). Wildcards allows writing + label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] matches + any key and value but does not match an + empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. + This array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of + {key,value} pairs. A single {key,value} + in the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are + ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a role + binding applies to. This can either hold + a direct API object reference, or a value + for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults + to "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are + "User", "Group", and "ServiceAccount". + If the Authorizer does not recognized + the kind value, the Authorizer should + report an error. + type: string + name: + description: Name of the object being + referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this + value is not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + mutate: + description: Mutation is used to modify matching + resources. + properties: + foreach: + description: ForEach applies mutation rules + to a list of sub-elements by creating a context + for each entry in the list and looping over + it to apply the specified logic. + items: + description: ForEach applies mutation rules + to a list of sub-elements by creating a + context for each entry in the list and looping + over it to apply the specified logic. + properties: + context: + description: Context defines variables + and data sources that can be used during + rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or a + APILookup must be provided. + properties: + apiCall: + description: APICall defines an + HTTP request to the Kubernetes + API server. The JSON data retrieved + is stored in the context. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the JSON response returned + from the API server. For example + a JMESPath of "items | length(@)" + applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count + of deployments across all + namespaces. + type: string + urlPath: + description: URLPath is the + URL path to be used in the + HTTP GET request to the Kubernetes + API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is the + same format used by the `kubectl + get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap + name. + type: string + namespace: + description: Namespace is the + ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker V2 registry + to fetch image details. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image + reference to a container image + in the registry. Example: + ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines an + arbitrary JMESPath context variable + that can be defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that + the variable may take if the + JMESPath expression evaluates + to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an + optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable + in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath + expression that results in one or more + elements to which the validation logic + is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is a + strategic merge patch used to modify + resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list + of RFC 6902 JSON Patch declarations + used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are used + to determine if a policy rule should + be applied by evaluating a set of conditions. + The declaration can contain nested `any` + or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + all of the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + at least one of the conditions need + to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic + merge patch used to modify resources. See + https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC + 6902 JSON Patch declarations used to modify + resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target resources + to be mutated. + items: + properties: + apiVersion: + description: APIVersion specifies resource + apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource + name. + type: string + namespace: + description: Namespace specifies resource + namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the rule, + It must be unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. A direct list + of conditions (without `any` or `all` statements + is supported for backwards compatibility but will + be deprecated in the next major release. See: + https://kyverno.io/docs/writing-policies/preconditions/' + x-kubernetes-preserve-unknown-fields: true + validate: + description: Validation is used to validate matching + resources. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must + be satisfied for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used to + pass or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be + declared under an `any` or `all` statement. + A direct list of conditions (without `any` + or `all` statements) is also supported + for backwards compatibility but will be + deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + foreach: + description: ForEach applies validate rules + to a list of sub-elements by creating a context + for each entry in the list and looping over + it to apply the specified logic. + items: + description: ForEach applies validate rules + to a list of sub-elements by creating a + context for each entry in the list and looping + over it to apply the specified logic. + properties: + anyPattern: + description: AnyPattern specifies list + of validation patterns. At least one + of the patterns must be satisfied for + the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables + and data sources that can be used during + rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or a + APILookup must be provided. + properties: + apiCall: + description: APICall defines an + HTTP request to the Kubernetes + API server. The JSON data retrieved + is stored in the context. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the JSON response returned + from the API server. For example + a JMESPath of "items | length(@)" + applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count + of deployments across all + namespaces. + type: string + urlPath: + description: URLPath is the + URL path to be used in the + HTTP GET request to the Kubernetes + API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is the + same format used by the `kubectl + get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap + name. + type: string + namespace: + description: Namespace is the + ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker V2 registry + to fetch image details. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image + reference to a container image + in the registry. Example: + ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines an + arbitrary JMESPath context variable + that can be defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that + the variable may take if the + JMESPath expression evaluates + to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an + optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable + in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions used + to pass or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions + can be declared under an `any` or + `all` statement. A direct list of + conditions (without `any` or `all` + statements) is also supported for + backwards compatibility but will + be deprecated in the next major + release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies whether + to use the current list element as the + scope for validation. Defaults to "true" + if not specified. When set to "false", + "request.object" is used as the validation + scope within the foreach block to allow + referencing other elements in the subtree. + type: boolean + list: + description: List specifies a JMESPath + expression that results in one or more + elements to which the validation logic + is applied. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are used + to determine if a policy rule should + be applied by evaluating a set of conditions. + The declaration can contain nested `any` + or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + all of the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + at least one of the conditions need + to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions for + manifest verification + properties: + annotationDomain: + description: AnnotationDomain is custom + domain of annotation for message and signature. + Default is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. + If the count is null, all entries + must match (a logical AND). If the + count is 1, at least one entry must + match (a logical OR). If the count + contains a value N, then N must + be less than or equal to the size + of entries, and at least N entries + must match. + minimum: 1 + type: integer + entries: + description: Entries contains the + available attestors. An attestor + can be a static key, attributes + for keyless verification, or a nested + attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are + used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. The + payload may contain other + key-value pairs. + type: object + attestor: + description: Attestor is a nested + AttestorSet used to specify + a more complex set of match + authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate + is an optional PEM encoded + public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates used + to verify + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not checked. + If an empty object is + provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set + of attribute used to verify + a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is the + certificate issuer used + for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not checked + and a root certificate + chain is expected instead. + If an empty object is + provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an + optional set of PEM encoded + trusted root certificates. + If not provided, the system + roots are used. + type: string + subject: + description: Subject is + the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is a set + of X.509 public keys used + to verify image signatures. + The keys can be directly + specified or can be a + variable reference to + a key specified in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are + specified each key is + processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors + and the count is applied + across the keys. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not checked. + If an empty object is + provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an + optional alternate OCI repository + to use for signatures and + attestations that match this + rule. If specified Repository + will override other OCI image + repository locations for this + Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored + while comparing manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional alternate + OCI repository to use for resource bundle + reference. The repository can be overridden + per Attestor or Attestation. + type: string + type: object + message: + description: Message specifies a custom message + to be displayed on failure. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions + for Kubernetes Pod Security admission by specifying + exclusions for Pod Security Standards controls. + properties: + exclude: + description: Exclude specifies the Pod Security + Standard controls to be excluded. + items: + description: PodSecurityStandard specifies + the Pod Security Standard controls to + be excluded. + properties: + controlName: + description: 'ControlName specifies + the name of the Pod Security Standard + control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching + containers and applies the container + level PSS. Each image is the image + name consisting of the registry + address, repository, image, and + tag. Empty list matches no containers, + PSS checks are applied at the pod + level only. Wildcards (''*'' and + ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security + Standard level to be applied to workloads. + Allowed values are privileged, baseline, + and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod Security + Standard versions that Kubernetes supports. + Allowed values are v1.19, v1.20, v1.21, + v1.22, v1.23, v1.24, v1.25, latest. Defaults + to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify image + signatures and mutate them to add a digest + items: + description: ImageVerification validates that + images that match the specified pattern are + signed with the supplied public key. Once the + image is verified it is mutated to include the + SHA digest retrieved during the registration. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are certificate-extensions + used for keyless signing. Deprecated. + type: object + annotations: + additionalProperties: + type: string + description: Annotations are used for image + verification. Every specified key-value + pair must exist and match in the verified + payload. The payload may contain other key-value + pairs. Deprecated. Use annotations per Attestor + instead. + type: object + attestations: + description: Attestations are optional checks + for signed in-toto Statements used to verify + the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations from + the OCI registry and decodes them into a + list of Statement declarations. + items: + description: Attestation are checks for + signed in-toto Statements that are used + to verify the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations from + the OCI registry and decodes them into + a list of Statements. + properties: + attestors: + description: Attestors specify the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the + required number of entries that + must match. If the count is + null, all entries must match + (a logical AND). If the count + is 1, at least one entry must + match (a logical OR). If the + count contains a value N, then + N must be less than or equal + to the size of entries, and + at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains + the available attestors. An + attestor can be a static key, + attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations + are used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. + The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is + a nested AttestorSet used + to specify a more complex + set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more + certificates + properties: + cert: + description: Certificate + is an optional PEM + encoded public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM + encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is + a set of attribute used + to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer + is the certificate + issuer used for keyless + signing. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked and + a root certificate + chain is expected + instead. If an empty + object is provided + the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is + an optional set of + PEM encoded trusted + root certificates. + If not provided, the + system roots are used. + type: string + subject: + description: Subject + is the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is + a set of X.509 public + keys used to verify + image signatures. + The keys can be directly + specified or can be + a variable reference + to a key specified + in a ConfigMap (see + https://kyverno.io/docs/writing-policies/variables/). + When multiple keys + are specified each + key is processed as + a separate staticKey + entry (.attestors[*].entries.keys) + within the set of + attestors and the + count is applied across + the keys. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository + is an optional alternate + OCI repository to use + for signatures and attestations + that match this rule. + If specified Repository + will override other OCI + image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used to + verify attributes within a Predicate. + If no Conditions are specified the + attestation check is satisfied as + long there are predicates that match + the predicate type. + items: + description: AnyAllConditions consists + of conditions wrapped denoting a + logical criteria to be fulfilled. + AnyConditions get fulfilled when + at least one of its sub-conditions + passes. AllConditions get fulfilled + only when all of its sub-conditions + pass. + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, all + of the conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, at + least one of the conditions + need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines the + type of Predicate contained within + the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. + If the count is null, all entries + must match (a logical AND). If the + count is 1, at least one entry must + match (a logical OR). If the count + contains a value N, then N must be + less than or equal to the size of + entries, and at least N entries must + match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static + key, attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used + for image verification. Every + specified key-value pair must + exist and match in the verified + payload. The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is a nested + AttestorSet used to specify + a more complex set of match + authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is + an optional PEM encoded + public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates used + to verify + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set + of attribute used to verify + a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is the + certificate issuer used + for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked and a root + certificate chain is expected + instead. If an empty object + is provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted + root certificates. If not + provided, the system roots + are used. + type: string + subject: + description: Subject is the + verified identity used for + keyless signing, for example + the email address + type: string + type: object + keys: + description: Keys specifies one + or more public keys + properties: + publicKeys: + description: Keys is a set + of X.509 public keys used + to verify image signatures. + The keys can be directly + specified or can be a variable + reference to a key specified + in a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as + a separate staticKey entry + (.attestors[*].entries.keys) + within the set of attestors + and the count is applied + across the keys. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an + optional alternate OCI repository + to use for signatures and attestations + that match this rule. If specified + Repository will override other + OCI image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + image: + description: 'Image is the image name consisting + of the registry address, repository, image, + and tag. Wildcards (''*'' and ''?'') are + allowed. See: https://kubernetes.io/docs/concepts/containers/images. + Deprecated. Use ImageReferences instead.' + type: string + imageReferences: + description: 'ImageReferences is a list of + matching image reference patterns. At least + one pattern in the list must match the image + for the rule to apply. Each image reference + consists of a registry address (defaults + to docker.io), repository, image, and tag + (defaults to latest). Wildcards (''*'' and + ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + issuer: + description: Issuer is the certificate issuer + used for keyless signing. Deprecated. Use + KeylessAttestor instead. + type: string + key: + description: Key is the PEM encoded public + key that the image or attestation is signed + with. Deprecated. Use StaticKeyAttestor + instead. + type: string + mutateDigest: + default: true + description: MutateDigest enables replacement + of image tags with digests. Defaults to + true. + type: boolean + repository: + description: Repository is an optional alternate + OCI repository to use for image signatures + and attestations that match this rule. If + specified Repository will override the default + OCI image repository configured for the + installation. The repository can also be + overridden per Attestor or Attestation. + type: string + required: + default: true + description: Required validates that images + are verified i.e. have matched passed a + signature or attestation check. + type: boolean + roots: + description: Roots is the PEM encoded Root + certificate chain used for keyless signing + Deprecated. Use KeylessAttestor instead. + type: string + subject: + description: Subject is the identity used + for keyless signing, for example an email + address Deprecated. Use KeylessAttestor + instead. + type: string + verifyDigest: + default: true + description: VerifyDigest validates that images + have a digest. + type: boolean + type: object + type: array + type: object + type: array + schemaValidation: + description: SchemaValidation skips validation checks + for policies as well as patched resources. Optional. + The default value is set to "true", it must be set to + "false" to disable the validation checks. + type: boolean + validationFailureAction: + default: audit + description: ValidationFailureAction defines if a validation + policy rule violation should block the admission review + request (enforce), or allow (audit) the admission review + request and report an error in a policy report. Optional. + Allowed values are audit or enforce. The default value + is "audit". + enum: + - audit + - enforce + type: string + validationFailureActionOverrides: + description: ValidationFailureActionOverrides is a Cluster + Policy attribute that specifies ValidationFailureAction + namespace-wise. It overrides ValidationFailureAction + for the specified namespaces. + items: + properties: + action: + description: ValidationFailureAction defines the + policy validation failure action + enum: + - audit + - enforce + type: string + namespaces: + items: + type: string + type: array + type: object + type: array + webhookTimeoutSeconds: + description: WebhookTimeoutSeconds specifies the maximum + time in seconds allowed to apply this policy. After + the configured time expires, the admission request may + fail, or may simply ignore the policy results, based + on the failure policy. The default timeout is 10s, the + value must be between 1 and 30 seconds. + format: int32 + type: integer + type: object + status: + description: Status contains policy runtime data. + properties: + autogen: + description: Autogen contains autogen status information + properties: + rules: + description: Rules is a list of Rule instances. It + contains auto generated rules added for pod controllers + items: + description: Rule defines a validation, mutation, + or generation control for matching resources. + Each rules contains a match declaration to select + resources, and an optional exclude declaration + to specify which resources to exclude. + properties: + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and + data sources to a rule Context. Either a + ConfigMap reference or a APILookup must + be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON + data retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the JSON response + returned from the API server. For + example a JMESPath of "items | length(@)" + applied to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path + to be used in the HTTP GET request + to the Kubernetes API server (e.g. + "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same + format used by the `kubectl get + --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap + name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch + image details. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the ImageData + struct returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be + defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that the variable + may take if the JMESPath expression + evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional + JMESPath Expression that can be + used to transform the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this + policy rule should not be applied. The exclude + criteria can include resource information + (e.g. kind, name, namespace, labels) and admission + review request information like the name or + role. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of + cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being created + or modified. Requires at least one tag + to be specified when under MatchResources. + Specifying ResourceDescription directly + under match is being deprecated. Please + specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of + annotations (key-value pairs of type + string). Annotation keys and values + support the wildcard characters "*" + (matches zero or many characters) + and "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the + resource. The name supports wildcard + characters "*" (matches zero or many + characters) and "?" (at least one + character). NOTE: "Name" is being + deprecated in favor of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a + label selector for the resource namespace. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of + namespaces names. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character). Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a role + binding applies to. This can either + hold a direct API object reference, + or a value for non-objects such as user + and group names. + properties: + apiGroup: + description: APIGroup holds the API + group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by this + API group are "User", "Group", and + "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object being + referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this + value is not empty the Authorizer + should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + generate: + description: Generation is used to create new + resources. + properties: + apiVersion: + description: APIVersion specifies resource + apiVersion. + type: string + clone: + description: Clone specifies the source + resource used to populate each generated + resource. At most one of Data or Clone + can be specified. If neither are provided, + the generated resource will be created + with default data only. + properties: + name: + description: Name specifies name of + the resource. + type: string + namespace: + description: Namespace specifies source + resource namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list + of source resource used to populate each + generated resource. + properties: + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source + resource namespace. + type: string + selector: + description: Selector is a label selector. + Label keys and values in `matchLabels`. + wildcard characters are not supported. + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource + declaration used to populate each generated + resource. At most one of Data or Clone + must be specified. If neither are provided, + the generated resource will be created + with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource + name. + type: string + namespace: + description: Namespace specifies resource + namespace. + type: string + synchronize: + description: Synchronize controls if generated + resources should be kept in-sync with + their source resource. If Synchronize + is set to "true" changes to generated + resources will be overwritten with resource + data from Data or the resource specified + in the Clone declaration. Optional. Defaults + to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name + of the field within 'path' that will + be used to uniquely identify an image. + Note - this field MUST be unique. + type: string + name: + description: Name is the entry the image + will be available under 'images.' + in the context. If this field is not + defined, image entries will appear + under 'images.custom'. + type: string + path: + description: Path is the path to the + object containing the image field + in a custom resource. It should be + slash-separated. Each slash-separated + key must be a valid YAML key or a + wildcard '*'. Wildcard keys are expanded + in case of arrays or objects. + type: string + value: + description: Value is an optional name + of the field within 'path' that points + to the image URI. This is useful when + a custom 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping + from kinds to ImageExtractorConfigs. This + config is only valid for verifyImages rules. + type: object + match: + description: MatchResources defines when this + policy rule should be applied. The match criteria + can include resource information (e.g. kind, + name, namespace, labels) and admission review + request information like the user name or + role. At least one kind is required. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of + cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being created + or modified. Requires at least one tag + to be specified when under MatchResources. + Specifying ResourceDescription directly + under match is being deprecated. Please + specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of + annotations (key-value pairs of type + string). Annotation keys and values + support the wildcard characters "*" + (matches zero or many characters) + and "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the + resource. The name supports wildcard + characters "*" (matches zero or many + characters) and "?" (at least one + character). NOTE: "Name" is being + deprecated in favor of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a + label selector for the resource namespace. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of + namespaces names. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character). Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a role + binding applies to. This can either + hold a direct API object reference, + or a value for non-objects such as user + and group names. + properties: + apiGroup: + description: APIGroup holds the API + group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by this + API group are "User", "Group", and + "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object being + referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this + value is not empty the Authorizer + should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + mutate: + description: Mutation is used to modify matching + resources. + properties: + foreach: + description: ForEach applies mutation rules + to a list of sub-elements by creating + a context for each entry in the list and + looping over it to apply the specified + logic. + items: + description: ForEach applies mutation + rules to a list of sub-elements by creating + a context for each entry in the list + and looping over it to apply the specified + logic. + properties: + context: + description: Context defines variables + and data sources that can be used + during rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or + a APILookup must be provided. + properties: + apiCall: + description: APICall defines + an HTTP request to the Kubernetes + API server. The JSON data + retrieved is stored in the + context. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + JSON response returned + from the API server. For + example a JMESPath of + "items | length(@)" applied + to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total + count of deployments across + all namespaces. + type: string + urlPath: + description: URLPath is + the URL path to be used + in the HTTP GET request + to the Kubernetes API + server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is + the same format used by + the `kubectl get --raw` + command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the + ConfigMap reference. + properties: + name: + description: Name is the + ConfigMap name. + type: string + namespace: + description: Namespace is + the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker + V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference + is image reference to + a container image in the + registry. Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines + an arbitrary JMESPath context + variable that can be defined + inline. + properties: + default: + description: Default is + an optional arbitrary + JSON object that the variable + may take if the JMESPath + expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is + an optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any + arbitrary JSON object + representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath + expression that results in one or + more elements to which the validation + logic is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is + a strategic merge patch used to + modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a + list of RFC 6902 JSON Patch declarations + used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are + used to determine if a policy rule + should be applied by evaluating + a set of conditions. The declaration + can contain nested `any` or `all` + statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, all + of the conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, at + least one of the conditions + need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic + merge patch used to modify resources. + See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of + RFC 6902 JSON Patch declarations used + to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target + resources to be mutated. + items: + properties: + apiVersion: + description: APIVersion specifies + resource apiVersion. + type: string + kind: + description: Kind specifies resource + kind. + type: string + name: + description: Name specifies the resource + name. + type: string + namespace: + description: Namespace specifies resource + namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the + rule, It must be unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. A direct + list of conditions (without `any` or `all` + statements is supported for backwards compatibility + but will be deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/preconditions/' + x-kubernetes-preserve-unknown-fields: true + validate: + description: Validation is used to validate + matching resources. + properties: + anyPattern: + description: AnyPattern specifies list of + validation patterns. At least one of the + patterns must be satisfied for the validation + rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used + to pass or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can + be declared under an `any` or `all` + statement. A direct list of conditions + (without `any` or `all` statements) + is also supported for backwards compatibility + but will be deprecated in the next + major release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + foreach: + description: ForEach applies validate rules + to a list of sub-elements by creating + a context for each entry in the list and + looping over it to apply the specified + logic. + items: + description: ForEach applies validate + rules to a list of sub-elements by creating + a context for each entry in the list + and looping over it to apply the specified + logic. + properties: + anyPattern: + description: AnyPattern specifies + list of validation patterns. At + least one of the patterns must be + satisfied for the validation rule + to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables + and data sources that can be used + during rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or + a APILookup must be provided. + properties: + apiCall: + description: APICall defines + an HTTP request to the Kubernetes + API server. The JSON data + retrieved is stored in the + context. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + JSON response returned + from the API server. For + example a JMESPath of + "items | length(@)" applied + to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total + count of deployments across + all namespaces. + type: string + urlPath: + description: URLPath is + the URL path to be used + in the HTTP GET request + to the Kubernetes API + server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is + the same format used by + the `kubectl get --raw` + command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the + ConfigMap reference. + properties: + name: + description: Name is the + ConfigMap name. + type: string + namespace: + description: Namespace is + the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker + V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference + is image reference to + a container image in the + registry. Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines + an arbitrary JMESPath context + variable that can be defined + inline. + properties: + default: + description: Default is + an optional arbitrary + JSON object that the variable + may take if the JMESPath + expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is + an optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any + arbitrary JSON object + representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions + used to pass or fail a validation + rule. + properties: + conditions: + description: 'Multiple conditions + can be declared under an `any` + or `all` statement. A direct + list of conditions (without + `any` or `all` statements) is + also supported for backwards + compatibility but will be deprecated + in the next major release. See: + https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies + whether to use the current list + element as the scope for validation. + Defaults to "true" if not specified. + When set to "false", "request.object" + is used as the validation scope + within the foreach block to allow + referencing other elements in the + subtree. + type: boolean + list: + description: List specifies a JMESPath + expression that results in one or + more elements to which the validation + logic is applied. + type: string + pattern: + description: Pattern specifies an + overlay-style pattern used to check + resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are + used to determine if a policy rule + should be applied by evaluating + a set of conditions. The declaration + can contain nested `any` or `all` + statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, all + of the conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, at + least one of the conditions + need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions + for manifest verification + properties: + annotationDomain: + description: AnnotationDomain is custom + domain of annotation for message and + signature. Default is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the + required attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the + required number of entries that + must match. If the count is + null, all entries must match + (a logical AND). If the count + is 1, at least one entry must + match (a logical OR). If the + count contains a value N, then + N must be less than or equal + to the size of entries, and + at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains + the available attestors. An + attestor can be a static key, + attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations + are used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. + The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is + a nested AttestorSet used + to specify a more complex + set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more + certificates + properties: + cert: + description: Certificate + is an optional PEM + encoded public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM + encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is + a set of attribute used + to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer + is the certificate + issuer used for keyless + signing. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked and + a root certificate + chain is expected + instead. If an empty + object is provided + the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is + an optional set of + PEM encoded trusted + root certificates. + If not provided, the + system roots are used. + type: string + subject: + description: Subject + is the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is + a set of X.509 public + keys used to verify + image signatures. + The keys can be directly + specified or can be + a variable reference + to a key specified + in a ConfigMap (see + https://kyverno.io/docs/writing-policies/variables/). + When multiple keys + are specified each + key is processed as + a separate staticKey + entry (.attestors[*].entries.keys) + within the set of + attestors and the + count is applied across + the keys. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository + is an optional alternate + OCI repository to use + for signatures and attestations + that match this rule. + If specified Repository + will override other OCI + image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored + while comparing manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional + alternate OCI repository to use for + resource bundle reference. The repository + can be overridden per Attestor or + Attestation. + type: string + type: object + message: + description: Message specifies a custom + message to be displayed on failure. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions + for Kubernetes Pod Security admission + by specifying exclusions for Pod Security + Standards controls. + properties: + exclude: + description: Exclude specifies the Pod + Security Standard controls to be excluded. + items: + description: PodSecurityStandard specifies + the Pod Security Standard controls + to be excluded. + properties: + controlName: + description: 'ControlName specifies + the name of the Pod Security + Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching + containers and applies the container + level PSS. Each image is the + image name consisting of the + registry address, repository, + image, and tag. Empty list matches + no containers, PSS checks are + applied at the pod level only. + Wildcards (''*'' and ''?'') + are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security + Standard level to be applied to workloads. + Allowed values are privileged, baseline, + and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod + Security Standard versions that Kubernetes + supports. Allowed values are v1.19, + v1.20, v1.21, v1.22, v1.23, v1.24, + v1.25, latest. Defaults to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify + image signatures and mutate them to add a + digest + items: + description: ImageVerification validates that + images that match the specified pattern + are signed with the supplied public key. + Once the image is verified it is mutated + to include the SHA digest retrieved during + the registration. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are + certificate-extensions used for keyless + signing. Deprecated. + type: object + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. Deprecated. + Use annotations per Attestor instead. + type: object + attestations: + description: Attestations are optional + checks for signed in-toto Statements + used to verify the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations + from the OCI registry and decodes them + into a list of Statement declarations. + items: + description: Attestation are checks + for signed in-toto Statements that + are used to verify the image. See + https://github.com/in-toto/attestation. + Kyverno fetches signed attestations + from the OCI registry and decodes + them into a list of Statements. + properties: + attestors: + description: Attestors specify the + required attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies + the required number of entries + that must match. If the + count is null, all entries + must match (a logical AND). + If the count is 1, at least + one entry must match (a + logical OR). If the count + contains a value N, then + N must be less than or equal + to the size of entries, + and at least N entries must + match. + minimum: 1 + type: integer + entries: + description: Entries contains + the available attestors. + An attestor can be a static + key, attributes for keyless + verification, or a nested + attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations + are used for image + verification. Every + specified key-value + pair must exist and + match in the verified + payload. The payload + may contain other + key-value pairs. + type: object + attestor: + description: Attestor + is a nested AttestorSet + used to specify a + more complex set of + match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more + certificates + properties: + cert: + description: Certificate + is an optional + PEM encoded public + certificate. + type: string + certChain: + description: CertificateChain + is an optional + PEM encoded set + of certificates + used to verify + type: string + rekor: + description: Rekor + provides configuration + for the Rekor + transparency log + service. If the + value is nil, + Rekor is not checked. + If an empty object + is provided the + public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless + is a set of attribute + used to verify a Sigstore + keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless + signing. + type: object + issuer: + description: Issuer + is the certificate + issuer used for + keyless signing. + type: string + rekor: + description: Rekor + provides configuration + for the Rekor + transparency log + service. If the + value is nil, + Rekor is not checked + and a root certificate + chain is expected + instead. If an + empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots + is an optional + set of PEM encoded + trusted root certificates. + If not provided, + the system roots + are used. + type: string + subject: + description: Subject + is the verified + identity used + for keyless signing, + for example the + email address + type: string + type: object + keys: + description: Keys specifies + one or more public + keys + properties: + publicKeys: + description: Keys + is a set of X.509 + public keys used + to verify image + signatures. The + keys can be directly + specified or can + be a variable + reference to a + key specified + in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple + keys are specified + each key is processed + as a separate + staticKey entry + (.attestors[*].entries.keys) + within the set + of attestors and + the count is applied + across the keys. + type: string + rekor: + description: Rekor + provides configuration + for the Rekor + transparency log + service. If the + value is nil, + Rekor is not checked. + If an empty object + is provided the + public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository + is an optional alternate + OCI repository to + use for signatures + and attestations that + match this rule. If + specified Repository + will override other + OCI image repository + locations for this + Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used + to verify attributes within a + Predicate. If no Conditions are + specified the attestation check + is satisfied as long there are + predicates that match the predicate + type. + items: + description: AnyAllConditions + consists of conditions wrapped + denoting a logical criteria + to be fulfilled. AnyConditions + get fulfilled when at least + one of its sub-conditions passes. + AllConditions get fulfilled + only when all of its sub-conditions + pass. + properties: + all: + description: AllConditions + enable variable-based conditional + rule execution. This is + useful for finer control + of when an rule is applied. + A condition can reference + object data using JMESPath + notation. Here, all of the + conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is + the context entry + (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator + is the conditional + operation to perform. + Valid operators are: + Equals, NotEquals, + In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, + DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is + the conditional value, + or set of values. + The values can be + fixed set or can be + variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions + enable variable-based conditional + rule execution. This is + useful for finer control + of when an rule is applied. + A condition can reference + object data using JMESPath + notation. Here, at least + one of the conditions need + to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is + the context entry + (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator + is the conditional + operation to perform. + Valid operators are: + Equals, NotEquals, + In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, + DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is + the conditional value, + or set of values. + The values can be + fixed set or can be + variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines + the type of Predicate contained + within the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the + required number of entries that + must match. If the count is null, + all entries must match (a logical + AND). If the count is 1, at least + one entry must match (a logical + OR). If the count contains a value + N, then N must be less than or + equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the + available attestors. An attestor + can be a static key, attributes + for keyless verification, or a + nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are + used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. + The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is a + nested AttestorSet used + to specify a more complex + set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more certificates + properties: + cert: + description: Certificate + is an optional PEM encoded + public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates + used to verify + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not + checked. If an empty + object is provided the + public instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a + set of attribute used to + verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is + the certificate issuer + used for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not + checked and a root certificate + chain is expected instead. + If an empty object is + provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is + an optional set of PEM + encoded trusted root + certificates. If not + provided, the system + roots are used. + type: string + subject: + description: Subject is + the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is a + set of X.509 public + keys used to verify + image signatures. The + keys can be directly + specified or can be + a variable reference + to a key specified in + a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are + specified each key is + processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors + and the count is applied + across the keys. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not + checked. If an empty + object is provided the + public instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is + an optional alternate OCI + repository to use for signatures + and attestations that match + this rule. If specified + Repository will override + other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + image: + description: 'Image is the image name + consisting of the registry address, + repository, image, and tag. Wildcards + (''*'' and ''?'') are allowed. See: + https://kubernetes.io/docs/concepts/containers/images. + Deprecated. Use ImageReferences instead.' + type: string + imageReferences: + description: 'ImageReferences is a list + of matching image reference patterns. + At least one pattern in the list must + match the image for the rule to apply. + Each image reference consists of a registry + address (defaults to docker.io), repository, + image, and tag (defaults to latest). + Wildcards (''*'' and ''?'') are allowed. + See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + issuer: + description: Issuer is the certificate + issuer used for keyless signing. Deprecated. + Use KeylessAttestor instead. + type: string + key: + description: Key is the PEM encoded public + key that the image or attestation is + signed with. Deprecated. Use StaticKeyAttestor + instead. + type: string + mutateDigest: + default: true + description: MutateDigest enables replacement + of image tags with digests. Defaults + to true. + type: boolean + repository: + description: Repository is an optional + alternate OCI repository to use for + image signatures and attestations that + match this rule. If specified Repository + will override the default OCI image + repository configured for the installation. + The repository can also be overridden + per Attestor or Attestation. + type: string + required: + default: true + description: Required validates that images + are verified i.e. have matched passed + a signature or attestation check. + type: boolean + roots: + description: Roots is the PEM encoded + Root certificate chain used for keyless + signing Deprecated. Use KeylessAttestor + instead. + type: string + subject: + description: Subject is the identity used + for keyless signing, for example an + email address Deprecated. Use KeylessAttestor + instead. + type: string + verifyDigest: + default: true + description: VerifyDigest validates that + images have a digest. + type: boolean + type: object + type: array + type: object + type: array + type: object + conditions: + description: Conditions is a list of conditions that apply + to the policy + items: + description: "Condition contains details for one aspect + of the current state of this API Resource. --- This + struct is intended for direct use as an array at the + field path .status.conditions. For example, \n type + FooStatus struct{ // Represents the observations of + a foo's current state. // Known .status.conditions.type + are: \"Available\", \"Progressing\", and \"Degraded\" + // +patchMergeKey=type // +patchStrategy=merge // + +listType=map // +listMapKey=type Conditions []metav1.Condition + `json:\"conditions,omitempty\" patchStrategy:\"merge\" + patchMergeKey:\"type\" protobuf:\"bytes,1,rep,name=conditions\"` + \n // other fields }" + properties: + lastTransitionTime: + description: lastTransitionTime is the last time + the condition transitioned from one status to + another. This should be when the underlying condition + changed. If that is not known, then using the + time when the API field changed is acceptable. + format: date-time + type: string + message: + description: message is a human readable message + indicating details about the transition. This + may be an empty string. + maxLength: 32768 + type: string + observedGeneration: + description: observedGeneration represents the .metadata.generation + that the condition was set based upon. For instance, + if .metadata.generation is currently 12, but the + .status.conditions[x].observedGeneration is 9, + the condition is out of date with respect to the + current state of the instance. + format: int64 + minimum: 0 + type: integer + reason: + description: reason contains a programmatic identifier + indicating the reason for the condition's last + transition. Producers of specific condition types + may define expected values and meanings for this + field, and whether the values are considered a + guaranteed API. The value should be a CamelCase + string. This field may not be empty. + maxLength: 1024 + minLength: 1 + pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$ + type: string + status: + description: status of the condition, one of True, + False, Unknown. + enum: + - "True" + - "False" + - Unknown + type: string + type: + description: type of condition in CamelCase or in + foo.example.com/CamelCase. --- Many .condition.type + values are consistent across resources like Available, + but because arbitrary conditions can be useful + (see .node.status.conditions), the ability to + deconflict is important. The regex it matches + is (dns1123SubdomainFmt/)?(qualifiedNameFmt) + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ + type: string + required: + - lastTransitionTime + - message + - reason + - status + - type + type: object + type: array + ready: + description: Ready indicates if the policy is ready to + serve the admission request. Deprecated in favor of + Conditions + type: boolean + required: + - ready + type: object + required: + - spec + type: object + served: true + storage: true + subresources: + status: {} + - additionalPrinterColumns: + - jsonPath: .spec.background + name: Background + type: boolean + - jsonPath: .spec.validationFailureAction + name: Validate Action + type: string + - jsonPath: .spec.failurePolicy + name: Failure Policy + priority: 1 + type: string + - jsonPath: .status.ready + name: Ready + type: boolean + name: v2beta1 + schema: + openAPIV3Schema: + description: ClusterPolicy declares validation, mutation, and + generation behaviors for matching resources. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this + representation of an object. Servers should convert recognized + schemas to the latest internal value, and may reject unrecognized + values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST + resource this object represents. Servers may infer this + from the endpoint the client submits requests to. Cannot + be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: Spec declares policy behaviors. + properties: + applyRules: + description: ApplyRules controls how rules in a policy + are applied. Rule are processed in the order of declaration. + When set to `One` processing stops after a rule has + been applied i.e. the rule matches and results in a + pass, fail, or error. When set to `All` all rules in + the policy are processed. The default is `All`. + enum: + - All + - One + type: string + background: + default: true + description: Background controls if rules are applied + to existing resources during a background scan. Optional. + Default value is "true". The value must be set to "false" + if the policy rule uses variables that are only available + in the admission review request (e.g. user name). + type: boolean + failurePolicy: + description: FailurePolicy defines how unexpected policy + errors and webhook response timeout errors are handled. + Rules within the same policy share the same failure + behavior. Allowed values are Ignore or Fail. Defaults + to Fail. + enum: + - Ignore + - Fail + type: string + generateExistingOnPolicyUpdate: + description: GenerateExistingOnPolicyUpdate controls whether + to trigger generate rule in existing resources If is + set to "true" generate rule will be triggered and applied + to existing matched resources. Defaults to "false" if + not specified. + type: boolean + mutateExistingOnPolicyUpdate: + description: MutateExistingOnPolicyUpdate controls if + a mutateExisting policy is applied on policy events. + Default value is "false". + type: boolean + rules: + description: Rules is a list of Rule instances. A Policy + contains multiple rules and each rule can validate, + mutate, or generate resources. + items: + description: Rule defines a validation, mutation, or + generation control for matching resources. Each rules + contains a match declaration to select resources, + and an optional exclude declaration to specify which + resources to exclude. + properties: + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and data + sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON data + retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to + transform the JSON response returned + from the API server. For example a JMESPath + of "items | length(@)" applied to the + API server response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to + be used in the HTTP GET request to the + Kubernetes API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). The + format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to + transform the ImageData struct returned + as a result of processing the image + reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be defined + inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take + if the JMESPath expression evaluates + to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary JSON + object representable in YAML or JSON + form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this + policy rule should not be applied. The exclude + criteria can include resource information (e.g. + kind, name, namespace, labels) and admission review + request information like the name or role. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + type: object + generate: + description: Generation is used to create new resources. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + clone: + description: Clone specifies the source resource + used to populate each generated resource. + At most one of Data or Clone can be specified. + If neither are provided, the generated resource + will be created with default data only. + properties: + name: + description: Name specifies name of the + resource. + type: string + namespace: + description: Namespace specifies source + resource namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list of + source resource used to populate each generated + resource. + properties: + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source + resource namespace. + type: string + selector: + description: Selector is a label selector. + Label keys and values in `matchLabels`. + wildcard characters are not supported. + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. + This array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of + {key,value} pairs. A single {key,value} + in the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are + ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource declaration + used to populate each generated resource. + At most one of Data or Clone must be specified. + If neither are provided, the generated resource + will be created with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + synchronize: + description: Synchronize controls if generated + resources should be kept in-sync with their + source resource. If Synchronize is set to + "true" changes to generated resources will + be overwritten with resource data from Data + or the resource specified in the Clone declaration. + Optional. Defaults to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name of + the field within 'path' that will be used + to uniquely identify an image. Note - + this field MUST be unique. + type: string + name: + description: Name is the entry the image + will be available under 'images.' + in the context. If this field is not defined, + image entries will appear under 'images.custom'. + type: string + path: + description: Path is the path to the object + containing the image field in a custom + resource. It should be slash-separated. + Each slash-separated key must be a valid + YAML key or a wildcard '*'. Wildcard keys + are expanded in case of arrays or objects. + type: string + value: + description: Value is an optional name of + the field within 'path' that points to + the image URI. This is useful when a custom + 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping from + kinds to ImageExtractorConfigs. This config is + only valid for verifyImages rules. + type: object + match: + description: MatchResources defines when this policy + rule should be applied. The match criteria can + include resource information (e.g. kind, name, + namespace, labels) and admission review request + information like the user name or role. At least + one kind is required. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + type: object + mutate: + description: Mutation is used to modify matching + resources. + properties: + foreach: + description: ForEach applies mutation rules + to a list of sub-elements by creating a context + for each entry in the list and looping over + it to apply the specified logic. + items: + description: ForEach applies mutation rules + to a list of sub-elements by creating a + context for each entry in the list and looping + over it to apply the specified logic. + properties: + context: + description: Context defines variables + and data sources that can be used during + rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or a + APILookup must be provided. + properties: + apiCall: + description: APICall defines an + HTTP request to the Kubernetes + API server. The JSON data retrieved + is stored in the context. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the JSON response returned + from the API server. For example + a JMESPath of "items | length(@)" + applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count + of deployments across all + namespaces. + type: string + urlPath: + description: URLPath is the + URL path to be used in the + HTTP GET request to the Kubernetes + API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is the + same format used by the `kubectl + get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap + name. + type: string + namespace: + description: Namespace is the + ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker V2 registry + to fetch image details. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image + reference to a container image + in the registry. Example: + ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines an + arbitrary JMESPath context variable + that can be defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that + the variable may take if the + JMESPath expression evaluates + to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an + optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable + in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath + expression that results in one or more + elements to which the validation logic + is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is a + strategic merge patch used to modify + resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list + of RFC 6902 JSON Patch declarations + used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are used + to determine if a policy rule should + be applied by evaluating a set of conditions. + The declaration can contain nested `any` + or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + all of the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + at least one of the conditions need + to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic + merge patch used to modify resources. See + https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC + 6902 JSON Patch declarations used to modify + resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target resources + to be mutated. + items: + properties: + apiVersion: + description: APIVersion specifies resource + apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource + name. + type: string + namespace: + description: Namespace specifies resource + namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the rule, + It must be unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. A direct list + of conditions (without `any` or `all` statements + is supported for backwards compatibility but See: + https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of the + conditions need to pass + items: + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + validate: + description: Validation is used to validate matching + resources. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must + be satisfied for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used to + pass or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be + declared under an `any` or `all` statement. + A direct list of conditions (without `any` + or `all` statements) is also supported + for backwards compatibility See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is + useful for finer control of when an + rule is applied. A condition can reference + object data using JMESPath notation. + Here, all of the conditions need to + pass + items: + properties: + key: + description: Key is the context + entry (using JMESPath) for conditional + rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or can + be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is + useful for finer control of when an + rule is applied. A condition can reference + object data using JMESPath notation. + Here, at least one of the conditions + need to pass + items: + properties: + key: + description: Key is the context + entry (using JMESPath) for conditional + rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or can + be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: object + foreach: + description: ForEach applies validate rules + to a list of sub-elements by creating a context + for each entry in the list and looping over + it to apply the specified logic. + items: + description: ForEach applies validate rules + to a list of sub-elements by creating a + context for each entry in the list and looping + over it to apply the specified logic. + properties: + anyPattern: + description: AnyPattern specifies list + of validation patterns. At least one + of the patterns must be satisfied for + the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables + and data sources that can be used during + rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or a + APILookup must be provided. + properties: + apiCall: + description: APICall defines an + HTTP request to the Kubernetes + API server. The JSON data retrieved + is stored in the context. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the JSON response returned + from the API server. For example + a JMESPath of "items | length(@)" + applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count + of deployments across all + namespaces. + type: string + urlPath: + description: URLPath is the + URL path to be used in the + HTTP GET request to the Kubernetes + API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is the + same format used by the `kubectl + get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap + name. + type: string + namespace: + description: Namespace is the + ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker V2 registry + to fetch image details. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image + reference to a container image + in the registry. Example: + ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines an + arbitrary JMESPath context variable + that can be defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that + the variable may take if the + JMESPath expression evaluates + to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an + optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable + in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions used + to pass or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions + can be declared under an `any` or + `all` statement. A direct list of + conditions (without `any` or `all` + statements) is also supported for + backwards compatibility but will + be deprecated in the next major + release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies whether + to use the current list element as the + scope for validation. Defaults to "true" + if not specified. When set to "false", + "request.object" is used as the validation + scope within the foreach block to allow + referencing other elements in the subtree. + type: boolean + list: + description: List specifies a JMESPath + expression that results in one or more + elements to which the validation logic + is applied. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are used + to determine if a policy rule should + be applied by evaluating a set of conditions. + The declaration can contain nested `any` + or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + all of the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + at least one of the conditions need + to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions for + manifest verification + properties: + annotationDomain: + description: AnnotationDomain is custom + domain of annotation for message and signature. + Default is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. + If the count is null, all entries + must match (a logical AND). If the + count is 1, at least one entry must + match (a logical OR). If the count + contains a value N, then N must + be less than or equal to the size + of entries, and at least N entries + must match. + minimum: 1 + type: integer + entries: + description: Entries contains the + available attestors. An attestor + can be a static key, attributes + for keyless verification, or a nested + attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are + used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. The + payload may contain other + key-value pairs. + type: object + attestor: + description: Attestor is a nested + AttestorSet used to specify + a more complex set of match + authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate + is an optional PEM encoded + public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates used + to verify + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not checked. + If an empty object is + provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set + of attribute used to verify + a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is the + certificate issuer used + for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not checked + and a root certificate + chain is expected instead. + If an empty object is + provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an + optional set of PEM encoded + trusted root certificates. + If not provided, the system + roots are used. + type: string + subject: + description: Subject is + the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is a set + of X.509 public keys used + to verify image signatures. + The keys can be directly + specified or can be a + variable reference to + a key specified in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are + specified each key is + processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors + and the count is applied + across the keys. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not checked. + If an empty object is + provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an + optional alternate OCI repository + to use for signatures and + attestations that match this + rule. If specified Repository + will override other OCI image + repository locations for this + Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored + while comparing manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional alternate + OCI repository to use for resource bundle + reference. The repository can be overridden + per Attestor or Attestation. + type: string + type: object + message: + description: Message specifies a custom message + to be displayed on failure. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions + for Kubernetes Pod Security admission by specifying + exclusions for Pod Security Standards controls. + properties: + exclude: + description: Exclude specifies the Pod Security + Standard controls to be excluded. + items: + description: PodSecurityStandard specifies + the Pod Security Standard controls to + be excluded. + properties: + controlName: + description: 'ControlName specifies + the name of the Pod Security Standard + control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching + containers and applies the container + level PSS. Each image is the image + name consisting of the registry + address, repository, image, and + tag. Empty list matches no containers, + PSS checks are applied at the pod + level only. Wildcards (''*'' and + ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security + Standard level to be applied to workloads. + Allowed values are privileged, baseline, + and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod Security + Standard versions that Kubernetes supports. + Allowed values are v1.19, v1.20, v1.21, + v1.22, v1.23, v1.24, v1.25, latest. Defaults + to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify image + signatures and mutate them to add a digest + items: + description: ImageVerification validates that + images that match the specified pattern are + signed with the supplied public key. Once the + image is verified it is mutated to include the + SHA digest retrieved during the registration. + properties: + attestations: + description: Attestations are optional checks + for signed in-toto Statements used to verify + the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations from + the OCI registry and decodes them into a + list of Statement declarations. + items: + description: Attestation are checks for + signed in-toto Statements that are used + to verify the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations from + the OCI registry and decodes them into + a list of Statements. + properties: + attestors: + description: Attestors specify the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the + required number of entries that + must match. If the count is + null, all entries must match + (a logical AND). If the count + is 1, at least one entry must + match (a logical OR). If the + count contains a value N, then + N must be less than or equal + to the size of entries, and + at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains + the available attestors. An + attestor can be a static key, + attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations + are used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. + The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is + a nested AttestorSet used + to specify a more complex + set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more + certificates + properties: + cert: + description: Certificate + is an optional PEM + encoded public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM + encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is + a set of attribute used + to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer + is the certificate + issuer used for keyless + signing. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked and + a root certificate + chain is expected + instead. If an empty + object is provided + the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is + an optional set of + PEM encoded trusted + root certificates. + If not provided, the + system roots are used. + type: string + subject: + description: Subject + is the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is + a set of X.509 public + keys used to verify + image signatures. + The keys can be directly + specified or can be + a variable reference + to a key specified + in a ConfigMap (see + https://kyverno.io/docs/writing-policies/variables/). + When multiple keys + are specified each + key is processed as + a separate staticKey + entry (.attestors[*].entries.keys) + within the set of + attestors and the + count is applied across + the keys. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository + is an optional alternate + OCI repository to use + for signatures and attestations + that match this rule. + If specified Repository + will override other OCI + image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used to + verify attributes within a Predicate. + If no Conditions are specified the + attestation check is satisfied as + long there are predicates that match + the predicate type. + items: + description: AnyAllConditions consists + of conditions wrapped denoting a + logical criteria to be fulfilled. + AnyConditions get fulfilled when + at least one of its sub-conditions + passes. AllConditions get fulfilled + only when all of its sub-conditions + pass. + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, all + of the conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, at + least one of the conditions + need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines the + type of Predicate contained within + the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. + If the count is null, all entries + must match (a logical AND). If the + count is 1, at least one entry must + match (a logical OR). If the count + contains a value N, then N must be + less than or equal to the size of + entries, and at least N entries must + match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static + key, attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used + for image verification. Every + specified key-value pair must + exist and match in the verified + payload. The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is a nested + AttestorSet used to specify + a more complex set of match + authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is + an optional PEM encoded + public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates used + to verify + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set + of attribute used to verify + a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is the + certificate issuer used + for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked and a root + certificate chain is expected + instead. If an empty object + is provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted + root certificates. If not + provided, the system roots + are used. + type: string + subject: + description: Subject is the + verified identity used for + keyless signing, for example + the email address + type: string + type: object + keys: + description: Keys specifies one + or more public keys + properties: + publicKeys: + description: Keys is a set + of X.509 public keys used + to verify image signatures. + The keys can be directly + specified or can be a variable + reference to a key specified + in a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as + a separate staticKey entry + (.attestors[*].entries.keys) + within the set of attestors + and the count is applied + across the keys. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an + optional alternate OCI repository + to use for signatures and attestations + that match this rule. If specified + Repository will override other + OCI image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + imageReferences: + description: 'ImageReferences is a list of + matching image reference patterns. At least + one pattern in the list must match the image + for the rule to apply. Each image reference + consists of a registry address (defaults + to docker.io), repository, image, and tag + (defaults to latest). Wildcards (''*'' and + ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + mutateDigest: + default: true + description: MutateDigest enables replacement + of image tags with digests. Defaults to + true. + type: boolean + repository: + description: Repository is an optional alternate + OCI repository to use for image signatures + and attestations that match this rule. If + specified Repository will override the default + OCI image repository configured for the + installation. The repository can also be + overridden per Attestor or Attestation. + type: string + required: + default: true + description: Required validates that images + are verified i.e. have matched passed a + signature or attestation check. + type: boolean + verifyDigest: + default: true + description: VerifyDigest validates that images + have a digest. + type: boolean + type: object + type: array + type: object + type: array + schemaValidation: + description: SchemaValidation skips validation checks + for policies as well as patched resources. Optional. + The default value is set to "true", it must be set to + "false" to disable the validation checks. + type: boolean + validationFailureAction: + default: audit + description: ValidationFailureAction defines if a validation + policy rule violation should block the admission review + request (enforce), or allow (audit) the admission review + request and report an error in a policy report. Optional. + Allowed values are audit or enforce. The default value + is "audit". + enum: + - audit + - enforce + type: string + validationFailureActionOverrides: + description: ValidationFailureActionOverrides is a Cluster + Policy attribute that specifies ValidationFailureAction + namespace-wise. It overrides ValidationFailureAction + for the specified namespaces. + items: + properties: + action: + description: ValidationFailureAction defines the + policy validation failure action + enum: + - audit + - enforce + type: string + namespaces: + items: + type: string + type: array + type: object + type: array + webhookTimeoutSeconds: + description: WebhookTimeoutSeconds specifies the maximum + time in seconds allowed to apply this policy. After + the configured time expires, the admission request may + fail, or may simply ignore the policy results, based + on the failure policy. The default timeout is 10s, the + value must be between 1 and 30 seconds. + format: int32 + type: integer + type: object + status: + description: Status contains policy runtime data. + properties: + autogen: + description: Autogen contains autogen status information + properties: + rules: + description: Rules is a list of Rule instances. It + contains auto generated rules added for pod controllers + items: + description: Rule defines a validation, mutation, + or generation control for matching resources. + Each rules contains a match declaration to select + resources, and an optional exclude declaration + to specify which resources to exclude. + properties: + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and + data sources to a rule Context. Either a + ConfigMap reference or a APILookup must + be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON + data retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the JSON response + returned from the API server. For + example a JMESPath of "items | length(@)" + applied to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path + to be used in the HTTP GET request + to the Kubernetes API server (e.g. + "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same + format used by the `kubectl get + --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap + name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch + image details. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the ImageData + struct returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be + defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that the variable + may take if the JMESPath expression + evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional + JMESPath Expression that can be + used to transform the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this + policy rule should not be applied. The exclude + criteria can include resource information + (e.g. kind, name, namespace, labels) and admission + review request information like the name or + role. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of + cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being created + or modified. Requires at least one tag + to be specified when under MatchResources. + Specifying ResourceDescription directly + under match is being deprecated. Please + specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of + annotations (key-value pairs of type + string). Annotation keys and values + support the wildcard characters "*" + (matches zero or many characters) + and "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the + resource. The name supports wildcard + characters "*" (matches zero or many + characters) and "?" (at least one + character). NOTE: "Name" is being + deprecated in favor of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a + label selector for the resource namespace. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of + namespaces names. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character). Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a role + binding applies to. This can either + hold a direct API object reference, + or a value for non-objects such as user + and group names. + properties: + apiGroup: + description: APIGroup holds the API + group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by this + API group are "User", "Group", and + "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object being + referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this + value is not empty the Authorizer + should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + generate: + description: Generation is used to create new + resources. + properties: + apiVersion: + description: APIVersion specifies resource + apiVersion. + type: string + clone: + description: Clone specifies the source + resource used to populate each generated + resource. At most one of Data or Clone + can be specified. If neither are provided, + the generated resource will be created + with default data only. + properties: + name: + description: Name specifies name of + the resource. + type: string + namespace: + description: Namespace specifies source + resource namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list + of source resource used to populate each + generated resource. + properties: + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source + resource namespace. + type: string + selector: + description: Selector is a label selector. + Label keys and values in `matchLabels`. + wildcard characters are not supported. + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource + declaration used to populate each generated + resource. At most one of Data or Clone + must be specified. If neither are provided, + the generated resource will be created + with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource + name. + type: string + namespace: + description: Namespace specifies resource + namespace. + type: string + synchronize: + description: Synchronize controls if generated + resources should be kept in-sync with + their source resource. If Synchronize + is set to "true" changes to generated + resources will be overwritten with resource + data from Data or the resource specified + in the Clone declaration. Optional. Defaults + to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name + of the field within 'path' that will + be used to uniquely identify an image. + Note - this field MUST be unique. + type: string + name: + description: Name is the entry the image + will be available under 'images.' + in the context. If this field is not + defined, image entries will appear + under 'images.custom'. + type: string + path: + description: Path is the path to the + object containing the image field + in a custom resource. It should be + slash-separated. Each slash-separated + key must be a valid YAML key or a + wildcard '*'. Wildcard keys are expanded + in case of arrays or objects. + type: string + value: + description: Value is an optional name + of the field within 'path' that points + to the image URI. This is useful when + a custom 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping + from kinds to ImageExtractorConfigs. This + config is only valid for verifyImages rules. + type: object + match: + description: MatchResources defines when this + policy rule should be applied. The match criteria + can include resource information (e.g. kind, + name, namespace, labels) and admission review + request information like the user name or + role. At least one kind is required. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of + cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being created + or modified. Requires at least one tag + to be specified when under MatchResources. + Specifying ResourceDescription directly + under match is being deprecated. Please + specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of + annotations (key-value pairs of type + string). Annotation keys and values + support the wildcard characters "*" + (matches zero or many characters) + and "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the + resource. The name supports wildcard + characters "*" (matches zero or many + characters) and "?" (at least one + character). NOTE: "Name" is being + deprecated in favor of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a + label selector for the resource namespace. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of + namespaces names. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character). Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a role + binding applies to. This can either + hold a direct API object reference, + or a value for non-objects such as user + and group names. + properties: + apiGroup: + description: APIGroup holds the API + group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by this + API group are "User", "Group", and + "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object being + referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this + value is not empty the Authorizer + should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + mutate: + description: Mutation is used to modify matching + resources. + properties: + foreach: + description: ForEach applies mutation rules + to a list of sub-elements by creating + a context for each entry in the list and + looping over it to apply the specified + logic. + items: + description: ForEach applies mutation + rules to a list of sub-elements by creating + a context for each entry in the list + and looping over it to apply the specified + logic. + properties: + context: + description: Context defines variables + and data sources that can be used + during rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or + a APILookup must be provided. + properties: + apiCall: + description: APICall defines + an HTTP request to the Kubernetes + API server. The JSON data + retrieved is stored in the + context. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + JSON response returned + from the API server. For + example a JMESPath of + "items | length(@)" applied + to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total + count of deployments across + all namespaces. + type: string + urlPath: + description: URLPath is + the URL path to be used + in the HTTP GET request + to the Kubernetes API + server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is + the same format used by + the `kubectl get --raw` + command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the + ConfigMap reference. + properties: + name: + description: Name is the + ConfigMap name. + type: string + namespace: + description: Namespace is + the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker + V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference + is image reference to + a container image in the + registry. Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines + an arbitrary JMESPath context + variable that can be defined + inline. + properties: + default: + description: Default is + an optional arbitrary + JSON object that the variable + may take if the JMESPath + expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is + an optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any + arbitrary JSON object + representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath + expression that results in one or + more elements to which the validation + logic is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is + a strategic merge patch used to + modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a + list of RFC 6902 JSON Patch declarations + used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are + used to determine if a policy rule + should be applied by evaluating + a set of conditions. The declaration + can contain nested `any` or `all` + statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, all + of the conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, at + least one of the conditions + need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic + merge patch used to modify resources. + See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of + RFC 6902 JSON Patch declarations used + to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target + resources to be mutated. + items: + properties: + apiVersion: + description: APIVersion specifies + resource apiVersion. + type: string + kind: + description: Kind specifies resource + kind. + type: string + name: + description: Name specifies the resource + name. + type: string + namespace: + description: Namespace specifies resource + namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the + rule, It must be unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. A direct + list of conditions (without `any` or `all` + statements is supported for backwards compatibility + but will be deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/preconditions/' + x-kubernetes-preserve-unknown-fields: true + validate: + description: Validation is used to validate + matching resources. + properties: + anyPattern: + description: AnyPattern specifies list of + validation patterns. At least one of the + patterns must be satisfied for the validation + rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used + to pass or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can + be declared under an `any` or `all` + statement. A direct list of conditions + (without `any` or `all` statements) + is also supported for backwards compatibility + but will be deprecated in the next + major release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + foreach: + description: ForEach applies validate rules + to a list of sub-elements by creating + a context for each entry in the list and + looping over it to apply the specified + logic. + items: + description: ForEach applies validate + rules to a list of sub-elements by creating + a context for each entry in the list + and looping over it to apply the specified + logic. + properties: + anyPattern: + description: AnyPattern specifies + list of validation patterns. At + least one of the patterns must be + satisfied for the validation rule + to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables + and data sources that can be used + during rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or + a APILookup must be provided. + properties: + apiCall: + description: APICall defines + an HTTP request to the Kubernetes + API server. The JSON data + retrieved is stored in the + context. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + JSON response returned + from the API server. For + example a JMESPath of + "items | length(@)" applied + to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total + count of deployments across + all namespaces. + type: string + urlPath: + description: URLPath is + the URL path to be used + in the HTTP GET request + to the Kubernetes API + server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is + the same format used by + the `kubectl get --raw` + command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the + ConfigMap reference. + properties: + name: + description: Name is the + ConfigMap name. + type: string + namespace: + description: Namespace is + the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker + V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference + is image reference to + a container image in the + registry. Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines + an arbitrary JMESPath context + variable that can be defined + inline. + properties: + default: + description: Default is + an optional arbitrary + JSON object that the variable + may take if the JMESPath + expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is + an optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any + arbitrary JSON object + representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions + used to pass or fail a validation + rule. + properties: + conditions: + description: 'Multiple conditions + can be declared under an `any` + or `all` statement. A direct + list of conditions (without + `any` or `all` statements) is + also supported for backwards + compatibility but will be deprecated + in the next major release. See: + https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies + whether to use the current list + element as the scope for validation. + Defaults to "true" if not specified. + When set to "false", "request.object" + is used as the validation scope + within the foreach block to allow + referencing other elements in the + subtree. + type: boolean + list: + description: List specifies a JMESPath + expression that results in one or + more elements to which the validation + logic is applied. + type: string + pattern: + description: Pattern specifies an + overlay-style pattern used to check + resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are + used to determine if a policy rule + should be applied by evaluating + a set of conditions. The declaration + can contain nested `any` or `all` + statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, all + of the conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, at + least one of the conditions + need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions + for manifest verification + properties: + annotationDomain: + description: AnnotationDomain is custom + domain of annotation for message and + signature. Default is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the + required attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the + required number of entries that + must match. If the count is + null, all entries must match + (a logical AND). If the count + is 1, at least one entry must + match (a logical OR). If the + count contains a value N, then + N must be less than or equal + to the size of entries, and + at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains + the available attestors. An + attestor can be a static key, + attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations + are used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. + The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is + a nested AttestorSet used + to specify a more complex + set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more + certificates + properties: + cert: + description: Certificate + is an optional PEM + encoded public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM + encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is + a set of attribute used + to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer + is the certificate + issuer used for keyless + signing. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked and + a root certificate + chain is expected + instead. If an empty + object is provided + the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is + an optional set of + PEM encoded trusted + root certificates. + If not provided, the + system roots are used. + type: string + subject: + description: Subject + is the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is + a set of X.509 public + keys used to verify + image signatures. + The keys can be directly + specified or can be + a variable reference + to a key specified + in a ConfigMap (see + https://kyverno.io/docs/writing-policies/variables/). + When multiple keys + are specified each + key is processed as + a separate staticKey + entry (.attestors[*].entries.keys) + within the set of + attestors and the + count is applied across + the keys. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository + is an optional alternate + OCI repository to use + for signatures and attestations + that match this rule. + If specified Repository + will override other OCI + image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored + while comparing manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional + alternate OCI repository to use for + resource bundle reference. The repository + can be overridden per Attestor or + Attestation. + type: string + type: object + message: + description: Message specifies a custom + message to be displayed on failure. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions + for Kubernetes Pod Security admission + by specifying exclusions for Pod Security + Standards controls. + properties: + exclude: + description: Exclude specifies the Pod + Security Standard controls to be excluded. + items: + description: PodSecurityStandard specifies + the Pod Security Standard controls + to be excluded. + properties: + controlName: + description: 'ControlName specifies + the name of the Pod Security + Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching + containers and applies the container + level PSS. Each image is the + image name consisting of the + registry address, repository, + image, and tag. Empty list matches + no containers, PSS checks are + applied at the pod level only. + Wildcards (''*'' and ''?'') + are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security + Standard level to be applied to workloads. + Allowed values are privileged, baseline, + and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod + Security Standard versions that Kubernetes + supports. Allowed values are v1.19, + v1.20, v1.21, v1.22, v1.23, v1.24, + v1.25, latest. Defaults to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify + image signatures and mutate them to add a + digest + items: + description: ImageVerification validates that + images that match the specified pattern + are signed with the supplied public key. + Once the image is verified it is mutated + to include the SHA digest retrieved during + the registration. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are + certificate-extensions used for keyless + signing. Deprecated. + type: object + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. Deprecated. + Use annotations per Attestor instead. + type: object + attestations: + description: Attestations are optional + checks for signed in-toto Statements + used to verify the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations + from the OCI registry and decodes them + into a list of Statement declarations. + items: + description: Attestation are checks + for signed in-toto Statements that + are used to verify the image. See + https://github.com/in-toto/attestation. + Kyverno fetches signed attestations + from the OCI registry and decodes + them into a list of Statements. + properties: + attestors: + description: Attestors specify the + required attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies + the required number of entries + that must match. If the + count is null, all entries + must match (a logical AND). + If the count is 1, at least + one entry must match (a + logical OR). If the count + contains a value N, then + N must be less than or equal + to the size of entries, + and at least N entries must + match. + minimum: 1 + type: integer + entries: + description: Entries contains + the available attestors. + An attestor can be a static + key, attributes for keyless + verification, or a nested + attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations + are used for image + verification. Every + specified key-value + pair must exist and + match in the verified + payload. The payload + may contain other + key-value pairs. + type: object + attestor: + description: Attestor + is a nested AttestorSet + used to specify a + more complex set of + match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more + certificates + properties: + cert: + description: Certificate + is an optional + PEM encoded public + certificate. + type: string + certChain: + description: CertificateChain + is an optional + PEM encoded set + of certificates + used to verify + type: string + rekor: + description: Rekor + provides configuration + for the Rekor + transparency log + service. If the + value is nil, + Rekor is not checked. + If an empty object + is provided the + public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless + is a set of attribute + used to verify a Sigstore + keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless + signing. + type: object + issuer: + description: Issuer + is the certificate + issuer used for + keyless signing. + type: string + rekor: + description: Rekor + provides configuration + for the Rekor + transparency log + service. If the + value is nil, + Rekor is not checked + and a root certificate + chain is expected + instead. If an + empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots + is an optional + set of PEM encoded + trusted root certificates. + If not provided, + the system roots + are used. + type: string + subject: + description: Subject + is the verified + identity used + for keyless signing, + for example the + email address + type: string + type: object + keys: + description: Keys specifies + one or more public + keys + properties: + publicKeys: + description: Keys + is a set of X.509 + public keys used + to verify image + signatures. The + keys can be directly + specified or can + be a variable + reference to a + key specified + in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple + keys are specified + each key is processed + as a separate + staticKey entry + (.attestors[*].entries.keys) + within the set + of attestors and + the count is applied + across the keys. + type: string + rekor: + description: Rekor + provides configuration + for the Rekor + transparency log + service. If the + value is nil, + Rekor is not checked. + If an empty object + is provided the + public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository + is an optional alternate + OCI repository to + use for signatures + and attestations that + match this rule. If + specified Repository + will override other + OCI image repository + locations for this + Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used + to verify attributes within a + Predicate. If no Conditions are + specified the attestation check + is satisfied as long there are + predicates that match the predicate + type. + items: + description: AnyAllConditions + consists of conditions wrapped + denoting a logical criteria + to be fulfilled. AnyConditions + get fulfilled when at least + one of its sub-conditions passes. + AllConditions get fulfilled + only when all of its sub-conditions + pass. + properties: + all: + description: AllConditions + enable variable-based conditional + rule execution. This is + useful for finer control + of when an rule is applied. + A condition can reference + object data using JMESPath + notation. Here, all of the + conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is + the context entry + (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator + is the conditional + operation to perform. + Valid operators are: + Equals, NotEquals, + In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, + DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is + the conditional value, + or set of values. + The values can be + fixed set or can be + variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions + enable variable-based conditional + rule execution. This is + useful for finer control + of when an rule is applied. + A condition can reference + object data using JMESPath + notation. Here, at least + one of the conditions need + to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is + the context entry + (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator + is the conditional + operation to perform. + Valid operators are: + Equals, NotEquals, + In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, + DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is + the conditional value, + or set of values. + The values can be + fixed set or can be + variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines + the type of Predicate contained + within the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the + required number of entries that + must match. If the count is null, + all entries must match (a logical + AND). If the count is 1, at least + one entry must match (a logical + OR). If the count contains a value + N, then N must be less than or + equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the + available attestors. An attestor + can be a static key, attributes + for keyless verification, or a + nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are + used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. + The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is a + nested AttestorSet used + to specify a more complex + set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more certificates + properties: + cert: + description: Certificate + is an optional PEM encoded + public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates + used to verify + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not + checked. If an empty + object is provided the + public instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a + set of attribute used to + verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is + the certificate issuer + used for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not + checked and a root certificate + chain is expected instead. + If an empty object is + provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is + an optional set of PEM + encoded trusted root + certificates. If not + provided, the system + roots are used. + type: string + subject: + description: Subject is + the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is a + set of X.509 public + keys used to verify + image signatures. The + keys can be directly + specified or can be + a variable reference + to a key specified in + a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are + specified each key is + processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors + and the count is applied + across the keys. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not + checked. If an empty + object is provided the + public instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is + an optional alternate OCI + repository to use for signatures + and attestations that match + this rule. If specified + Repository will override + other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + image: + description: 'Image is the image name + consisting of the registry address, + repository, image, and tag. Wildcards + (''*'' and ''?'') are allowed. See: + https://kubernetes.io/docs/concepts/containers/images. + Deprecated. Use ImageReferences instead.' + type: string + imageReferences: + description: 'ImageReferences is a list + of matching image reference patterns. + At least one pattern in the list must + match the image for the rule to apply. + Each image reference consists of a registry + address (defaults to docker.io), repository, + image, and tag (defaults to latest). + Wildcards (''*'' and ''?'') are allowed. + See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + issuer: + description: Issuer is the certificate + issuer used for keyless signing. Deprecated. + Use KeylessAttestor instead. + type: string + key: + description: Key is the PEM encoded public + key that the image or attestation is + signed with. Deprecated. Use StaticKeyAttestor + instead. + type: string + mutateDigest: + default: true + description: MutateDigest enables replacement + of image tags with digests. Defaults + to true. + type: boolean + repository: + description: Repository is an optional + alternate OCI repository to use for + image signatures and attestations that + match this rule. If specified Repository + will override the default OCI image + repository configured for the installation. + The repository can also be overridden + per Attestor or Attestation. + type: string + required: + default: true + description: Required validates that images + are verified i.e. have matched passed + a signature or attestation check. + type: boolean + roots: + description: Roots is the PEM encoded + Root certificate chain used for keyless + signing Deprecated. Use KeylessAttestor + instead. + type: string + subject: + description: Subject is the identity used + for keyless signing, for example an + email address Deprecated. Use KeylessAttestor + instead. + type: string + verifyDigest: + default: true + description: VerifyDigest validates that + images have a digest. + type: boolean + type: object + type: array + type: object + type: array + type: object + conditions: + description: Conditions is a list of conditions that apply + to the policy + items: + description: "Condition contains details for one aspect + of the current state of this API Resource. --- This + struct is intended for direct use as an array at the + field path .status.conditions. For example, \n type + FooStatus struct{ // Represents the observations of + a foo's current state. // Known .status.conditions.type + are: \"Available\", \"Progressing\", and \"Degraded\" + // +patchMergeKey=type // +patchStrategy=merge // + +listType=map // +listMapKey=type Conditions []metav1.Condition + `json:\"conditions,omitempty\" patchStrategy:\"merge\" + patchMergeKey:\"type\" protobuf:\"bytes,1,rep,name=conditions\"` + \n // other fields }" + properties: + lastTransitionTime: + description: lastTransitionTime is the last time + the condition transitioned from one status to + another. This should be when the underlying condition + changed. If that is not known, then using the + time when the API field changed is acceptable. + format: date-time + type: string + message: + description: message is a human readable message + indicating details about the transition. This + may be an empty string. + maxLength: 32768 + type: string + observedGeneration: + description: observedGeneration represents the .metadata.generation + that the condition was set based upon. For instance, + if .metadata.generation is currently 12, but the + .status.conditions[x].observedGeneration is 9, + the condition is out of date with respect to the + current state of the instance. + format: int64 + minimum: 0 + type: integer + reason: + description: reason contains a programmatic identifier + indicating the reason for the condition's last + transition. Producers of specific condition types + may define expected values and meanings for this + field, and whether the values are considered a + guaranteed API. The value should be a CamelCase + string. This field may not be empty. + maxLength: 1024 + minLength: 1 + pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$ + type: string + status: + description: status of the condition, one of True, + False, Unknown. + enum: + - "True" + - "False" + - Unknown + type: string + type: + description: type of condition in CamelCase or in + foo.example.com/CamelCase. --- Many .condition.type + values are consistent across resources like Available, + but because arbitrary conditions can be useful + (see .node.status.conditions), the ability to + deconflict is important. The regex it matches + is (dns1123SubdomainFmt/)?(qualifiedNameFmt) + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ + type: string + required: + - lastTransitionTime + - message + - reason + - status + - type + type: object + type: array + ready: + description: Ready indicates if the policy is ready to + serve the admission request. Deprecated in favor of + Conditions + type: boolean + required: + - ready + type: object + required: + - spec + type: object + served: true + storage: false + subresources: + status: {} + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests21 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: apiextensions.k8s.io/v1 + kind: CustomResourceDefinition + metadata: + annotations: + config.kubernetes.io/index: "6" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "6" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: clusterpolicyreports.wgpolicyk8s.io + spec: + group: wgpolicyk8s.io + names: + kind: ClusterPolicyReport + listKind: ClusterPolicyReportList + plural: clusterpolicyreports + shortNames: + - cpolr + singular: clusterpolicyreport + scope: Cluster + versions: + - additionalPrinterColumns: + - jsonPath: .scope.kind + name: Kind + priority: 1 + type: string + - jsonPath: .scope.name + name: Name + priority: 1 + type: string + - jsonPath: .summary.pass + name: Pass + type: integer + - jsonPath: .summary.fail + name: Fail + type: integer + - jsonPath: .summary.warn + name: Warn + type: integer + - jsonPath: .summary.error + name: Error + type: integer + - jsonPath: .summary.skip + name: Skip + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + name: v1alpha2 + schema: + openAPIV3Schema: + description: ClusterPolicyReport is the Schema for the clusterpolicyreports + API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this + representation of an object. Servers should convert recognized + schemas to the latest internal value, and may reject unrecognized + values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST + resource this object represents. Servers may infer this + from the endpoint the client submits requests to. Cannot + be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + results: + description: PolicyReportResult provides result details + items: + description: PolicyReportResult provides the result for + an individual policy + properties: + category: + description: Category indicates policy category + type: string + message: + description: Description is a short user friendly message + for the policy rule + type: string + policy: + description: Policy is the name or identifier of the + policy + type: string + properties: + additionalProperties: + type: string + description: Properties provides additional information + for the policy rule + type: object + resourceSelector: + description: SubjectSelector is an optional label selector + for checked Kubernetes resources. For example, a policy + result may apply to all pods that match a label. Either + a Subject or a SubjectSelector can be specified. If + neither are provided, the result is assumed to be + for the policy report scope. + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are ANDed. + items: + description: A label selector requirement is a + selector that contains values, a key, and an + operator that relates the key and values. + properties: + key: + description: key is the label key that the + selector applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. If the + operator is Exists or DoesNotExist, the + values array must be empty. This array is + replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", + and the values array contains only "value". The + requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + resources: + description: Subjects is an optional reference to the + checked Kubernetes resources + items: + description: "ObjectReference contains enough information + to let you inspect or modify the referred object. + --- New uses of this type are discouraged because + of difficulty describing its usage when embedded + in APIs. 1. Ignored fields. It includes many fields + which are not generally honored. For instance, + ResourceVersion and FieldPath are both very rarely + valid in actual usage. 2. Invalid usage help. It + is impossible to add specific help for individual + usage. In most embedded usages, there are particular + restrictions like, \"must refer only to types A + and B\" or \"UID not honored\" or \"name must be + restricted\". Those cannot be well described when + embedded. 3. Inconsistent validation. Because the + usages are different, the validation rules are different + by usage, which makes it hard for users to predict + what will happen. 4. The fields are both imprecise + and overly precise. Kind is not a precise mapping + to a URL. This can produce ambiguity during interpretation + and require a REST mapping. In most cases, the + dependency is on the group,resource tuple and the + version of the actual struct is irrelevant. 5. We + cannot easily change it. Because this type is embedded + in many locations, updates to this type will affect + numerous schemas. Don't make new APIs embed an + underspecified API type they do not control. \n + Instead of using this type, create a locally provided + and used type that is well-focused on your reference. + For example, ServiceReferences for admission registration: + https://github.com/kubernetes/api/blob/release-1.17/admissionregistration/v1/types.go#L533 + ." + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an object + instead of an entire object, this string should + contain a valid JSON/Go field access statement, + such as desiredState.manifest.containers[2]. + For example, if the object reference is to a + container within a pod, this would take on a + value like: "spec.containers{name}" (where "name" + refers to the name of the container that triggered + the event) or if no container name is specified + "spec.containers[2]" (container with index 2 + in this pod). This syntax is chosen only to + have some well-defined way of referencing a + part of an object. TODO: this design is not + final and this field is subject to change in + the future.' + type: string + kind: + description: 'Kind of the referent. More info: + https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: + https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More + info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to which + this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: + https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + type: array + result: + description: Result indicates the outcome of the policy + rule execution + enum: + - pass + - fail + - warn + - error + - skip + type: string + rule: + description: Rule is the name or identifier of the rule + within the policy + type: string + scored: + description: Scored indicates if this result is scored + type: boolean + severity: + description: Severity indicates policy check result + criticality + enum: + - critical + - high + - low + - medium + - info + type: string + source: + description: Source is an identifier for the policy + engine that manages this report + type: string + timestamp: + description: Timestamp indicates the time the result + was found + properties: + nanos: + description: Non-negative fractions of a second + at nanosecond resolution. Negative second values + with fractions must still have non-negative nanos + values that count forward in time. Must be from + 0 to 999,999,999 inclusive. This field may be + limited in precision depending on context. + format: int32 + type: integer + seconds: + description: Represents seconds of UTC time since + Unix epoch 1970-01-01T00:00:00Z. Must be from + 0001-01-01T00:00:00Z to 9999-12-31T23:59:59Z inclusive. + format: int64 + type: integer + required: + - nanos + - seconds + type: object + required: + - policy + type: object + type: array + scope: + description: Scope is an optional reference to the report + scope (e.g. a Deployment, Namespace, or Node) + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an object instead + of an entire object, this string should contain a valid + JSON/Go field access statement, such as desiredState.manifest.containers[2]. + For example, if the object reference is to a container + within a pod, this would take on a value like: "spec.containers{name}" + (where "name" refers to the name of the container that + triggered the event) or if no container name is specified + "spec.containers[2]" (container with index 2 in this + pod). This syntax is chosen only to have some well-defined + way of referencing a part of an object. TODO: this design + is not final and this field is subject to change in + the future.' + type: string + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to which this reference + is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + scopeSelector: + description: ScopeSelector is an optional selector for multiple + scopes (e.g. Pods). Either one of, or none of, but not both + of, Scope or ScopeSelector should be specified. + properties: + matchExpressions: + description: matchExpressions is a list of label selector + requirements. The requirements are ANDed. + items: + description: A label selector requirement is a selector + that contains values, a key, and an operator that + relates the key and values. + properties: + key: + description: key is the label key that the selector + applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an array of string values. + If the operator is In or NotIn, the values array + must be non-empty. If the operator is Exists or + DoesNotExist, the values array must be empty. + This array is replaced during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} pairs. + A single {key,value} in the matchLabels map is equivalent + to an element of matchExpressions, whose key field is + "key", the operator is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + summary: + description: PolicyReportSummary provides a summary of results + properties: + error: + description: Error provides the count of policies that + could not be evaluated + type: integer + fail: + description: Fail provides the count of policies whose + requirements were not met + type: integer + pass: + description: Pass provides the count of policies whose + requirements were met + type: integer + skip: + description: Skip indicates the count of policies that + were not selected for evaluation + type: integer + warn: + description: Warn provides the count of non-scored policies + whose requirements were not met + type: integer + type: object + type: object + served: true + storage: true + subresources: {} + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests22 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: apiextensions.k8s.io/v1 + kind: CustomResourceDefinition + metadata: + annotations: + config.kubernetes.io/index: "7" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "7" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: generaterequests.kyverno.io + spec: + group: kyverno.io + names: + kind: GenerateRequest + listKind: GenerateRequestList + plural: generaterequests + shortNames: + - gr + singular: generaterequest + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .spec.policy + name: Policy + type: string + - jsonPath: .spec.resource.kind + name: ResourceKind + type: string + - jsonPath: .spec.resource.name + name: ResourceName + type: string + - jsonPath: .spec.resource.namespace + name: ResourceNamespace + type: string + - jsonPath: .status.state + name: status + type: string + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + name: v1 + schema: + openAPIV3Schema: + description: GenerateRequest is a request to process generate + rule. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this + representation of an object. Servers should convert recognized + schemas to the latest internal value, and may reject unrecognized + values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST + resource this object represents. Servers may infer this + from the endpoint the client submits requests to. Cannot + be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: Spec is the information to identify the generate + request. + properties: + context: + description: Context ... + properties: + admissionRequestInfo: + description: AdmissionRequestInfoObject stores the + admission request and operation details + properties: + admissionRequest: + type: string + operation: + description: Operation is the type of resource + operation being checked for admission control + type: string + type: object + userInfo: + description: RequestInfo contains permission info + carried in an admission request. + properties: + clusterRoles: + description: ClusterRoles is a list of possible + clusterRoles send the request. + items: + type: string + nullable: true + type: array + roles: + description: Roles is a list of possible role + send the request. + items: + type: string + nullable: true + type: array + userInfo: + description: UserInfo is the userInfo carried + in the admission request. + properties: + extra: + additionalProperties: + description: ExtraValue masks the value + so protobuf can generate + items: + type: string + type: array + description: Any additional information provided + by the authenticator. + type: object + groups: + description: The names of groups this user + is a part of. + items: + type: string + type: array + uid: + description: A unique value that identifies + this user across time. If this user is deleted + and another user by the same name is added, + they will have different UIDs. + type: string + username: + description: The name that uniquely identifies + this user among all active users. + type: string + type: object + type: object + type: object + policy: + description: Specifies the name of the policy. + type: string + resource: + description: ResourceSpec is the information to identify + the generate request. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + required: + - context + - policy + - resource + type: object + status: + description: Status contains statistics related to generate + request. + properties: + generatedResources: + description: This will track the resources that are generated + by the generate Policy. Will be used during clean up + resources. + items: + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + type: array + message: + description: Specifies request status message. + type: string + state: + description: State represents state of the generate request. + type: string + required: + - state + type: object + required: + - spec + type: object + served: true + storage: true + subresources: + status: {} + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests23 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: apiextensions.k8s.io/v1 + kind: CustomResourceDefinition + metadata: + annotations: + config.kubernetes.io/index: "8" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "8" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: policies.kyverno.io + spec: + group: kyverno.io + names: + categories: + - kyverno + - all + kind: Policy + listKind: PolicyList + plural: policies + shortNames: + - pol + singular: policy + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .spec.background + name: Background + type: boolean + - jsonPath: .spec.validationFailureAction + name: Validate Action + type: string + - jsonPath: .spec.failurePolicy + name: Failure Policy + priority: 1 + type: string + - jsonPath: .status.ready + name: Ready + type: boolean + name: v1 + schema: + openAPIV3Schema: + description: 'Policy declares validation, mutation, and generation + behaviors for matching resources. See: https://kyverno.io/docs/writing-policies/ + for more information.' + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this + representation of an object. Servers should convert recognized + schemas to the latest internal value, and may reject unrecognized + values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST + resource this object represents. Servers may infer this + from the endpoint the client submits requests to. Cannot + be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: Spec defines policy behaviors and contains one + or more rules. + properties: + applyRules: + description: ApplyRules controls how rules in a policy + are applied. Rule are processed in the order of declaration. + When set to `One` processing stops after a rule has + been applied i.e. the rule matches and results in a + pass, fail, or error. When set to `All` all rules in + the policy are processed. The default is `All`. + enum: + - All + - One + type: string + background: + default: true + description: Background controls if rules are applied + to existing resources during a background scan. Optional. + Default value is "true". The value must be set to "false" + if the policy rule uses variables that are only available + in the admission review request (e.g. user name). + type: boolean + failurePolicy: + description: FailurePolicy defines how unexpected policy + errors and webhook response timeout errors are handled. + Rules within the same policy share the same failure + behavior. Allowed values are Ignore or Fail. Defaults + to Fail. + enum: + - Ignore + - Fail + type: string + generateExistingOnPolicyUpdate: + description: GenerateExistingOnPolicyUpdate controls whether + to trigger generate rule in existing resources If is + set to "true" generate rule will be triggered and applied + to existing matched resources. Defaults to "false" if + not specified. + type: boolean + mutateExistingOnPolicyUpdate: + description: MutateExistingOnPolicyUpdate controls if + a mutateExisting policy is applied on policy events. + Default value is "false". + type: boolean + rules: + description: Rules is a list of Rule instances. A Policy + contains multiple rules and each rule can validate, + mutate, or generate resources. + items: + description: Rule defines a validation, mutation, or + generation control for matching resources. Each rules + contains a match declaration to select resources, + and an optional exclude declaration to specify which + resources to exclude. + properties: + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and data + sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON data + retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to + transform the JSON response returned + from the API server. For example a JMESPath + of "items | length(@)" applied to the + API server response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to + be used in the HTTP GET request to the + Kubernetes API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). The + format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to + transform the ImageData struct returned + as a result of processing the image + reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be defined + inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take + if the JMESPath expression evaluates + to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary JSON + object representable in YAML or JSON + form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this + policy rule should not be applied. The exclude + criteria can include resource information (e.g. + kind, name, namespace, labels) and admission review + request information like the name or role. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + Requires at least one tag to be specified + when under MatchResources. Specifying ResourceDescription + directly under match is being deprecated. + Please specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) + and "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). NOTE: + "Name" is being deprecated in favor of + "Names".' + type: string + names: + description: Names are the names of the + resources. Each name supports wildcard + characters "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. + This array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of + {key,value} pairs. A single {key,value} + in the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are + ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` + support the wildcard characters `*` (matches + zero or many characters) and `?` (matches + one character). Wildcards allows writing + label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] matches + any key and value but does not match an + empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. + This array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of + {key,value} pairs. A single {key,value} + in the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are + ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a role + binding applies to. This can either hold + a direct API object reference, or a value + for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults + to "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are + "User", "Group", and "ServiceAccount". + If the Authorizer does not recognized + the kind value, the Authorizer should + report an error. + type: string + name: + description: Name of the object being + referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this + value is not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + generate: + description: Generation is used to create new resources. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + clone: + description: Clone specifies the source resource + used to populate each generated resource. + At most one of Data or Clone can be specified. + If neither are provided, the generated resource + will be created with default data only. + properties: + name: + description: Name specifies name of the + resource. + type: string + namespace: + description: Namespace specifies source + resource namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list of + source resource used to populate each generated + resource. + properties: + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source + resource namespace. + type: string + selector: + description: Selector is a label selector. + Label keys and values in `matchLabels`. + wildcard characters are not supported. + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. + This array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of + {key,value} pairs. A single {key,value} + in the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are + ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource declaration + used to populate each generated resource. + At most one of Data or Clone must be specified. + If neither are provided, the generated resource + will be created with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + synchronize: + description: Synchronize controls if generated + resources should be kept in-sync with their + source resource. If Synchronize is set to + "true" changes to generated resources will + be overwritten with resource data from Data + or the resource specified in the Clone declaration. + Optional. Defaults to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name of + the field within 'path' that will be used + to uniquely identify an image. Note - + this field MUST be unique. + type: string + name: + description: Name is the entry the image + will be available under 'images.' + in the context. If this field is not defined, + image entries will appear under 'images.custom'. + type: string + path: + description: Path is the path to the object + containing the image field in a custom + resource. It should be slash-separated. + Each slash-separated key must be a valid + YAML key or a wildcard '*'. Wildcard keys + are expanded in case of arrays or objects. + type: string + value: + description: Value is an optional name of + the field within 'path' that points to + the image URI. This is useful when a custom + 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping from + kinds to ImageExtractorConfigs. This config is + only valid for verifyImages rules. + type: object + match: + description: MatchResources defines when this policy + rule should be applied. The match criteria can + include resource information (e.g. kind, name, + namespace, labels) and admission review request + information like the user name or role. At least + one kind is required. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + Requires at least one tag to be specified + when under MatchResources. Specifying ResourceDescription + directly under match is being deprecated. + Please specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) + and "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). NOTE: + "Name" is being deprecated in favor of + "Names".' + type: string + names: + description: Names are the names of the + resources. Each name supports wildcard + characters "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. + This array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of + {key,value} pairs. A single {key,value} + in the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are + ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` + support the wildcard characters `*` (matches + zero or many characters) and `?` (matches + one character). Wildcards allows writing + label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] matches + any key and value but does not match an + empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. + This array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of + {key,value} pairs. A single {key,value} + in the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are + ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a role + binding applies to. This can either hold + a direct API object reference, or a value + for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults + to "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are + "User", "Group", and "ServiceAccount". + If the Authorizer does not recognized + the kind value, the Authorizer should + report an error. + type: string + name: + description: Name of the object being + referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this + value is not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + mutate: + description: Mutation is used to modify matching + resources. + properties: + foreach: + description: ForEach applies mutation rules + to a list of sub-elements by creating a context + for each entry in the list and looping over + it to apply the specified logic. + items: + description: ForEach applies mutation rules + to a list of sub-elements by creating a + context for each entry in the list and looping + over it to apply the specified logic. + properties: + context: + description: Context defines variables + and data sources that can be used during + rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or a + APILookup must be provided. + properties: + apiCall: + description: APICall defines an + HTTP request to the Kubernetes + API server. The JSON data retrieved + is stored in the context. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the JSON response returned + from the API server. For example + a JMESPath of "items | length(@)" + applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count + of deployments across all + namespaces. + type: string + urlPath: + description: URLPath is the + URL path to be used in the + HTTP GET request to the Kubernetes + API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is the + same format used by the `kubectl + get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap + name. + type: string + namespace: + description: Namespace is the + ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker V2 registry + to fetch image details. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image + reference to a container image + in the registry. Example: + ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines an + arbitrary JMESPath context variable + that can be defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that + the variable may take if the + JMESPath expression evaluates + to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an + optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable + in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath + expression that results in one or more + elements to which the validation logic + is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is a + strategic merge patch used to modify + resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list + of RFC 6902 JSON Patch declarations + used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are used + to determine if a policy rule should + be applied by evaluating a set of conditions. + The declaration can contain nested `any` + or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + all of the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + at least one of the conditions need + to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic + merge patch used to modify resources. See + https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC + 6902 JSON Patch declarations used to modify + resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target resources + to be mutated. + items: + properties: + apiVersion: + description: APIVersion specifies resource + apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource + name. + type: string + namespace: + description: Namespace specifies resource + namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the rule, + It must be unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. A direct list + of conditions (without `any` or `all` statements + is supported for backwards compatibility but will + be deprecated in the next major release. See: + https://kyverno.io/docs/writing-policies/preconditions/' + x-kubernetes-preserve-unknown-fields: true + validate: + description: Validation is used to validate matching + resources. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must + be satisfied for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used to + pass or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be + declared under an `any` or `all` statement. + A direct list of conditions (without `any` + or `all` statements) is also supported + for backwards compatibility but will be + deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + foreach: + description: ForEach applies validate rules + to a list of sub-elements by creating a context + for each entry in the list and looping over + it to apply the specified logic. + items: + description: ForEach applies validate rules + to a list of sub-elements by creating a + context for each entry in the list and looping + over it to apply the specified logic. + properties: + anyPattern: + description: AnyPattern specifies list + of validation patterns. At least one + of the patterns must be satisfied for + the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables + and data sources that can be used during + rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or a + APILookup must be provided. + properties: + apiCall: + description: APICall defines an + HTTP request to the Kubernetes + API server. The JSON data retrieved + is stored in the context. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the JSON response returned + from the API server. For example + a JMESPath of "items | length(@)" + applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count + of deployments across all + namespaces. + type: string + urlPath: + description: URLPath is the + URL path to be used in the + HTTP GET request to the Kubernetes + API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is the + same format used by the `kubectl + get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap + name. + type: string + namespace: + description: Namespace is the + ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker V2 registry + to fetch image details. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image + reference to a container image + in the registry. Example: + ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines an + arbitrary JMESPath context variable + that can be defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that + the variable may take if the + JMESPath expression evaluates + to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an + optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable + in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions used + to pass or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions + can be declared under an `any` or + `all` statement. A direct list of + conditions (without `any` or `all` + statements) is also supported for + backwards compatibility but will + be deprecated in the next major + release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies whether + to use the current list element as the + scope for validation. Defaults to "true" + if not specified. When set to "false", + "request.object" is used as the validation + scope within the foreach block to allow + referencing other elements in the subtree. + type: boolean + list: + description: List specifies a JMESPath + expression that results in one or more + elements to which the validation logic + is applied. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are used + to determine if a policy rule should + be applied by evaluating a set of conditions. + The declaration can contain nested `any` + or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + all of the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + at least one of the conditions need + to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions for + manifest verification + properties: + annotationDomain: + description: AnnotationDomain is custom + domain of annotation for message and signature. + Default is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. + If the count is null, all entries + must match (a logical AND). If the + count is 1, at least one entry must + match (a logical OR). If the count + contains a value N, then N must + be less than or equal to the size + of entries, and at least N entries + must match. + minimum: 1 + type: integer + entries: + description: Entries contains the + available attestors. An attestor + can be a static key, attributes + for keyless verification, or a nested + attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are + used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. The + payload may contain other + key-value pairs. + type: object + attestor: + description: Attestor is a nested + AttestorSet used to specify + a more complex set of match + authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate + is an optional PEM encoded + public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates used + to verify + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not checked. + If an empty object is + provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set + of attribute used to verify + a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is the + certificate issuer used + for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not checked + and a root certificate + chain is expected instead. + If an empty object is + provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an + optional set of PEM encoded + trusted root certificates. + If not provided, the system + roots are used. + type: string + subject: + description: Subject is + the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is a set + of X.509 public keys used + to verify image signatures. + The keys can be directly + specified or can be a + variable reference to + a key specified in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are + specified each key is + processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors + and the count is applied + across the keys. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not checked. + If an empty object is + provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an + optional alternate OCI repository + to use for signatures and + attestations that match this + rule. If specified Repository + will override other OCI image + repository locations for this + Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored + while comparing manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional alternate + OCI repository to use for resource bundle + reference. The repository can be overridden + per Attestor or Attestation. + type: string + type: object + message: + description: Message specifies a custom message + to be displayed on failure. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions + for Kubernetes Pod Security admission by specifying + exclusions for Pod Security Standards controls. + properties: + exclude: + description: Exclude specifies the Pod Security + Standard controls to be excluded. + items: + description: PodSecurityStandard specifies + the Pod Security Standard controls to + be excluded. + properties: + controlName: + description: 'ControlName specifies + the name of the Pod Security Standard + control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching + containers and applies the container + level PSS. Each image is the image + name consisting of the registry + address, repository, image, and + tag. Empty list matches no containers, + PSS checks are applied at the pod + level only. Wildcards (''*'' and + ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security + Standard level to be applied to workloads. + Allowed values are privileged, baseline, + and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod Security + Standard versions that Kubernetes supports. + Allowed values are v1.19, v1.20, v1.21, + v1.22, v1.23, v1.24, v1.25, latest. Defaults + to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify image + signatures and mutate them to add a digest + items: + description: ImageVerification validates that + images that match the specified pattern are + signed with the supplied public key. Once the + image is verified it is mutated to include the + SHA digest retrieved during the registration. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are certificate-extensions + used for keyless signing. Deprecated. + type: object + annotations: + additionalProperties: + type: string + description: Annotations are used for image + verification. Every specified key-value + pair must exist and match in the verified + payload. The payload may contain other key-value + pairs. Deprecated. Use annotations per Attestor + instead. + type: object + attestations: + description: Attestations are optional checks + for signed in-toto Statements used to verify + the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations from + the OCI registry and decodes them into a + list of Statement declarations. + items: + description: Attestation are checks for + signed in-toto Statements that are used + to verify the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations from + the OCI registry and decodes them into + a list of Statements. + properties: + attestors: + description: Attestors specify the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the + required number of entries that + must match. If the count is + null, all entries must match + (a logical AND). If the count + is 1, at least one entry must + match (a logical OR). If the + count contains a value N, then + N must be less than or equal + to the size of entries, and + at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains + the available attestors. An + attestor can be a static key, + attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations + are used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. + The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is + a nested AttestorSet used + to specify a more complex + set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more + certificates + properties: + cert: + description: Certificate + is an optional PEM + encoded public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM + encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is + a set of attribute used + to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer + is the certificate + issuer used for keyless + signing. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked and + a root certificate + chain is expected + instead. If an empty + object is provided + the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is + an optional set of + PEM encoded trusted + root certificates. + If not provided, the + system roots are used. + type: string + subject: + description: Subject + is the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is + a set of X.509 public + keys used to verify + image signatures. + The keys can be directly + specified or can be + a variable reference + to a key specified + in a ConfigMap (see + https://kyverno.io/docs/writing-policies/variables/). + When multiple keys + are specified each + key is processed as + a separate staticKey + entry (.attestors[*].entries.keys) + within the set of + attestors and the + count is applied across + the keys. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository + is an optional alternate + OCI repository to use + for signatures and attestations + that match this rule. + If specified Repository + will override other OCI + image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used to + verify attributes within a Predicate. + If no Conditions are specified the + attestation check is satisfied as + long there are predicates that match + the predicate type. + items: + description: AnyAllConditions consists + of conditions wrapped denoting a + logical criteria to be fulfilled. + AnyConditions get fulfilled when + at least one of its sub-conditions + passes. AllConditions get fulfilled + only when all of its sub-conditions + pass. + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, all + of the conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, at + least one of the conditions + need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines the + type of Predicate contained within + the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. + If the count is null, all entries + must match (a logical AND). If the + count is 1, at least one entry must + match (a logical OR). If the count + contains a value N, then N must be + less than or equal to the size of + entries, and at least N entries must + match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static + key, attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used + for image verification. Every + specified key-value pair must + exist and match in the verified + payload. The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is a nested + AttestorSet used to specify + a more complex set of match + authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is + an optional PEM encoded + public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates used + to verify + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set + of attribute used to verify + a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is the + certificate issuer used + for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked and a root + certificate chain is expected + instead. If an empty object + is provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted + root certificates. If not + provided, the system roots + are used. + type: string + subject: + description: Subject is the + verified identity used for + keyless signing, for example + the email address + type: string + type: object + keys: + description: Keys specifies one + or more public keys + properties: + publicKeys: + description: Keys is a set + of X.509 public keys used + to verify image signatures. + The keys can be directly + specified or can be a variable + reference to a key specified + in a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as + a separate staticKey entry + (.attestors[*].entries.keys) + within the set of attestors + and the count is applied + across the keys. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an + optional alternate OCI repository + to use for signatures and attestations + that match this rule. If specified + Repository will override other + OCI image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + image: + description: 'Image is the image name consisting + of the registry address, repository, image, + and tag. Wildcards (''*'' and ''?'') are + allowed. See: https://kubernetes.io/docs/concepts/containers/images. + Deprecated. Use ImageReferences instead.' + type: string + imageReferences: + description: 'ImageReferences is a list of + matching image reference patterns. At least + one pattern in the list must match the image + for the rule to apply. Each image reference + consists of a registry address (defaults + to docker.io), repository, image, and tag + (defaults to latest). Wildcards (''*'' and + ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + issuer: + description: Issuer is the certificate issuer + used for keyless signing. Deprecated. Use + KeylessAttestor instead. + type: string + key: + description: Key is the PEM encoded public + key that the image or attestation is signed + with. Deprecated. Use StaticKeyAttestor + instead. + type: string + mutateDigest: + default: true + description: MutateDigest enables replacement + of image tags with digests. Defaults to + true. + type: boolean + repository: + description: Repository is an optional alternate + OCI repository to use for image signatures + and attestations that match this rule. If + specified Repository will override the default + OCI image repository configured for the + installation. The repository can also be + overridden per Attestor or Attestation. + type: string + required: + default: true + description: Required validates that images + are verified i.e. have matched passed a + signature or attestation check. + type: boolean + roots: + description: Roots is the PEM encoded Root + certificate chain used for keyless signing + Deprecated. Use KeylessAttestor instead. + type: string + subject: + description: Subject is the identity used + for keyless signing, for example an email + address Deprecated. Use KeylessAttestor + instead. + type: string + verifyDigest: + default: true + description: VerifyDigest validates that images + have a digest. + type: boolean + type: object + type: array + type: object + type: array + schemaValidation: + description: SchemaValidation skips validation checks + for policies as well as patched resources. Optional. + The default value is set to "true", it must be set to + "false" to disable the validation checks. + type: boolean + validationFailureAction: + default: audit + description: ValidationFailureAction defines if a validation + policy rule violation should block the admission review + request (enforce), or allow (audit) the admission review + request and report an error in a policy report. Optional. + Allowed values are audit or enforce. The default value + is "audit". + enum: + - audit + - enforce + type: string + validationFailureActionOverrides: + description: ValidationFailureActionOverrides is a Cluster + Policy attribute that specifies ValidationFailureAction + namespace-wise. It overrides ValidationFailureAction + for the specified namespaces. + items: + properties: + action: + description: ValidationFailureAction defines the + policy validation failure action + enum: + - audit + - enforce + type: string + namespaces: + items: + type: string + type: array + type: object + type: array + webhookTimeoutSeconds: + description: WebhookTimeoutSeconds specifies the maximum + time in seconds allowed to apply this policy. After + the configured time expires, the admission request may + fail, or may simply ignore the policy results, based + on the failure policy. The default timeout is 10s, the + value must be between 1 and 30 seconds. + format: int32 + type: integer + type: object + status: + description: Status contains policy runtime information. Deprecated. + Policy metrics are available via the metrics endpoint + properties: + autogen: + description: Autogen contains autogen status information + properties: + rules: + description: Rules is a list of Rule instances. It + contains auto generated rules added for pod controllers + items: + description: Rule defines a validation, mutation, + or generation control for matching resources. + Each rules contains a match declaration to select + resources, and an optional exclude declaration + to specify which resources to exclude. + properties: + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and + data sources to a rule Context. Either a + ConfigMap reference or a APILookup must + be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON + data retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the JSON response + returned from the API server. For + example a JMESPath of "items | length(@)" + applied to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path + to be used in the HTTP GET request + to the Kubernetes API server (e.g. + "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same + format used by the `kubectl get + --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap + name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch + image details. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the ImageData + struct returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be + defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that the variable + may take if the JMESPath expression + evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional + JMESPath Expression that can be + used to transform the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this + policy rule should not be applied. The exclude + criteria can include resource information + (e.g. kind, name, namespace, labels) and admission + review request information like the name or + role. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of + cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being created + or modified. Requires at least one tag + to be specified when under MatchResources. + Specifying ResourceDescription directly + under match is being deprecated. Please + specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of + annotations (key-value pairs of type + string). Annotation keys and values + support the wildcard characters "*" + (matches zero or many characters) + and "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the + resource. The name supports wildcard + characters "*" (matches zero or many + characters) and "?" (at least one + character). NOTE: "Name" is being + deprecated in favor of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a + label selector for the resource namespace. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of + namespaces names. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character). Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a role + binding applies to. This can either + hold a direct API object reference, + or a value for non-objects such as user + and group names. + properties: + apiGroup: + description: APIGroup holds the API + group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by this + API group are "User", "Group", and + "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object being + referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this + value is not empty the Authorizer + should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + generate: + description: Generation is used to create new + resources. + properties: + apiVersion: + description: APIVersion specifies resource + apiVersion. + type: string + clone: + description: Clone specifies the source + resource used to populate each generated + resource. At most one of Data or Clone + can be specified. If neither are provided, + the generated resource will be created + with default data only. + properties: + name: + description: Name specifies name of + the resource. + type: string + namespace: + description: Namespace specifies source + resource namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list + of source resource used to populate each + generated resource. + properties: + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source + resource namespace. + type: string + selector: + description: Selector is a label selector. + Label keys and values in `matchLabels`. + wildcard characters are not supported. + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource + declaration used to populate each generated + resource. At most one of Data or Clone + must be specified. If neither are provided, + the generated resource will be created + with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource + name. + type: string + namespace: + description: Namespace specifies resource + namespace. + type: string + synchronize: + description: Synchronize controls if generated + resources should be kept in-sync with + their source resource. If Synchronize + is set to "true" changes to generated + resources will be overwritten with resource + data from Data or the resource specified + in the Clone declaration. Optional. Defaults + to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name + of the field within 'path' that will + be used to uniquely identify an image. + Note - this field MUST be unique. + type: string + name: + description: Name is the entry the image + will be available under 'images.' + in the context. If this field is not + defined, image entries will appear + under 'images.custom'. + type: string + path: + description: Path is the path to the + object containing the image field + in a custom resource. It should be + slash-separated. Each slash-separated + key must be a valid YAML key or a + wildcard '*'. Wildcard keys are expanded + in case of arrays or objects. + type: string + value: + description: Value is an optional name + of the field within 'path' that points + to the image URI. This is useful when + a custom 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping + from kinds to ImageExtractorConfigs. This + config is only valid for verifyImages rules. + type: object + match: + description: MatchResources defines when this + policy rule should be applied. The match criteria + can include resource information (e.g. kind, + name, namespace, labels) and admission review + request information like the user name or + role. At least one kind is required. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of + cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being created + or modified. Requires at least one tag + to be specified when under MatchResources. + Specifying ResourceDescription directly + under match is being deprecated. Please + specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of + annotations (key-value pairs of type + string). Annotation keys and values + support the wildcard characters "*" + (matches zero or many characters) + and "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the + resource. The name supports wildcard + characters "*" (matches zero or many + characters) and "?" (at least one + character). NOTE: "Name" is being + deprecated in favor of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a + label selector for the resource namespace. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of + namespaces names. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character). Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a role + binding applies to. This can either + hold a direct API object reference, + or a value for non-objects such as user + and group names. + properties: + apiGroup: + description: APIGroup holds the API + group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by this + API group are "User", "Group", and + "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object being + referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this + value is not empty the Authorizer + should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + mutate: + description: Mutation is used to modify matching + resources. + properties: + foreach: + description: ForEach applies mutation rules + to a list of sub-elements by creating + a context for each entry in the list and + looping over it to apply the specified + logic. + items: + description: ForEach applies mutation + rules to a list of sub-elements by creating + a context for each entry in the list + and looping over it to apply the specified + logic. + properties: + context: + description: Context defines variables + and data sources that can be used + during rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or + a APILookup must be provided. + properties: + apiCall: + description: APICall defines + an HTTP request to the Kubernetes + API server. The JSON data + retrieved is stored in the + context. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + JSON response returned + from the API server. For + example a JMESPath of + "items | length(@)" applied + to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total + count of deployments across + all namespaces. + type: string + urlPath: + description: URLPath is + the URL path to be used + in the HTTP GET request + to the Kubernetes API + server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is + the same format used by + the `kubectl get --raw` + command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the + ConfigMap reference. + properties: + name: + description: Name is the + ConfigMap name. + type: string + namespace: + description: Namespace is + the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker + V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference + is image reference to + a container image in the + registry. Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines + an arbitrary JMESPath context + variable that can be defined + inline. + properties: + default: + description: Default is + an optional arbitrary + JSON object that the variable + may take if the JMESPath + expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is + an optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any + arbitrary JSON object + representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath + expression that results in one or + more elements to which the validation + logic is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is + a strategic merge patch used to + modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a + list of RFC 6902 JSON Patch declarations + used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are + used to determine if a policy rule + should be applied by evaluating + a set of conditions. The declaration + can contain nested `any` or `all` + statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, all + of the conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, at + least one of the conditions + need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic + merge patch used to modify resources. + See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of + RFC 6902 JSON Patch declarations used + to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target + resources to be mutated. + items: + properties: + apiVersion: + description: APIVersion specifies + resource apiVersion. + type: string + kind: + description: Kind specifies resource + kind. + type: string + name: + description: Name specifies the resource + name. + type: string + namespace: + description: Namespace specifies resource + namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the + rule, It must be unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. A direct + list of conditions (without `any` or `all` + statements is supported for backwards compatibility + but will be deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/preconditions/' + x-kubernetes-preserve-unknown-fields: true + validate: + description: Validation is used to validate + matching resources. + properties: + anyPattern: + description: AnyPattern specifies list of + validation patterns. At least one of the + patterns must be satisfied for the validation + rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used + to pass or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can + be declared under an `any` or `all` + statement. A direct list of conditions + (without `any` or `all` statements) + is also supported for backwards compatibility + but will be deprecated in the next + major release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + foreach: + description: ForEach applies validate rules + to a list of sub-elements by creating + a context for each entry in the list and + looping over it to apply the specified + logic. + items: + description: ForEach applies validate + rules to a list of sub-elements by creating + a context for each entry in the list + and looping over it to apply the specified + logic. + properties: + anyPattern: + description: AnyPattern specifies + list of validation patterns. At + least one of the patterns must be + satisfied for the validation rule + to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables + and data sources that can be used + during rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or + a APILookup must be provided. + properties: + apiCall: + description: APICall defines + an HTTP request to the Kubernetes + API server. The JSON data + retrieved is stored in the + context. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + JSON response returned + from the API server. For + example a JMESPath of + "items | length(@)" applied + to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total + count of deployments across + all namespaces. + type: string + urlPath: + description: URLPath is + the URL path to be used + in the HTTP GET request + to the Kubernetes API + server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is + the same format used by + the `kubectl get --raw` + command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the + ConfigMap reference. + properties: + name: + description: Name is the + ConfigMap name. + type: string + namespace: + description: Namespace is + the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker + V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference + is image reference to + a container image in the + registry. Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines + an arbitrary JMESPath context + variable that can be defined + inline. + properties: + default: + description: Default is + an optional arbitrary + JSON object that the variable + may take if the JMESPath + expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is + an optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any + arbitrary JSON object + representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions + used to pass or fail a validation + rule. + properties: + conditions: + description: 'Multiple conditions + can be declared under an `any` + or `all` statement. A direct + list of conditions (without + `any` or `all` statements) is + also supported for backwards + compatibility but will be deprecated + in the next major release. See: + https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies + whether to use the current list + element as the scope for validation. + Defaults to "true" if not specified. + When set to "false", "request.object" + is used as the validation scope + within the foreach block to allow + referencing other elements in the + subtree. + type: boolean + list: + description: List specifies a JMESPath + expression that results in one or + more elements to which the validation + logic is applied. + type: string + pattern: + description: Pattern specifies an + overlay-style pattern used to check + resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are + used to determine if a policy rule + should be applied by evaluating + a set of conditions. The declaration + can contain nested `any` or `all` + statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, all + of the conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, at + least one of the conditions + need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions + for manifest verification + properties: + annotationDomain: + description: AnnotationDomain is custom + domain of annotation for message and + signature. Default is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the + required attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the + required number of entries that + must match. If the count is + null, all entries must match + (a logical AND). If the count + is 1, at least one entry must + match (a logical OR). If the + count contains a value N, then + N must be less than or equal + to the size of entries, and + at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains + the available attestors. An + attestor can be a static key, + attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations + are used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. + The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is + a nested AttestorSet used + to specify a more complex + set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more + certificates + properties: + cert: + description: Certificate + is an optional PEM + encoded public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM + encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is + a set of attribute used + to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer + is the certificate + issuer used for keyless + signing. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked and + a root certificate + chain is expected + instead. If an empty + object is provided + the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is + an optional set of + PEM encoded trusted + root certificates. + If not provided, the + system roots are used. + type: string + subject: + description: Subject + is the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is + a set of X.509 public + keys used to verify + image signatures. + The keys can be directly + specified or can be + a variable reference + to a key specified + in a ConfigMap (see + https://kyverno.io/docs/writing-policies/variables/). + When multiple keys + are specified each + key is processed as + a separate staticKey + entry (.attestors[*].entries.keys) + within the set of + attestors and the + count is applied across + the keys. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository + is an optional alternate + OCI repository to use + for signatures and attestations + that match this rule. + If specified Repository + will override other OCI + image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored + while comparing manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional + alternate OCI repository to use for + resource bundle reference. The repository + can be overridden per Attestor or + Attestation. + type: string + type: object + message: + description: Message specifies a custom + message to be displayed on failure. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions + for Kubernetes Pod Security admission + by specifying exclusions for Pod Security + Standards controls. + properties: + exclude: + description: Exclude specifies the Pod + Security Standard controls to be excluded. + items: + description: PodSecurityStandard specifies + the Pod Security Standard controls + to be excluded. + properties: + controlName: + description: 'ControlName specifies + the name of the Pod Security + Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching + containers and applies the container + level PSS. Each image is the + image name consisting of the + registry address, repository, + image, and tag. Empty list matches + no containers, PSS checks are + applied at the pod level only. + Wildcards (''*'' and ''?'') + are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security + Standard level to be applied to workloads. + Allowed values are privileged, baseline, + and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod + Security Standard versions that Kubernetes + supports. Allowed values are v1.19, + v1.20, v1.21, v1.22, v1.23, v1.24, + v1.25, latest. Defaults to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify + image signatures and mutate them to add a + digest + items: + description: ImageVerification validates that + images that match the specified pattern + are signed with the supplied public key. + Once the image is verified it is mutated + to include the SHA digest retrieved during + the registration. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are + certificate-extensions used for keyless + signing. Deprecated. + type: object + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. Deprecated. + Use annotations per Attestor instead. + type: object + attestations: + description: Attestations are optional + checks for signed in-toto Statements + used to verify the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations + from the OCI registry and decodes them + into a list of Statement declarations. + items: + description: Attestation are checks + for signed in-toto Statements that + are used to verify the image. See + https://github.com/in-toto/attestation. + Kyverno fetches signed attestations + from the OCI registry and decodes + them into a list of Statements. + properties: + attestors: + description: Attestors specify the + required attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies + the required number of entries + that must match. If the + count is null, all entries + must match (a logical AND). + If the count is 1, at least + one entry must match (a + logical OR). If the count + contains a value N, then + N must be less than or equal + to the size of entries, + and at least N entries must + match. + minimum: 1 + type: integer + entries: + description: Entries contains + the available attestors. + An attestor can be a static + key, attributes for keyless + verification, or a nested + attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations + are used for image + verification. Every + specified key-value + pair must exist and + match in the verified + payload. The payload + may contain other + key-value pairs. + type: object + attestor: + description: Attestor + is a nested AttestorSet + used to specify a + more complex set of + match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more + certificates + properties: + cert: + description: Certificate + is an optional + PEM encoded public + certificate. + type: string + certChain: + description: CertificateChain + is an optional + PEM encoded set + of certificates + used to verify + type: string + rekor: + description: Rekor + provides configuration + for the Rekor + transparency log + service. If the + value is nil, + Rekor is not checked. + If an empty object + is provided the + public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless + is a set of attribute + used to verify a Sigstore + keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless + signing. + type: object + issuer: + description: Issuer + is the certificate + issuer used for + keyless signing. + type: string + rekor: + description: Rekor + provides configuration + for the Rekor + transparency log + service. If the + value is nil, + Rekor is not checked + and a root certificate + chain is expected + instead. If an + empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots + is an optional + set of PEM encoded + trusted root certificates. + If not provided, + the system roots + are used. + type: string + subject: + description: Subject + is the verified + identity used + for keyless signing, + for example the + email address + type: string + type: object + keys: + description: Keys specifies + one or more public + keys + properties: + publicKeys: + description: Keys + is a set of X.509 + public keys used + to verify image + signatures. The + keys can be directly + specified or can + be a variable + reference to a + key specified + in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple + keys are specified + each key is processed + as a separate + staticKey entry + (.attestors[*].entries.keys) + within the set + of attestors and + the count is applied + across the keys. + type: string + rekor: + description: Rekor + provides configuration + for the Rekor + transparency log + service. If the + value is nil, + Rekor is not checked. + If an empty object + is provided the + public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository + is an optional alternate + OCI repository to + use for signatures + and attestations that + match this rule. If + specified Repository + will override other + OCI image repository + locations for this + Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used + to verify attributes within a + Predicate. If no Conditions are + specified the attestation check + is satisfied as long there are + predicates that match the predicate + type. + items: + description: AnyAllConditions + consists of conditions wrapped + denoting a logical criteria + to be fulfilled. AnyConditions + get fulfilled when at least + one of its sub-conditions passes. + AllConditions get fulfilled + only when all of its sub-conditions + pass. + properties: + all: + description: AllConditions + enable variable-based conditional + rule execution. This is + useful for finer control + of when an rule is applied. + A condition can reference + object data using JMESPath + notation. Here, all of the + conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is + the context entry + (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator + is the conditional + operation to perform. + Valid operators are: + Equals, NotEquals, + In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, + DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is + the conditional value, + or set of values. + The values can be + fixed set or can be + variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions + enable variable-based conditional + rule execution. This is + useful for finer control + of when an rule is applied. + A condition can reference + object data using JMESPath + notation. Here, at least + one of the conditions need + to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is + the context entry + (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator + is the conditional + operation to perform. + Valid operators are: + Equals, NotEquals, + In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, + DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is + the conditional value, + or set of values. + The values can be + fixed set or can be + variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines + the type of Predicate contained + within the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the + required number of entries that + must match. If the count is null, + all entries must match (a logical + AND). If the count is 1, at least + one entry must match (a logical + OR). If the count contains a value + N, then N must be less than or + equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the + available attestors. An attestor + can be a static key, attributes + for keyless verification, or a + nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are + used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. + The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is a + nested AttestorSet used + to specify a more complex + set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more certificates + properties: + cert: + description: Certificate + is an optional PEM encoded + public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates + used to verify + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not + checked. If an empty + object is provided the + public instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a + set of attribute used to + verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is + the certificate issuer + used for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not + checked and a root certificate + chain is expected instead. + If an empty object is + provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is + an optional set of PEM + encoded trusted root + certificates. If not + provided, the system + roots are used. + type: string + subject: + description: Subject is + the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is a + set of X.509 public + keys used to verify + image signatures. The + keys can be directly + specified or can be + a variable reference + to a key specified in + a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are + specified each key is + processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors + and the count is applied + across the keys. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not + checked. If an empty + object is provided the + public instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is + an optional alternate OCI + repository to use for signatures + and attestations that match + this rule. If specified + Repository will override + other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + image: + description: 'Image is the image name + consisting of the registry address, + repository, image, and tag. Wildcards + (''*'' and ''?'') are allowed. See: + https://kubernetes.io/docs/concepts/containers/images. + Deprecated. Use ImageReferences instead.' + type: string + imageReferences: + description: 'ImageReferences is a list + of matching image reference patterns. + At least one pattern in the list must + match the image for the rule to apply. + Each image reference consists of a registry + address (defaults to docker.io), repository, + image, and tag (defaults to latest). + Wildcards (''*'' and ''?'') are allowed. + See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + issuer: + description: Issuer is the certificate + issuer used for keyless signing. Deprecated. + Use KeylessAttestor instead. + type: string + key: + description: Key is the PEM encoded public + key that the image or attestation is + signed with. Deprecated. Use StaticKeyAttestor + instead. + type: string + mutateDigest: + default: true + description: MutateDigest enables replacement + of image tags with digests. Defaults + to true. + type: boolean + repository: + description: Repository is an optional + alternate OCI repository to use for + image signatures and attestations that + match this rule. If specified Repository + will override the default OCI image + repository configured for the installation. + The repository can also be overridden + per Attestor or Attestation. + type: string + required: + default: true + description: Required validates that images + are verified i.e. have matched passed + a signature or attestation check. + type: boolean + roots: + description: Roots is the PEM encoded + Root certificate chain used for keyless + signing Deprecated. Use KeylessAttestor + instead. + type: string + subject: + description: Subject is the identity used + for keyless signing, for example an + email address Deprecated. Use KeylessAttestor + instead. + type: string + verifyDigest: + default: true + description: VerifyDigest validates that + images have a digest. + type: boolean + type: object + type: array + type: object + type: array + type: object + conditions: + description: Conditions is a list of conditions that apply + to the policy + items: + description: "Condition contains details for one aspect + of the current state of this API Resource. --- This + struct is intended for direct use as an array at the + field path .status.conditions. For example, \n type + FooStatus struct{ // Represents the observations of + a foo's current state. // Known .status.conditions.type + are: \"Available\", \"Progressing\", and \"Degraded\" + // +patchMergeKey=type // +patchStrategy=merge // + +listType=map // +listMapKey=type Conditions []metav1.Condition + `json:\"conditions,omitempty\" patchStrategy:\"merge\" + patchMergeKey:\"type\" protobuf:\"bytes,1,rep,name=conditions\"` + \n // other fields }" + properties: + lastTransitionTime: + description: lastTransitionTime is the last time + the condition transitioned from one status to + another. This should be when the underlying condition + changed. If that is not known, then using the + time when the API field changed is acceptable. + format: date-time + type: string + message: + description: message is a human readable message + indicating details about the transition. This + may be an empty string. + maxLength: 32768 + type: string + observedGeneration: + description: observedGeneration represents the .metadata.generation + that the condition was set based upon. For instance, + if .metadata.generation is currently 12, but the + .status.conditions[x].observedGeneration is 9, + the condition is out of date with respect to the + current state of the instance. + format: int64 + minimum: 0 + type: integer + reason: + description: reason contains a programmatic identifier + indicating the reason for the condition's last + transition. Producers of specific condition types + may define expected values and meanings for this + field, and whether the values are considered a + guaranteed API. The value should be a CamelCase + string. This field may not be empty. + maxLength: 1024 + minLength: 1 + pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$ + type: string + status: + description: status of the condition, one of True, + False, Unknown. + enum: + - "True" + - "False" + - Unknown + type: string + type: + description: type of condition in CamelCase or in + foo.example.com/CamelCase. --- Many .condition.type + values are consistent across resources like Available, + but because arbitrary conditions can be useful + (see .node.status.conditions), the ability to + deconflict is important. The regex it matches + is (dns1123SubdomainFmt/)?(qualifiedNameFmt) + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ + type: string + required: + - lastTransitionTime + - message + - reason + - status + - type + type: object + type: array + ready: + description: Ready indicates if the policy is ready to + serve the admission request. Deprecated in favor of + Conditions + type: boolean + required: + - ready + type: object + required: + - spec + type: object + served: true + storage: true + subresources: + status: {} + - additionalPrinterColumns: + - jsonPath: .spec.background + name: Background + type: boolean + - jsonPath: .spec.validationFailureAction + name: Validate Action + type: string + - jsonPath: .spec.failurePolicy + name: Failure Policy + priority: 1 + type: string + - jsonPath: .status.ready + name: Ready + type: boolean + name: v2beta1 + schema: + openAPIV3Schema: + description: 'Policy declares validation, mutation, and generation + behaviors for matching resources. See: https://kyverno.io/docs/writing-policies/ + for more information.' + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this + representation of an object. Servers should convert recognized + schemas to the latest internal value, and may reject unrecognized + values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST + resource this object represents. Servers may infer this + from the endpoint the client submits requests to. Cannot + be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: Spec defines policy behaviors and contains one + or more rules. + properties: + applyRules: + description: ApplyRules controls how rules in a policy + are applied. Rule are processed in the order of declaration. + When set to `One` processing stops after a rule has + been applied i.e. the rule matches and results in a + pass, fail, or error. When set to `All` all rules in + the policy are processed. The default is `All`. + enum: + - All + - One + type: string + background: + default: true + description: Background controls if rules are applied + to existing resources during a background scan. Optional. + Default value is "true". The value must be set to "false" + if the policy rule uses variables that are only available + in the admission review request (e.g. user name). + type: boolean + failurePolicy: + description: FailurePolicy defines how unexpected policy + errors and webhook response timeout errors are handled. + Rules within the same policy share the same failure + behavior. Allowed values are Ignore or Fail. Defaults + to Fail. + enum: + - Ignore + - Fail + type: string + generateExistingOnPolicyUpdate: + description: GenerateExistingOnPolicyUpdate controls whether + to trigger generate rule in existing resources If is + set to "true" generate rule will be triggered and applied + to existing matched resources. Defaults to "false" if + not specified. + type: boolean + mutateExistingOnPolicyUpdate: + description: MutateExistingOnPolicyUpdate controls if + a mutateExisting policy is applied on policy events. + Default value is "false". + type: boolean + rules: + description: Rules is a list of Rule instances. A Policy + contains multiple rules and each rule can validate, + mutate, or generate resources. + items: + description: Rule defines a validation, mutation, or + generation control for matching resources. Each rules + contains a match declaration to select resources, + and an optional exclude declaration to specify which + resources to exclude. + properties: + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and data + sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON data + retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to + transform the JSON response returned + from the API server. For example a JMESPath + of "items | length(@)" applied to the + API server response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to + be used in the HTTP GET request to the + Kubernetes API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). The + format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to + transform the ImageData struct returned + as a result of processing the image + reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be defined + inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take + if the JMESPath expression evaluates + to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary JSON + object representable in YAML or JSON + form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this + policy rule should not be applied. The exclude + criteria can include resource information (e.g. + kind, name, namespace, labels) and admission review + request information like the name or role. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + type: object + generate: + description: Generation is used to create new resources. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + clone: + description: Clone specifies the source resource + used to populate each generated resource. + At most one of Data or Clone can be specified. + If neither are provided, the generated resource + will be created with default data only. + properties: + name: + description: Name specifies name of the + resource. + type: string + namespace: + description: Namespace specifies source + resource namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list of + source resource used to populate each generated + resource. + properties: + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source + resource namespace. + type: string + selector: + description: Selector is a label selector. + Label keys and values in `matchLabels`. + wildcard characters are not supported. + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. + This array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of + {key,value} pairs. A single {key,value} + in the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are + ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource declaration + used to populate each generated resource. + At most one of Data or Clone must be specified. + If neither are provided, the generated resource + will be created with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + synchronize: + description: Synchronize controls if generated + resources should be kept in-sync with their + source resource. If Synchronize is set to + "true" changes to generated resources will + be overwritten with resource data from Data + or the resource specified in the Clone declaration. + Optional. Defaults to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name of + the field within 'path' that will be used + to uniquely identify an image. Note - + this field MUST be unique. + type: string + name: + description: Name is the entry the image + will be available under 'images.' + in the context. If this field is not defined, + image entries will appear under 'images.custom'. + type: string + path: + description: Path is the path to the object + containing the image field in a custom + resource. It should be slash-separated. + Each slash-separated key must be a valid + YAML key or a wildcard '*'. Wildcard keys + are expanded in case of arrays or objects. + type: string + value: + description: Value is an optional name of + the field within 'path' that points to + the image URI. This is useful when a custom + 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping from + kinds to ImageExtractorConfigs. This config is + only valid for verifyImages rules. + type: object + match: + description: MatchResources defines when this policy + rule should be applied. The match criteria can + include resource information (e.g. kind, name, + namespace, labels) and admission review request + information like the user name or role. At least + one kind is required. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users to + "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation keys + and values support the wildcard + characters "*" (matches zero or + many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of + the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). NOTE: + "Name" is being deprecated in favor + of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is + a label selector for the resource + namespace. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character).Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name supports + wildcard characters "*" (matches + zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the wildcard + characters `*` (matches zero or + many characters) and `?` (matches + one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] + matches any key and value but does + not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, a key, + and an operator that relates + the key and values. + properties: + key: + description: key is the + label key that the selector + applies to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid + operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In + or NotIn, the values array + must be non-empty. If + the operator is Exists + or DoesNotExist, the values + array must be empty. This + array is replaced during + a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a + map of {key,value} pairs. A + single {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator + is "In", and the values array + contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a + role binding applies to. This can + either hold a direct API object reference, + or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the + API group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by + this API group are "User", "Group", + and "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is + non-namespace, such as "User" + or "Group", and this value is + not empty the Authorizer should + report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + type: object + mutate: + description: Mutation is used to modify matching + resources. + properties: + foreach: + description: ForEach applies mutation rules + to a list of sub-elements by creating a context + for each entry in the list and looping over + it to apply the specified logic. + items: + description: ForEach applies mutation rules + to a list of sub-elements by creating a + context for each entry in the list and looping + over it to apply the specified logic. + properties: + context: + description: Context defines variables + and data sources that can be used during + rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or a + APILookup must be provided. + properties: + apiCall: + description: APICall defines an + HTTP request to the Kubernetes + API server. The JSON data retrieved + is stored in the context. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the JSON response returned + from the API server. For example + a JMESPath of "items | length(@)" + applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count + of deployments across all + namespaces. + type: string + urlPath: + description: URLPath is the + URL path to be used in the + HTTP GET request to the Kubernetes + API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is the + same format used by the `kubectl + get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap + name. + type: string + namespace: + description: Namespace is the + ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker V2 registry + to fetch image details. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image + reference to a container image + in the registry. Example: + ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines an + arbitrary JMESPath context variable + that can be defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that + the variable may take if the + JMESPath expression evaluates + to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an + optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable + in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath + expression that results in one or more + elements to which the validation logic + is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is a + strategic merge patch used to modify + resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list + of RFC 6902 JSON Patch declarations + used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are used + to determine if a policy rule should + be applied by evaluating a set of conditions. + The declaration can contain nested `any` + or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + all of the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + at least one of the conditions need + to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic + merge patch used to modify resources. See + https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC + 6902 JSON Patch declarations used to modify + resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target resources + to be mutated. + items: + properties: + apiVersion: + description: APIVersion specifies resource + apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource + name. + type: string + namespace: + description: Namespace specifies resource + namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the rule, + It must be unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. A direct list + of conditions (without `any` or `all` statements + is supported for backwards compatibility but See: + https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of the + conditions need to pass + items: + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + validate: + description: Validation is used to validate matching + resources. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must + be satisfied for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used to + pass or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be + declared under an `any` or `all` statement. + A direct list of conditions (without `any` + or `all` statements) is also supported + for backwards compatibility See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is + useful for finer control of when an + rule is applied. A condition can reference + object data using JMESPath notation. + Here, all of the conditions need to + pass + items: + properties: + key: + description: Key is the context + entry (using JMESPath) for conditional + rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or can + be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is + useful for finer control of when an + rule is applied. A condition can reference + object data using JMESPath notation. + Here, at least one of the conditions + need to pass + items: + properties: + key: + description: Key is the context + entry (using JMESPath) for conditional + rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or can + be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: object + foreach: + description: ForEach applies validate rules + to a list of sub-elements by creating a context + for each entry in the list and looping over + it to apply the specified logic. + items: + description: ForEach applies validate rules + to a list of sub-elements by creating a + context for each entry in the list and looping + over it to apply the specified logic. + properties: + anyPattern: + description: AnyPattern specifies list + of validation patterns. At least one + of the patterns must be satisfied for + the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables + and data sources that can be used during + rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or a + APILookup must be provided. + properties: + apiCall: + description: APICall defines an + HTTP request to the Kubernetes + API server. The JSON data retrieved + is stored in the context. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the JSON response returned + from the API server. For example + a JMESPath of "items | length(@)" + applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count + of deployments across all + namespaces. + type: string + urlPath: + description: URLPath is the + URL path to be used in the + HTTP GET request to the Kubernetes + API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is the + same format used by the `kubectl + get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap + name. + type: string + namespace: + description: Namespace is the + ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker V2 registry + to fetch image details. + properties: + jmesPath: + description: JMESPath is an + optional JSON Match Expression + that can be used to transform + the ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image + reference to a container image + in the registry. Example: + ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines an + arbitrary JMESPath context variable + that can be defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that + the variable may take if the + JMESPath expression evaluates + to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an + optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable + in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions used + to pass or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions + can be declared under an `any` or + `all` statement. A direct list of + conditions (without `any` or `all` + statements) is also supported for + backwards compatibility but will + be deprecated in the next major + release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies whether + to use the current list element as the + scope for validation. Defaults to "true" + if not specified. When set to "false", + "request.object" is used as the validation + scope within the foreach block to allow + referencing other elements in the subtree. + type: boolean + list: + description: List specifies a JMESPath + expression that results in one or more + elements to which the validation logic + is applied. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are used + to determine if a policy rule should + be applied by evaluating a set of conditions. + The declaration can contain nested `any` + or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + all of the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for finer + control of when an rule is applied. + A condition can reference object + data using JMESPath notation. Here, + at least one of the conditions need + to pass + items: + description: Condition defines variable-based + conditional criteria for rule + execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the + conditional operation to perform. + Valid operators are: Equals, + NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The + values can be fixed set or + can be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions for + manifest verification + properties: + annotationDomain: + description: AnnotationDomain is custom + domain of annotation for message and signature. + Default is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. + If the count is null, all entries + must match (a logical AND). If the + count is 1, at least one entry must + match (a logical OR). If the count + contains a value N, then N must + be less than or equal to the size + of entries, and at least N entries + must match. + minimum: 1 + type: integer + entries: + description: Entries contains the + available attestors. An attestor + can be a static key, attributes + for keyless verification, or a nested + attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are + used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. The + payload may contain other + key-value pairs. + type: object + attestor: + description: Attestor is a nested + AttestorSet used to specify + a more complex set of match + authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate + is an optional PEM encoded + public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates used + to verify + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not checked. + If an empty object is + provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set + of attribute used to verify + a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is the + certificate issuer used + for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not checked + and a root certificate + chain is expected instead. + If an empty object is + provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an + optional set of PEM encoded + trusted root certificates. + If not provided, the system + roots are used. + type: string + subject: + description: Subject is + the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is a set + of X.509 public keys used + to verify image signatures. + The keys can be directly + specified or can be a + variable reference to + a key specified in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are + specified each key is + processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors + and the count is applied + across the keys. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not checked. + If an empty object is + provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an + optional alternate OCI repository + to use for signatures and + attestations that match this + rule. If specified Repository + will override other OCI image + repository locations for this + Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored + while comparing manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional alternate + OCI repository to use for resource bundle + reference. The repository can be overridden + per Attestor or Attestation. + type: string + type: object + message: + description: Message specifies a custom message + to be displayed on failure. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions + for Kubernetes Pod Security admission by specifying + exclusions for Pod Security Standards controls. + properties: + exclude: + description: Exclude specifies the Pod Security + Standard controls to be excluded. + items: + description: PodSecurityStandard specifies + the Pod Security Standard controls to + be excluded. + properties: + controlName: + description: 'ControlName specifies + the name of the Pod Security Standard + control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching + containers and applies the container + level PSS. Each image is the image + name consisting of the registry + address, repository, image, and + tag. Empty list matches no containers, + PSS checks are applied at the pod + level only. Wildcards (''*'' and + ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security + Standard level to be applied to workloads. + Allowed values are privileged, baseline, + and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod Security + Standard versions that Kubernetes supports. + Allowed values are v1.19, v1.20, v1.21, + v1.22, v1.23, v1.24, v1.25, latest. Defaults + to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify image + signatures and mutate them to add a digest + items: + description: ImageVerification validates that + images that match the specified pattern are + signed with the supplied public key. Once the + image is verified it is mutated to include the + SHA digest retrieved during the registration. + properties: + attestations: + description: Attestations are optional checks + for signed in-toto Statements used to verify + the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations from + the OCI registry and decodes them into a + list of Statement declarations. + items: + description: Attestation are checks for + signed in-toto Statements that are used + to verify the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations from + the OCI registry and decodes them into + a list of Statements. + properties: + attestors: + description: Attestors specify the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the + required number of entries that + must match. If the count is + null, all entries must match + (a logical AND). If the count + is 1, at least one entry must + match (a logical OR). If the + count contains a value N, then + N must be less than or equal + to the size of entries, and + at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains + the available attestors. An + attestor can be a static key, + attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations + are used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. + The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is + a nested AttestorSet used + to specify a more complex + set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more + certificates + properties: + cert: + description: Certificate + is an optional PEM + encoded public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM + encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is + a set of attribute used + to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer + is the certificate + issuer used for keyless + signing. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked and + a root certificate + chain is expected + instead. If an empty + object is provided + the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is + an optional set of + PEM encoded trusted + root certificates. + If not provided, the + system roots are used. + type: string + subject: + description: Subject + is the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is + a set of X.509 public + keys used to verify + image signatures. + The keys can be directly + specified or can be + a variable reference + to a key specified + in a ConfigMap (see + https://kyverno.io/docs/writing-policies/variables/). + When multiple keys + are specified each + key is processed as + a separate staticKey + entry (.attestors[*].entries.keys) + within the set of + attestors and the + count is applied across + the keys. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository + is an optional alternate + OCI repository to use + for signatures and attestations + that match this rule. + If specified Repository + will override other OCI + image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used to + verify attributes within a Predicate. + If no Conditions are specified the + attestation check is satisfied as + long there are predicates that match + the predicate type. + items: + description: AnyAllConditions consists + of conditions wrapped denoting a + logical criteria to be fulfilled. + AnyConditions get fulfilled when + at least one of its sub-conditions + passes. AllConditions get fulfilled + only when all of its sub-conditions + pass. + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, all + of the conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, at + least one of the conditions + need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines the + type of Predicate contained within + the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. + If the count is null, all entries + must match (a logical AND). If the + count is 1, at least one entry must + match (a logical OR). If the count + contains a value N, then N must be + less than or equal to the size of + entries, and at least N entries must + match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static + key, attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used + for image verification. Every + specified key-value pair must + exist and match in the verified + payload. The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is a nested + AttestorSet used to specify + a more complex set of match + authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is + an optional PEM encoded + public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates used + to verify + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set + of attribute used to verify + a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is the + certificate issuer used + for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked and a root + certificate chain is expected + instead. If an empty object + is provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted + root certificates. If not + provided, the system roots + are used. + type: string + subject: + description: Subject is the + verified identity used for + keyless signing, for example + the email address + type: string + type: object + keys: + description: Keys specifies one + or more public keys + properties: + publicKeys: + description: Keys is a set + of X.509 public keys used + to verify image signatures. + The keys can be directly + specified or can be a variable + reference to a key specified + in a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as + a separate staticKey entry + (.attestors[*].entries.keys) + within the set of attestors + and the count is applied + across the keys. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an + optional alternate OCI repository + to use for signatures and attestations + that match this rule. If specified + Repository will override other + OCI image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + imageReferences: + description: 'ImageReferences is a list of + matching image reference patterns. At least + one pattern in the list must match the image + for the rule to apply. Each image reference + consists of a registry address (defaults + to docker.io), repository, image, and tag + (defaults to latest). Wildcards (''*'' and + ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + mutateDigest: + default: true + description: MutateDigest enables replacement + of image tags with digests. Defaults to + true. + type: boolean + repository: + description: Repository is an optional alternate + OCI repository to use for image signatures + and attestations that match this rule. If + specified Repository will override the default + OCI image repository configured for the + installation. The repository can also be + overridden per Attestor or Attestation. + type: string + required: + default: true + description: Required validates that images + are verified i.e. have matched passed a + signature or attestation check. + type: boolean + verifyDigest: + default: true + description: VerifyDigest validates that images + have a digest. + type: boolean + type: object + type: array + type: object + type: array + schemaValidation: + description: SchemaValidation skips validation checks + for policies as well as patched resources. Optional. + The default value is set to "true", it must be set to + "false" to disable the validation checks. + type: boolean + validationFailureAction: + default: audit + description: ValidationFailureAction defines if a validation + policy rule violation should block the admission review + request (enforce), or allow (audit) the admission review + request and report an error in a policy report. Optional. + Allowed values are audit or enforce. The default value + is "audit". + enum: + - audit + - enforce + type: string + validationFailureActionOverrides: + description: ValidationFailureActionOverrides is a Cluster + Policy attribute that specifies ValidationFailureAction + namespace-wise. It overrides ValidationFailureAction + for the specified namespaces. + items: + properties: + action: + description: ValidationFailureAction defines the + policy validation failure action + enum: + - audit + - enforce + type: string + namespaces: + items: + type: string + type: array + type: object + type: array + webhookTimeoutSeconds: + description: WebhookTimeoutSeconds specifies the maximum + time in seconds allowed to apply this policy. After + the configured time expires, the admission request may + fail, or may simply ignore the policy results, based + on the failure policy. The default timeout is 10s, the + value must be between 1 and 30 seconds. + format: int32 + type: integer + type: object + status: + description: Status contains policy runtime data. + properties: + autogen: + description: Autogen contains autogen status information + properties: + rules: + description: Rules is a list of Rule instances. It + contains auto generated rules added for pod controllers + items: + description: Rule defines a validation, mutation, + or generation control for matching resources. + Each rules contains a match declaration to select + resources, and an optional exclude declaration + to specify which resources to exclude. + properties: + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and + data sources to a rule Context. Either a + ConfigMap reference or a APILookup must + be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON + data retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the JSON response + returned from the API server. For + example a JMESPath of "items | length(@)" + applied to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path + to be used in the HTTP GET request + to the Kubernetes API server (e.g. + "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same + format used by the `kubectl get + --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap + name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch + image details. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the ImageData + struct returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be + defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that the variable + may take if the JMESPath expression + evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional + JMESPath Expression that can be + used to transform the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this + policy rule should not be applied. The exclude + criteria can include resource information + (e.g. kind, name, namespace, labels) and admission + review request information like the name or + role. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of + cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being created + or modified. Requires at least one tag + to be specified when under MatchResources. + Specifying ResourceDescription directly + under match is being deprecated. Please + specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of + annotations (key-value pairs of type + string). Annotation keys and values + support the wildcard characters "*" + (matches zero or many characters) + and "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the + resource. The name supports wildcard + characters "*" (matches zero or many + characters) and "?" (at least one + character). NOTE: "Name" is being + deprecated in favor of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a + label selector for the resource namespace. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of + namespaces names. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character). Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a role + binding applies to. This can either + hold a direct API object reference, + or a value for non-objects such as user + and group names. + properties: + apiGroup: + description: APIGroup holds the API + group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by this + API group are "User", "Group", and + "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object being + referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this + value is not empty the Authorizer + should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + generate: + description: Generation is used to create new + resources. + properties: + apiVersion: + description: APIVersion specifies resource + apiVersion. + type: string + clone: + description: Clone specifies the source + resource used to populate each generated + resource. At most one of Data or Clone + can be specified. If neither are provided, + the generated resource will be created + with default data only. + properties: + name: + description: Name specifies name of + the resource. + type: string + namespace: + description: Namespace specifies source + resource namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list + of source resource used to populate each + generated resource. + properties: + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source + resource namespace. + type: string + selector: + description: Selector is a label selector. + Label keys and values in `matchLabels`. + wildcard characters are not supported. + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource + declaration used to populate each generated + resource. At most one of Data or Clone + must be specified. If neither are provided, + the generated resource will be created + with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource + name. + type: string + namespace: + description: Namespace specifies resource + namespace. + type: string + synchronize: + description: Synchronize controls if generated + resources should be kept in-sync with + their source resource. If Synchronize + is set to "true" changes to generated + resources will be overwritten with resource + data from Data or the resource specified + in the Clone declaration. Optional. Defaults + to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name + of the field within 'path' that will + be used to uniquely identify an image. + Note - this field MUST be unique. + type: string + name: + description: Name is the entry the image + will be available under 'images.' + in the context. If this field is not + defined, image entries will appear + under 'images.custom'. + type: string + path: + description: Path is the path to the + object containing the image field + in a custom resource. It should be + slash-separated. Each slash-separated + key must be a valid YAML key or a + wildcard '*'. Wildcard keys are expanded + in case of arrays or objects. + type: string + value: + description: Value is an optional name + of the field within 'path' that points + to the image URI. This is useful when + a custom 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping + from kinds to ImageExtractorConfigs. This + config is only valid for verifyImages rules. + type: object + match: + description: MatchResources defines when this + policy rule should be applied. The match criteria + can include resource information (e.g. kind, + name, namespace, labels) and admission review + request information like the user name or + role. At least one kind is required. + properties: + all: + description: All allows specifying resources + which will be ANDed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources + which will be ORed + items: + description: ResourceFilter allow users + to "AND" or "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list + of cluster-wide role names for the + user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being + created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map + of annotations (key-value pairs + of type string). Annotation + keys and values support the + wildcard characters "*" (matches + zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of + resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name + of the resource. The name supports + wildcard characters "*" (matches + zero or many characters) and + "?" (at least one character). + NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names + of the resources. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector + is a label selector for the + resource namespace. Label keys + and values in `matchLabels` + support the wildcard characters + `*` (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors + like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] + matches any key and value but + does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list + of namespaces names. Each name + supports wildcard characters + "*" (matches zero or many characters) + and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label + selector. Label keys and values + in `matchLabels` support the + wildcard characters `*` (matches + zero or many characters) and + `?` (matches one character). + Wildcards allows writing label + selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : + "*"] matches any key and value + but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions + is a list of label selector + requirements. The requirements + are ANDed. + items: + description: A label selector + requirement is a selector + that contains values, + a key, and an operator + that relates the key and + values. + properties: + key: + description: key is + the label key that + the selector applies + to. + type: string + operator: + description: operator + represents a key's + relationship to a + set of values. Valid + operators are In, + NotIn, Exists and + DoesNotExist. + type: string + values: + description: values + is an array of string + values. If the operator + is In or NotIn, the + values array must + be non-empty. If the + operator is Exists + or DoesNotExist, the + values array must + be empty. This array + is replaced during + a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is + a map of {key,value} pairs. + A single {key,value} in + the matchLabels map is equivalent + to an element of matchExpressions, + whose key field is "key", + the operator is "In", and + the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of + namespaced role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list + of subject names like users, user + groups, and service accounts. + items: + description: Subject contains a + reference to the object or user + identities a role binding applies + to. This can either hold a direct + API object reference, or a value + for non-objects such as user and + group names. + properties: + apiGroup: + description: APIGroup holds + the API group of the referenced + subject. Defaults to "" for + ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object + being referenced. Values defined + by this API group are "User", + "Group", and "ServiceAccount". + If the Authorizer does not + recognized the kind value, + the Authorizer should report + an error. + type: string + name: + description: Name of the object + being referenced. + type: string + namespace: + description: Namespace of the + referenced object. If the + object kind is non-namespace, + such as "User" or "Group", + and this value is not empty + the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of + cluster-wide role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains + information about the resource being created + or modified. Requires at least one tag + to be specified when under MatchResources. + Specifying ResourceDescription directly + under match is being deprecated. Please + specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of + annotations (key-value pairs of type + string). Annotation keys and values + support the wildcard characters "*" + (matches zero or many characters) + and "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource + kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the + resource. The name supports wildcard + characters "*" (matches zero or many + characters) and "?" (at least one + character). NOTE: "Name" is being + deprecated in favor of "Names".' + type: string + names: + description: Names are the names of + the resources. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a + label selector for the resource namespace. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character).Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of + namespaces names. Each name supports + wildcard characters "*" (matches zero + or many characters) and "?" (at least + one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` + support the wildcard characters `*` + (matches zero or many characters) + and `?` (matches one character). Wildcards + allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that + using ["*" : "*"] matches any key + and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is + a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector + requirement is a selector that + contains values, a key, and + an operator that relates the + key and values. + properties: + key: + description: key is the label + key that the selector applies + to. + type: string + operator: + description: operator represents + a key's relationship to + a set of values. Valid operators + are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an + array of string values. + If the operator is In or + NotIn, the values array + must be non-empty. If the + operator is Exists or DoesNotExist, + the values array must be + empty. This array is replaced + during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map + of {key,value} pairs. A single + {key,value} in the matchLabels + map is equivalent to an element + of matchExpressions, whose key + field is "key", the operator is + "In", and the values array contains + only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced + role names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject + names like users, user groups, and service + accounts. + items: + description: Subject contains a reference + to the object or user identities a role + binding applies to. This can either + hold a direct API object reference, + or a value for non-objects such as user + and group names. + properties: + apiGroup: + description: APIGroup holds the API + group of the referenced subject. + Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being + referenced. Values defined by this + API group are "User", "Group", and + "ServiceAccount". If the Authorizer + does not recognized the kind value, + the Authorizer should report an + error. + type: string + name: + description: Name of the object being + referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this + value is not empty the Authorizer + should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + mutate: + description: Mutation is used to modify matching + resources. + properties: + foreach: + description: ForEach applies mutation rules + to a list of sub-elements by creating + a context for each entry in the list and + looping over it to apply the specified + logic. + items: + description: ForEach applies mutation + rules to a list of sub-elements by creating + a context for each entry in the list + and looping over it to apply the specified + logic. + properties: + context: + description: Context defines variables + and data sources that can be used + during rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or + a APILookup must be provided. + properties: + apiCall: + description: APICall defines + an HTTP request to the Kubernetes + API server. The JSON data + retrieved is stored in the + context. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + JSON response returned + from the API server. For + example a JMESPath of + "items | length(@)" applied + to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total + count of deployments across + all namespaces. + type: string + urlPath: + description: URLPath is + the URL path to be used + in the HTTP GET request + to the Kubernetes API + server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is + the same format used by + the `kubectl get --raw` + command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the + ConfigMap reference. + properties: + name: + description: Name is the + ConfigMap name. + type: string + namespace: + description: Namespace is + the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker + V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference + is image reference to + a container image in the + registry. Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines + an arbitrary JMESPath context + variable that can be defined + inline. + properties: + default: + description: Default is + an optional arbitrary + JSON object that the variable + may take if the JMESPath + expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is + an optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any + arbitrary JSON object + representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath + expression that results in one or + more elements to which the validation + logic is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is + a strategic merge patch used to + modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a + list of RFC 6902 JSON Patch declarations + used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are + used to determine if a policy rule + should be applied by evaluating + a set of conditions. The declaration + can contain nested `any` or `all` + statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, all + of the conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, at + least one of the conditions + need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic + merge patch used to modify resources. + See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of + RFC 6902 JSON Patch declarations used + to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target + resources to be mutated. + items: + properties: + apiVersion: + description: APIVersion specifies + resource apiVersion. + type: string + kind: + description: Kind specifies resource + kind. + type: string + name: + description: Name specifies the resource + name. + type: string + namespace: + description: Namespace specifies resource + namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the + rule, It must be unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. A direct + list of conditions (without `any` or `all` + statements is supported for backwards compatibility + but will be deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/preconditions/' + x-kubernetes-preserve-unknown-fields: true + validate: + description: Validation is used to validate + matching resources. + properties: + anyPattern: + description: AnyPattern specifies list of + validation patterns. At least one of the + patterns must be satisfied for the validation + rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used + to pass or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can + be declared under an `any` or `all` + statement. A direct list of conditions + (without `any` or `all` statements) + is also supported for backwards compatibility + but will be deprecated in the next + major release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + foreach: + description: ForEach applies validate rules + to a list of sub-elements by creating + a context for each entry in the list and + looping over it to apply the specified + logic. + items: + description: ForEach applies validate + rules to a list of sub-elements by creating + a context for each entry in the list + and looping over it to apply the specified + logic. + properties: + anyPattern: + description: AnyPattern specifies + list of validation patterns. At + least one of the patterns must be + satisfied for the validation rule + to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables + and data sources that can be used + during rule execution. + items: + description: ContextEntry adds variables + and data sources to a rule Context. + Either a ConfigMap reference or + a APILookup must be provided. + properties: + apiCall: + description: APICall defines + an HTTP request to the Kubernetes + API server. The JSON data + retrieved is stored in the + context. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + JSON response returned + from the API server. For + example a JMESPath of + "items | length(@)" applied + to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total + count of deployments across + all namespaces. + type: string + urlPath: + description: URLPath is + the URL path to be used + in the HTTP GET request + to the Kubernetes API + server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). + The format required is + the same format used by + the `kubectl get --raw` + command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the + ConfigMap reference. + properties: + name: + description: Name is the + ConfigMap name. + type: string + namespace: + description: Namespace is + the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines + requests to an OCI/Docker + V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is + an optional JSON Match + Expression that can be + used to transform the + ImageData struct returned + as a result of processing + the image reference. + type: string + reference: + description: 'Reference + is image reference to + a container image in the + registry. Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable + name. + type: string + variable: + description: Variable defines + an arbitrary JMESPath context + variable that can be defined + inline. + properties: + default: + description: Default is + an optional arbitrary + JSON object that the variable + may take if the JMESPath + expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is + an optional JMESPath Expression + that can be used to transform + the variable. + type: string + value: + description: Value is any + arbitrary JSON object + representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions + used to pass or fail a validation + rule. + properties: + conditions: + description: 'Multiple conditions + can be declared under an `any` + or `all` statement. A direct + list of conditions (without + `any` or `all` statements) is + also supported for backwards + compatibility but will be deprecated + in the next major release. See: + https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies + whether to use the current list + element as the scope for validation. + Defaults to "true" if not specified. + When set to "false", "request.object" + is used as the validation scope + within the foreach block to allow + referencing other elements in the + subtree. + type: boolean + list: + description: List specifies a JMESPath + expression that results in one or + more elements to which the validation + logic is applied. + type: string + pattern: + description: Pattern specifies an + overlay-style pattern used to check + resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are + used to determine if a policy rule + should be applied by evaluating + a set of conditions. The declaration + can contain nested `any` or `all` + statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, all + of the conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable + variable-based conditional rule + execution. This is useful for + finer control of when an rule + is applied. A condition can + reference object data using + JMESPath notation. Here, at + least one of the conditions + need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is the + context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is + the conditional operation + to perform. Valid operators + are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the + conditional value, or + set of values. The values + can be fixed set or can + be variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions + for manifest verification + properties: + annotationDomain: + description: AnnotationDomain is custom + domain of annotation for message and + signature. Default is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the + required attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the + required number of entries that + must match. If the count is + null, all entries must match + (a logical AND). If the count + is 1, at least one entry must + match (a logical OR). If the + count contains a value N, then + N must be less than or equal + to the size of entries, and + at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains + the available attestors. An + attestor can be a static key, + attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations + are used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. + The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is + a nested AttestorSet used + to specify a more complex + set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more + certificates + properties: + cert: + description: Certificate + is an optional PEM + encoded public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM + encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is + a set of attribute used + to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer + is the certificate + issuer used for keyless + signing. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked and + a root certificate + chain is expected + instead. If an empty + object is provided + the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is + an optional set of + PEM encoded trusted + root certificates. + If not provided, the + system roots are used. + type: string + subject: + description: Subject + is the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is + a set of X.509 public + keys used to verify + image signatures. + The keys can be directly + specified or can be + a variable reference + to a key specified + in a ConfigMap (see + https://kyverno.io/docs/writing-policies/variables/). + When multiple keys + are specified each + key is processed as + a separate staticKey + entry (.attestors[*].entries.keys) + within the set of + attestors and the + count is applied across + the keys. + type: string + rekor: + description: Rekor provides + configuration for + the Rekor transparency + log service. If the + value is nil, Rekor + is not checked. If + an empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository + is an optional alternate + OCI repository to use + for signatures and attestations + that match this rule. + If specified Repository + will override other OCI + image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored + while comparing manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional + alternate OCI repository to use for + resource bundle reference. The repository + can be overridden per Attestor or + Attestation. + type: string + type: object + message: + description: Message specifies a custom + message to be displayed on failure. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions + for Kubernetes Pod Security admission + by specifying exclusions for Pod Security + Standards controls. + properties: + exclude: + description: Exclude specifies the Pod + Security Standard controls to be excluded. + items: + description: PodSecurityStandard specifies + the Pod Security Standard controls + to be excluded. + properties: + controlName: + description: 'ControlName specifies + the name of the Pod Security + Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching + containers and applies the container + level PSS. Each image is the + image name consisting of the + registry address, repository, + image, and tag. Empty list matches + no containers, PSS checks are + applied at the pod level only. + Wildcards (''*'' and ''?'') + are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security + Standard level to be applied to workloads. + Allowed values are privileged, baseline, + and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod + Security Standard versions that Kubernetes + supports. Allowed values are v1.19, + v1.20, v1.21, v1.22, v1.23, v1.24, + v1.25, latest. Defaults to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify + image signatures and mutate them to add a + digest + items: + description: ImageVerification validates that + images that match the specified pattern + are signed with the supplied public key. + Once the image is verified it is mutated + to include the SHA digest retrieved during + the registration. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are + certificate-extensions used for keyless + signing. Deprecated. + type: object + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. Deprecated. + Use annotations per Attestor instead. + type: object + attestations: + description: Attestations are optional + checks for signed in-toto Statements + used to verify the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations + from the OCI registry and decodes them + into a list of Statement declarations. + items: + description: Attestation are checks + for signed in-toto Statements that + are used to verify the image. See + https://github.com/in-toto/attestation. + Kyverno fetches signed attestations + from the OCI registry and decodes + them into a list of Statements. + properties: + attestors: + description: Attestors specify the + required attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies + the required number of entries + that must match. If the + count is null, all entries + must match (a logical AND). + If the count is 1, at least + one entry must match (a + logical OR). If the count + contains a value N, then + N must be less than or equal + to the size of entries, + and at least N entries must + match. + minimum: 1 + type: integer + entries: + description: Entries contains + the available attestors. + An attestor can be a static + key, attributes for keyless + verification, or a nested + attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations + are used for image + verification. Every + specified key-value + pair must exist and + match in the verified + payload. The payload + may contain other + key-value pairs. + type: object + attestor: + description: Attestor + is a nested AttestorSet + used to specify a + more complex set of + match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more + certificates + properties: + cert: + description: Certificate + is an optional + PEM encoded public + certificate. + type: string + certChain: + description: CertificateChain + is an optional + PEM encoded set + of certificates + used to verify + type: string + rekor: + description: Rekor + provides configuration + for the Rekor + transparency log + service. If the + value is nil, + Rekor is not checked. + If an empty object + is provided the + public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless + is a set of attribute + used to verify a Sigstore + keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless + signing. + type: object + issuer: + description: Issuer + is the certificate + issuer used for + keyless signing. + type: string + rekor: + description: Rekor + provides configuration + for the Rekor + transparency log + service. If the + value is nil, + Rekor is not checked + and a root certificate + chain is expected + instead. If an + empty object is + provided the public + instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots + is an optional + set of PEM encoded + trusted root certificates. + If not provided, + the system roots + are used. + type: string + subject: + description: Subject + is the verified + identity used + for keyless signing, + for example the + email address + type: string + type: object + keys: + description: Keys specifies + one or more public + keys + properties: + publicKeys: + description: Keys + is a set of X.509 + public keys used + to verify image + signatures. The + keys can be directly + specified or can + be a variable + reference to a + key specified + in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple + keys are specified + each key is processed + as a separate + staticKey entry + (.attestors[*].entries.keys) + within the set + of attestors and + the count is applied + across the keys. + type: string + rekor: + description: Rekor + provides configuration + for the Rekor + transparency log + service. If the + value is nil, + Rekor is not checked. + If an empty object + is provided the + public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL + is the address + of the transparency + log. Defaults + to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository + is an optional alternate + OCI repository to + use for signatures + and attestations that + match this rule. If + specified Repository + will override other + OCI image repository + locations for this + Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used + to verify attributes within a + Predicate. If no Conditions are + specified the attestation check + is satisfied as long there are + predicates that match the predicate + type. + items: + description: AnyAllConditions + consists of conditions wrapped + denoting a logical criteria + to be fulfilled. AnyConditions + get fulfilled when at least + one of its sub-conditions passes. + AllConditions get fulfilled + only when all of its sub-conditions + pass. + properties: + all: + description: AllConditions + enable variable-based conditional + rule execution. This is + useful for finer control + of when an rule is applied. + A condition can reference + object data using JMESPath + notation. Here, all of the + conditions need to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is + the context entry + (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator + is the conditional + operation to perform. + Valid operators are: + Equals, NotEquals, + In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, + DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is + the conditional value, + or set of values. + The values can be + fixed set or can be + variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions + enable variable-based conditional + rule execution. This is + useful for finer control + of when an rule is applied. + A condition can reference + object data using JMESPath + notation. Here, at least + one of the conditions need + to pass + items: + description: Condition defines + variable-based conditional + criteria for rule execution. + properties: + key: + description: Key is + the context entry + (using JMESPath) for + conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator + is the conditional + operation to perform. + Valid operators are: + Equals, NotEquals, + In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, + LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, + DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is + the conditional value, + or set of values. + The values can be + fixed set or can be + variables declared + using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines + the type of Predicate contained + within the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the + required number of entries that + must match. If the count is null, + all entries must match (a logical + AND). If the count is 1, at least + one entry must match (a logical + OR). If the count contains a value + N, then N must be less than or + equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the + available attestors. An attestor + can be a static key, attributes + for keyless verification, or a + nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are + used for image verification. + Every specified key-value + pair must exist and match + in the verified payload. + The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is a + nested AttestorSet used + to specify a more complex + set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates + specifies one or more certificates + properties: + cert: + description: Certificate + is an optional PEM encoded + public certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates + used to verify + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not + checked. If an empty + object is provided the + public instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a + set of attribute used to + verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is + the certificate issuer + used for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not + checked and a root certificate + chain is expected instead. + If an empty object is + provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is + an optional set of PEM + encoded trusted root + certificates. If not + provided, the system + roots are used. + type: string + subject: + description: Subject is + the verified identity + used for keyless signing, + for example the email + address + type: string + type: object + keys: + description: Keys specifies + one or more public keys + properties: + publicKeys: + description: Keys is a + set of X.509 public + keys used to verify + image signatures. The + keys can be directly + specified or can be + a variable reference + to a key specified in + a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are + specified each key is + processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors + and the count is applied + across the keys. + type: string + rekor: + description: Rekor provides + configuration for the + Rekor transparency log + service. If the value + is nil, Rekor is not + checked. If an empty + object is provided the + public instance of Rekor + (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is + the address of the + transparency log. + Defaults to the + public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is + an optional alternate OCI + repository to use for signatures + and attestations that match + this rule. If specified + Repository will override + other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + image: + description: 'Image is the image name + consisting of the registry address, + repository, image, and tag. Wildcards + (''*'' and ''?'') are allowed. See: + https://kubernetes.io/docs/concepts/containers/images. + Deprecated. Use ImageReferences instead.' + type: string + imageReferences: + description: 'ImageReferences is a list + of matching image reference patterns. + At least one pattern in the list must + match the image for the rule to apply. + Each image reference consists of a registry + address (defaults to docker.io), repository, + image, and tag (defaults to latest). + Wildcards (''*'' and ''?'') are allowed. + See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + issuer: + description: Issuer is the certificate + issuer used for keyless signing. Deprecated. + Use KeylessAttestor instead. + type: string + key: + description: Key is the PEM encoded public + key that the image or attestation is + signed with. Deprecated. Use StaticKeyAttestor + instead. + type: string + mutateDigest: + default: true + description: MutateDigest enables replacement + of image tags with digests. Defaults + to true. + type: boolean + repository: + description: Repository is an optional + alternate OCI repository to use for + image signatures and attestations that + match this rule. If specified Repository + will override the default OCI image + repository configured for the installation. + The repository can also be overridden + per Attestor or Attestation. + type: string + required: + default: true + description: Required validates that images + are verified i.e. have matched passed + a signature or attestation check. + type: boolean + roots: + description: Roots is the PEM encoded + Root certificate chain used for keyless + signing Deprecated. Use KeylessAttestor + instead. + type: string + subject: + description: Subject is the identity used + for keyless signing, for example an + email address Deprecated. Use KeylessAttestor + instead. + type: string + verifyDigest: + default: true + description: VerifyDigest validates that + images have a digest. + type: boolean + type: object + type: array + type: object + type: array + type: object + conditions: + description: Conditions is a list of conditions that apply + to the policy + items: + description: "Condition contains details for one aspect + of the current state of this API Resource. --- This + struct is intended for direct use as an array at the + field path .status.conditions. For example, \n type + FooStatus struct{ // Represents the observations of + a foo's current state. // Known .status.conditions.type + are: \"Available\", \"Progressing\", and \"Degraded\" + // +patchMergeKey=type // +patchStrategy=merge // + +listType=map // +listMapKey=type Conditions []metav1.Condition + `json:\"conditions,omitempty\" patchStrategy:\"merge\" + patchMergeKey:\"type\" protobuf:\"bytes,1,rep,name=conditions\"` + \n // other fields }" + properties: + lastTransitionTime: + description: lastTransitionTime is the last time + the condition transitioned from one status to + another. This should be when the underlying condition + changed. If that is not known, then using the + time when the API field changed is acceptable. + format: date-time + type: string + message: + description: message is a human readable message + indicating details about the transition. This + may be an empty string. + maxLength: 32768 + type: string + observedGeneration: + description: observedGeneration represents the .metadata.generation + that the condition was set based upon. For instance, + if .metadata.generation is currently 12, but the + .status.conditions[x].observedGeneration is 9, + the condition is out of date with respect to the + current state of the instance. + format: int64 + minimum: 0 + type: integer + reason: + description: reason contains a programmatic identifier + indicating the reason for the condition's last + transition. Producers of specific condition types + may define expected values and meanings for this + field, and whether the values are considered a + guaranteed API. The value should be a CamelCase + string. This field may not be empty. + maxLength: 1024 + minLength: 1 + pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$ + type: string + status: + description: status of the condition, one of True, + False, Unknown. + enum: + - "True" + - "False" + - Unknown + type: string + type: + description: type of condition in CamelCase or in + foo.example.com/CamelCase. --- Many .condition.type + values are consistent across resources like Available, + but because arbitrary conditions can be useful + (see .node.status.conditions), the ability to + deconflict is important. The regex it matches + is (dns1123SubdomainFmt/)?(qualifiedNameFmt) + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ + type: string + required: + - lastTransitionTime + - message + - reason + - status + - type + type: object + type: array + ready: + description: Ready indicates if the policy is ready to + serve the admission request. Deprecated in favor of + Conditions + type: boolean + required: + - ready + type: object + required: + - spec + type: object + served: true + storage: false + subresources: + status: {} + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests24 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: apiextensions.k8s.io/v1 + kind: CustomResourceDefinition + metadata: + annotations: + config.kubernetes.io/index: "9" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "9" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: policyreports.wgpolicyk8s.io + spec: + group: wgpolicyk8s.io + names: + kind: PolicyReport + listKind: PolicyReportList + plural: policyreports + shortNames: + - polr + singular: policyreport + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .scope.kind + name: Kind + priority: 1 + type: string + - jsonPath: .scope.name + name: Name + priority: 1 + type: string + - jsonPath: .summary.pass + name: Pass + type: integer + - jsonPath: .summary.fail + name: Fail + type: integer + - jsonPath: .summary.warn + name: Warn + type: integer + - jsonPath: .summary.error + name: Error + type: integer + - jsonPath: .summary.skip + name: Skip + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + name: v1alpha2 + schema: + openAPIV3Schema: + description: PolicyReport is the Schema for the policyreports + API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this + representation of an object. Servers should convert recognized + schemas to the latest internal value, and may reject unrecognized + values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST + resource this object represents. Servers may infer this + from the endpoint the client submits requests to. Cannot + be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + results: + description: PolicyReportResult provides result details + items: + description: PolicyReportResult provides the result for + an individual policy + properties: + category: + description: Category indicates policy category + type: string + message: + description: Description is a short user friendly message + for the policy rule + type: string + policy: + description: Policy is the name or identifier of the + policy + type: string + properties: + additionalProperties: + type: string + description: Properties provides additional information + for the policy rule + type: object + resourceSelector: + description: SubjectSelector is an optional label selector + for checked Kubernetes resources. For example, a policy + result may apply to all pods that match a label. Either + a Subject or a SubjectSelector can be specified. If + neither are provided, the result is assumed to be + for the policy report scope. + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are ANDed. + items: + description: A label selector requirement is a + selector that contains values, a key, and an + operator that relates the key and values. + properties: + key: + description: key is the label key that the + selector applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. If the + operator is Exists or DoesNotExist, the + values array must be empty. This array is + replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", + and the values array contains only "value". The + requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + resources: + description: Subjects is an optional reference to the + checked Kubernetes resources + items: + description: "ObjectReference contains enough information + to let you inspect or modify the referred object. + --- New uses of this type are discouraged because + of difficulty describing its usage when embedded + in APIs. 1. Ignored fields. It includes many fields + which are not generally honored. For instance, + ResourceVersion and FieldPath are both very rarely + valid in actual usage. 2. Invalid usage help. It + is impossible to add specific help for individual + usage. In most embedded usages, there are particular + restrictions like, \"must refer only to types A + and B\" or \"UID not honored\" or \"name must be + restricted\". Those cannot be well described when + embedded. 3. Inconsistent validation. Because the + usages are different, the validation rules are different + by usage, which makes it hard for users to predict + what will happen. 4. The fields are both imprecise + and overly precise. Kind is not a precise mapping + to a URL. This can produce ambiguity during interpretation + and require a REST mapping. In most cases, the + dependency is on the group,resource tuple and the + version of the actual struct is irrelevant. 5. We + cannot easily change it. Because this type is embedded + in many locations, updates to this type will affect + numerous schemas. Don't make new APIs embed an + underspecified API type they do not control. \n + Instead of using this type, create a locally provided + and used type that is well-focused on your reference. + For example, ServiceReferences for admission registration: + https://github.com/kubernetes/api/blob/release-1.17/admissionregistration/v1/types.go#L533 + ." + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an object + instead of an entire object, this string should + contain a valid JSON/Go field access statement, + such as desiredState.manifest.containers[2]. + For example, if the object reference is to a + container within a pod, this would take on a + value like: "spec.containers{name}" (where "name" + refers to the name of the container that triggered + the event) or if no container name is specified + "spec.containers[2]" (container with index 2 + in this pod). This syntax is chosen only to + have some well-defined way of referencing a + part of an object. TODO: this design is not + final and this field is subject to change in + the future.' + type: string + kind: + description: 'Kind of the referent. More info: + https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: + https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More + info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to which + this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: + https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + type: array + result: + description: Result indicates the outcome of the policy + rule execution + enum: + - pass + - fail + - warn + - error + - skip + type: string + rule: + description: Rule is the name or identifier of the rule + within the policy + type: string + scored: + description: Scored indicates if this result is scored + type: boolean + severity: + description: Severity indicates policy check result + criticality + enum: + - critical + - high + - low + - medium + - info + type: string + source: + description: Source is an identifier for the policy + engine that manages this report + type: string + timestamp: + description: Timestamp indicates the time the result + was found + properties: + nanos: + description: Non-negative fractions of a second + at nanosecond resolution. Negative second values + with fractions must still have non-negative nanos + values that count forward in time. Must be from + 0 to 999,999,999 inclusive. This field may be + limited in precision depending on context. + format: int32 + type: integer + seconds: + description: Represents seconds of UTC time since + Unix epoch 1970-01-01T00:00:00Z. Must be from + 0001-01-01T00:00:00Z to 9999-12-31T23:59:59Z inclusive. + format: int64 + type: integer + required: + - nanos + - seconds + type: object + required: + - policy + type: object + type: array + scope: + description: Scope is an optional reference to the report + scope (e.g. a Deployment, Namespace, or Node) + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an object instead + of an entire object, this string should contain a valid + JSON/Go field access statement, such as desiredState.manifest.containers[2]. + For example, if the object reference is to a container + within a pod, this would take on a value like: "spec.containers{name}" + (where "name" refers to the name of the container that + triggered the event) or if no container name is specified + "spec.containers[2]" (container with index 2 in this + pod). This syntax is chosen only to have some well-defined + way of referencing a part of an object. TODO: this design + is not final and this field is subject to change in + the future.' + type: string + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to which this reference + is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + scopeSelector: + description: ScopeSelector is an optional selector for multiple + scopes (e.g. Pods). Either one of, or none of, but not both + of, Scope or ScopeSelector should be specified. + properties: + matchExpressions: + description: matchExpressions is a list of label selector + requirements. The requirements are ANDed. + items: + description: A label selector requirement is a selector + that contains values, a key, and an operator that + relates the key and values. + properties: + key: + description: key is the label key that the selector + applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an array of string values. + If the operator is In or NotIn, the values array + must be non-empty. If the operator is Exists or + DoesNotExist, the values array must be empty. + This array is replaced during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} pairs. + A single {key,value} in the matchLabels map is equivalent + to an element of matchExpressions, whose key field is + "key", the operator is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + summary: + description: PolicyReportSummary provides a summary of results + properties: + error: + description: Error provides the count of policies that + could not be evaluated + type: integer + fail: + description: Fail provides the count of policies whose + requirements were not met + type: integer + pass: + description: Pass provides the count of policies whose + requirements were met + type: integer + skip: + description: Skip indicates the count of policies that + were not selected for evaluation + type: integer + warn: + description: Warn provides the count of non-scored policies + whose requirements were not met + type: integer + type: object + type: object + served: true + storage: true + subresources: {} + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests25 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: apiextensions.k8s.io/v1 + kind: CustomResourceDefinition + metadata: + annotations: + config.kubernetes.io/index: "10" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "10" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: updaterequests.kyverno.io + spec: + group: kyverno.io + names: + categories: + - kyverno + kind: UpdateRequest + listKind: UpdateRequestList + plural: updaterequests + shortNames: + - ur + singular: updaterequest + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .spec.policy + name: Policy + type: string + - jsonPath: .spec.requestType + name: RuleType + type: string + - jsonPath: .spec.resource.kind + name: ResourceKind + type: string + - jsonPath: .spec.resource.name + name: ResourceName + type: string + - jsonPath: .spec.resource.namespace + name: ResourceNamespace + type: string + - jsonPath: .status.state + name: status + type: string + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + name: v1beta1 + schema: + openAPIV3Schema: + description: UpdateRequest is a request to process mutate and + generate rules in background. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this + representation of an object. Servers should convert recognized + schemas to the latest internal value, and may reject unrecognized + values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST + resource this object represents. Servers may infer this + from the endpoint the client submits requests to. Cannot + be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: Spec is the information to identify the update + request. + properties: + context: + description: Context ... + properties: + admissionRequestInfo: + description: AdmissionRequestInfoObject stores the + admission request and operation details + properties: + admissionRequest: + description: AdmissionRequest describes the admission.Attributes + for the admission request. + properties: + dryRun: + description: DryRun indicates that modifications + will definitely not be persisted for this + request. Defaults to false. + type: boolean + kind: + description: Kind is the fully-qualified type + of object being submitted (for example, + v1.Pod or autoscaling.v1.Scale) + properties: + group: + type: string + kind: + type: string + version: + type: string + required: + - group + - kind + - version + type: object + name: + description: Name is the name of the object + as presented in the request. On a CREATE + operation, the client may omit name and + rely on the server to generate the name. If + that is the case, this field will contain + an empty string. + type: string + namespace: + description: Namespace is the namespace associated + with the request (if any). + type: string + object: + description: Object is the object from the + incoming request. + type: object + x-kubernetes-preserve-unknown-fields: true + oldObject: + description: OldObject is the existing object. + Only populated for DELETE and UPDATE requests. + type: object + x-kubernetes-preserve-unknown-fields: true + operation: + description: Operation is the operation being + performed. This may be different than the + operation requested. e.g. a patch can result + in either a CREATE or UPDATE Operation. + type: string + options: + description: Options is the operation option + structure of the operation being performed. + e.g. `meta.k8s.io/v1.DeleteOptions` or `meta.k8s.io/v1.CreateOptions`. + This may be different than the options the + caller provided. e.g. for a patch request + the performed Operation might be a CREATE, + in which case the Options will a `meta.k8s.io/v1.CreateOptions` + even though the caller provided `meta.k8s.io/v1.PatchOptions`. + type: object + x-kubernetes-preserve-unknown-fields: true + requestKind: + description: "RequestKind is the fully-qualified + type of the original API request (for example, + v1.Pod or autoscaling.v1.Scale). If this + is specified and differs from the value + in \"kind\", an equivalent match and conversion + was performed. \n For example, if deployments + can be modified via apps/v1 and apps/v1beta1, + and a webhook registered a rule of `apiGroups:[\"apps\"], + apiVersions:[\"v1\"], resources: [\"deployments\"]` + and `matchPolicy: Equivalent`, an API request + to apps/v1beta1 deployments would be converted + and sent to the webhook with `kind: {group:\"apps\", + version:\"v1\", kind:\"Deployment\"}` (matching + the rule the webhook registered for), and + `requestKind: {group:\"apps\", version:\"v1beta1\", + kind:\"Deployment\"}` (indicating the kind + of the original API request). \n See documentation + for the \"matchPolicy\" field in the webhook + configuration type for more details." + properties: + group: + type: string + kind: + type: string + version: + type: string + required: + - group + - kind + - version + type: object + requestResource: + description: "RequestResource is the fully-qualified + resource of the original API request (for + example, v1.pods). If this is specified + and differs from the value in \"resource\", + an equivalent match and conversion was performed. + \n For example, if deployments can be modified + via apps/v1 and apps/v1beta1, and a webhook + registered a rule of `apiGroups:[\"apps\"], + apiVersions:[\"v1\"], resources: [\"deployments\"]` + and `matchPolicy: Equivalent`, an API request + to apps/v1beta1 deployments would be converted + and sent to the webhook with `resource: + {group:\"apps\", version:\"v1\", resource:\"deployments\"}` + (matching the resource the webhook registered + for), and `requestResource: {group:\"apps\", + version:\"v1beta1\", resource:\"deployments\"}` + (indicating the resource of the original + API request). \n See documentation for the + \"matchPolicy\" field in the webhook configuration + type." + properties: + group: + type: string + resource: + type: string + version: + type: string + required: + - group + - resource + - version + type: object + requestSubResource: + description: RequestSubResource is the name + of the subresource of the original API request, + if any (for example, "status" or "scale") + If this is specified and differs from the + value in "subResource", an equivalent match + and conversion was performed. See documentation + for the "matchPolicy" field in the webhook + configuration type. + type: string + resource: + description: Resource is the fully-qualified + resource being requested (for example, v1.pods) + properties: + group: + type: string + resource: + type: string + version: + type: string + required: + - group + - resource + - version + type: object + subResource: + description: SubResource is the subresource + being requested, if any (for example, "status" + or "scale") + type: string + uid: + description: UID is an identifier for the + individual request/response. It allows us + to distinguish instances of requests which + are otherwise identical (parallel requests, + requests when earlier requests did not modify + etc) The UID is meant to track the round + trip (request/response) between the KAS + and the WebHook, not the user request. It + is suitable for correlating log entries + between the webhook and apiserver, for either + auditing or debugging. + type: string + userInfo: + description: UserInfo is information about + the requesting user + properties: + extra: + additionalProperties: + description: ExtraValue masks the value + so protobuf can generate + items: + type: string + type: array + description: Any additional information + provided by the authenticator. + type: object + groups: + description: The names of groups this + user is a part of. + items: + type: string + type: array + uid: + description: A unique value that identifies + this user across time. If this user + is deleted and another user by the same + name is added, they will have different + UIDs. + type: string + username: + description: The name that uniquely identifies + this user among all active users. + type: string + type: object + required: + - kind + - operation + - resource + - uid + - userInfo + type: object + operation: + description: Operation is the type of resource + operation being checked for admission control + type: string + type: object + userInfo: + description: RequestInfo contains permission info + carried in an admission request. + properties: + clusterRoles: + description: ClusterRoles is a list of possible + clusterRoles send the request. + items: + type: string + nullable: true + type: array + roles: + description: Roles is a list of possible role + send the request. + items: + type: string + nullable: true + type: array + userInfo: + description: UserInfo is the userInfo carried + in the admission request. + properties: + extra: + additionalProperties: + description: ExtraValue masks the value + so protobuf can generate + items: + type: string + type: array + description: Any additional information provided + by the authenticator. + type: object + groups: + description: The names of groups this user + is a part of. + items: + type: string + type: array + uid: + description: A unique value that identifies + this user across time. If this user is deleted + and another user by the same name is added, + they will have different UIDs. + type: string + username: + description: The name that uniquely identifies + this user among all active users. + type: string + type: object + type: object + type: object + policy: + description: Specifies the name of the policy. + type: string + requestType: + description: Type represents request type for background + processing + enum: + - mutate + - generate + type: string + resource: + description: ResourceSpec is the information to identify + the update request. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + required: + - context + - policy + - resource + type: object + status: + description: Status contains statistics related to update + request. + properties: + generatedResources: + description: This will track the resources that are updated + by the generate Policy. Will be used during clean up + resources. + items: + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + type: array + handler: + description: Handler represents the instance ID that handles + the UR + type: string + message: + description: Specifies request status message. + type: string + state: + description: State represents state of the update request. + type: string + required: + - state + type: object + type: object + served: true + storage: true + subresources: + status: {} + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests26 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: apps/v1 + kind: Deployment + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno + namespace: kyverno + spec: + replicas: 1 + selector: + matchLabels: + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + strategy: + rollingUpdate: + maxSurge: 1 + maxUnavailable: 40% + type: RollingUpdate + template: + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + spec: + affinity: + podAntiAffinity: + preferredDuringSchedulingIgnoredDuringExecution: + - podAffinityTerm: + labelSelector: + matchExpressions: + - key: app.kubernetes.io/name + operator: In + values: + - kyverno + topologyKey: kubernetes.io/hostname + weight: 1 + containers: + - args: + - --autogenInternals=true + - --loggingFormat=text + env: + - name: INIT_CONFIG + value: kyverno + - name: METRICS_CONFIG + value: kyverno-metrics + - name: KYVERNO_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: KYVERNO_POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + - name: KYVERNO_SERVICEACCOUNT_NAME + value: kyverno + - name: KYVERNO_SVC + value: kyverno-svc + - name: TUF_ROOT + value: /.sigstore + - name: KYVERNO_DEPLOYMENT + value: kyverno + image: ghcr.io/kyverno/kyverno:v1.8.5 + imagePullPolicy: IfNotPresent + livenessProbe: + failureThreshold: 2 + httpGet: + path: /health/liveness + port: 9443 + scheme: HTTPS + initialDelaySeconds: 15 + periodSeconds: 30 + successThreshold: 1 + timeoutSeconds: 5 + name: kyverno + ports: + - containerPort: 9443 + name: https + protocol: TCP + - containerPort: 8000 + name: metrics-port + protocol: TCP + readinessProbe: + failureThreshold: 6 + httpGet: + path: /health/readiness + port: 9443 + scheme: HTTPS + initialDelaySeconds: 5 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 5 + resources: + limits: + memory: 384Mi + requests: + cpu: 100m + memory: 128Mi + securityContext: + allowPrivilegeEscalation: false + capabilities: + drop: + - ALL + privileged: false + readOnlyRootFilesystem: true + runAsNonRoot: true + seccompProfile: + type: RuntimeDefault + startupProbe: + failureThreshold: 20 + httpGet: + path: /health/liveness + port: 9443 + scheme: HTTPS + initialDelaySeconds: 2 + periodSeconds: 6 + volumeMounts: + - mountPath: /.sigstore + name: sigstore + dnsPolicy: ClusterFirst + initContainers: + - args: + - --loggingFormat=text + env: + - name: METRICS_CONFIG + value: kyverno-metrics + - name: KYVERNO_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: KYVERNO_POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + - name: KYVERNO_DEPLOYMENT + value: kyverno + image: ghcr.io/kyverno/kyvernopre:v1.8.5 + imagePullPolicy: IfNotPresent + name: kyverno-pre + resources: + limits: + cpu: 100m + memory: 256Mi + requests: + cpu: 10m + memory: 64Mi + securityContext: + allowPrivilegeEscalation: false + capabilities: + drop: + - ALL + privileged: false + readOnlyRootFilesystem: true + runAsNonRoot: true + seccompProfile: + type: RuntimeDefault + serviceAccountName: kyverno + volumes: + - emptyDir: {} + name: sigstore + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests27 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: v1 + kind: Namespace + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests28 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: rbac.authorization.k8s.io/v1 + kind: Role + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:leaderelection + namespace: kyverno + rules: + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - create + - delete + - get + - patch + - update + - apiGroups: + - apps + resources: + - deployments + verbs: + - get + - list + - patch + - update + - watch + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests29 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: rbac.authorization.k8s.io/v1 + kind: RoleBinding + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:leaderelection + namespace: kyverno + roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: kyverno:leaderelection + subjects: + - kind: ServiceAccount + name: kyverno + namespace: kyverno + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests30 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: v1 + kind: Service + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno-svc-metrics + namespace: kyverno + spec: + ports: + - name: metrics-port + port: 8000 + protocol: TCP + targetPort: 8000 + selector: + app: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + type: ClusterIP + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests31 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: v1 + kind: Service + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno-svc + namespace: kyverno + spec: + ports: + - name: https + port: 443 + protocol: TCP + targetPort: https + selector: + app: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + type: ClusterIP + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-install-kyverno-from-manifests32 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: v1 + kind: ServiceAccount + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno + namespace: kyverno + remediationAction: enforce + severity: low + remediationAction: enforce diff --git a/docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-kyverno-require-labels.yaml b/docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-kyverno-require-labels.yaml new file mode 100755 index 0000000..c143a46 --- /dev/null +++ b/docs/ocm/final-outputs/ocm-policies/Policy.c2p.policy-kyverno-require-labels.yaml @@ -0,0 +1,73 @@ +apiVersion: policy.open-cluster-management.io/v1 +kind: Policy +metadata: + annotations: + policy.open-cluster-management.io/categories: "" + policy.open-cluster-management.io/controls: cm-6 + policy.open-cluster-management.io/standards: "" + name: policy-kyverno-require-labels + namespace: c2p +spec: + disabled: false + policy-templates: + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-kyverno-require-labels + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: musthave + objectDefinition: + apiVersion: kyverno.io/v1 + kind: ClusterPolicy + metadata: + name: require-labels + spec: + rules: + - match: + resources: + kinds: + - Pod + name: check-for-labels + validate: + message: label `app.kubernetes.io/name` is required + pattern: + metadata: + labels: + app.kubernetes.io/name: ?* + validationFailureAction: audit + remediationAction: enforce + severity: low + - objectDefinition: + apiVersion: policy.open-cluster-management.io/v1 + kind: ConfigurationPolicy + metadata: + name: policy-kyverno-require-labels2 + spec: + namespaceSelector: + exclude: + - kube-system + - open-cluster-management + - open-cluster-management-agent + - open-cluster-management-agent-addon + include: + - '*' + object-templates: + - complianceType: mustnothave + objectDefinition: + apiVersion: wgpolicyk8s.io/v1alpha2 + kind: PolicyReport + results: + - policy: require-labels + result: fail + remediationAction: inform + severity: low diff --git a/docs/ocm/final-outputs/ocm-policies/PolicySet.c2p.managed-kubernetes.yaml b/docs/ocm/final-outputs/ocm-policies/PolicySet.c2p.managed-kubernetes.yaml new file mode 100755 index 0000000..c1ee97e --- /dev/null +++ b/docs/ocm/final-outputs/ocm-policies/PolicySet.c2p.managed-kubernetes.yaml @@ -0,0 +1,14 @@ +apiVersion: policy.open-cluster-management.io/v1beta1 +kind: PolicySet +metadata: + annotations: + compliance-to-policy.component-title: Managed Kubernetes + name: managed-kubernetes + namespace: c2p +spec: + description: "" + policies: + - policy-deployment + - policy-high-scan + - policy-install-kyverno-from-manifests + - policy-kyverno-require-labels diff --git a/docs/oscal-vs-ocm-status-mapping.csv b/docs/ocm/oscal-ar-vs-ocm-status-mapping.csv similarity index 100% rename from docs/oscal-vs-ocm-status-mapping.csv rename to docs/ocm/oscal-ar-vs-ocm-status-mapping.csv diff --git a/docs/ocm/oscal/component-definition.csv b/docs/ocm/oscal/component-definition.csv new file mode 100644 index 0000000..8d0045f --- /dev/null +++ b/docs/ocm/oscal/component-definition.csv @@ -0,0 +1,6 @@ +$$Component_Title,$$Component_Description,$$Component_Type,$$Control_Id_List,$$Rule_Id,$$Rule_Description,$Policy_Id,$Parameter_Id,$Parameter_Description,$Parameter_Value_Alternatives,$Parameter_Value_Default,$$Profile_Source,$$Profile_Description,Rule_Actual_State_Data_Request_Evidence_Format_Reference_URL_list,Rule_Actual_State_TimeToLive,$Check_Id,$Check_Description,Fetcher_id,Fetcher_Description,Fix_id,Fix_Description,Rule_implementation_status,Rule_POAM_Reference_URL,$$Namespace +A human readable name for the component.,A description of the component including information about its function.,A category describing the purpose of the component. ALLOWED VALUES interconnection:software:hardware:service:physical:process-procedure:plan:guidance:standard:validation:,A list of textual labels that uniquely identify the controls or statements that the component implements.,A textual label that uniquely identifies a policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the policy (desired state) including information about its purpose and scope.,Directory Name to identify Policy Resoure,A textual label that uniquely identifies the parameter associated with that policy (desired state) or controls implemented by the policy (desired state).,A description of the parameter including the purpose and use of the parameter.,ONLY for the policy (desired state) parameters: A value or set of values the parameter can take. The catalog parameters values are defined in the catalog. ,"A value recommended by Compliance Team in this profile for the parameter of the control or policy (desired state). If a CIS-benchmark exists, the default default could be the CIS-benchmark recommanded value.",A URL reference to the source catalog or profile for which this component is implementing controls for. A profile designates a selection and configuration of controls from one or more catalogs,A description of the profile.,A list of URL references that contain the Actual State Data Model (eg schema or swager API or procedure template or terraform schema). Needed by the fetcher developer. ,A TimeToLive value of the duration of time the actual state is valid before it becomes stale or obsolite or overriden. Needed by the fetcher developer. ,A textual label that uniquely identifies a check of the policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the check of the policy (desired state) including the method (interview or examine or test) and procedure details.,A textual label that uniquely identifies a collector of the actual state (evidence) associated with the policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the collector of the actual state (evidence) associated with the policy (desired state) including the method (interview or examine or API) and questionaire or API details.,A textual label that uniquely identifies the fix of the failed policy.,A description of the fix to remediate the failed policy.,Indicates the degree to which the a given policy is implemented. ALLOWED VALUES: IMPLEMENTED: The control is fully implemented. PARTIAL: The control is partially implemented. PLANNED: There is a plan for implementing the control as explained in the remarks. ALTERNATIVE: There is an alternative implementation for this control as explained in the remarks. NOT-APPLICABLE: This control does not apply to this system as justified in the remarks.,A URL reference to the Plan of Action and Milestones this component may be subjected to for remediation or deviation or mitigation in case of the policy (desired state) non compliance or error or failure. ,"A namespace qualifying the property's name. This allows different organizations to associate distinct semantics with the same name. Used in conjunction with ""class"" as the ontology concept. " +Managed Kubernetes,Managed Kubernetes cluster,Service,cm-6,test_configuration_check,Ensure deployment configuration is securely set up,policy-high-scan,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,test_configuration_check,,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud +Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2,test_proxy_check,Ensure Nginx is properly configured,policy-deployment,minimum_nginx_deployment_replicas,Minimum number of NGINX pod,3,3,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,test_proxy_check,,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud +Managed Kubernetes,Managed Kubernetes cluster,Service,cm-6,install_kyverno,Install Kyverno,policy-install-kyverno-from-manifests,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-install-kyverno-from-manifests,,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud +Managed Kubernetes,Managed Kubernetes cluster,Service,cm-6,test_required_label,"By Kyverno, ensure required labels are set",policy-kyverno-require-labels,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-kyverno-require-labels,,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud \ No newline at end of file diff --git a/docs/ocm/oscal/component-definition.json b/docs/ocm/oscal/component-definition.json new file mode 100644 index 0000000..f40b04c --- /dev/null +++ b/docs/ocm/oscal/component-definition.json @@ -0,0 +1,201 @@ +{ + "component-definition": { + "uuid": "f0373e90-c75b-4400-bfb9-50056cd89a1a", + "metadata": { + "title": "OCM", + "last-modified": "2023-07-11T23:04:11+00:00", + "version": "20210826", + "oscal-version": "1.0.4" + }, + "components": [ + { + "uuid": "5bfee926-9a73-40ef-9c93-30bc53986976", + "type": "Service", + "title": "Managed Kubernetes", + "description": "Managed Kubernetes cluster", + "props": [ + { + "name": "Rule_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "test_configuration_check", + "class": "scc_class", + "remarks": "rule_set_0" + }, + { + "name": "Rule_Description", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "Ensure deployment configuration is securely set up", + "class": "scc_class", + "remarks": "rule_set_0" + }, + { + "name": "Check_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "test_configuration_check", + "remarks": "rule_set_0" + }, + { + "name": "Policy_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "policy-high-scan", + "remarks": "rule_set_0" + }, + { + "name": "Rule_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "test_proxy_check", + "class": "scc_class", + "remarks": "rule_set_1" + }, + { + "name": "Rule_Description", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "Ensure Nginx is properly configured", + "class": "scc_class", + "remarks": "rule_set_1" + }, + { + "name": "Parameter_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "minimum_nginx_deployment_replicas", + "class": "scc_class", + "remarks": "rule_set_1" + }, + { + "name": "Parameter_Description", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "Minimum number of NGINX pod", + "class": "scc_class", + "remarks": "rule_set_1" + }, + { + "name": "Parameter_Value_Alternatives", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "3", + "class": "scc_class", + "remarks": "rule_set_1" + }, + { + "name": "Check_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "test_proxy_check", + "remarks": "rule_set_1" + }, + { + "name": "Policy_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "policy-deployment", + "remarks": "rule_set_1" + }, + { + "name": "Rule_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "install_kyverno", + "class": "scc_class", + "remarks": "rule_set_2" + }, + { + "name": "Rule_Description", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "Install Kyverno", + "class": "scc_class", + "remarks": "rule_set_2" + }, + { + "name": "Check_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "policy-install-kyverno-from-manifests", + "remarks": "rule_set_2" + }, + { + "name": "Policy_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "policy-install-kyverno-from-manifests", + "remarks": "rule_set_2" + }, + { + "name": "Rule_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "test_required_label", + "class": "scc_class", + "remarks": "rule_set_3" + }, + { + "name": "Rule_Description", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "By Kyverno, ensure required labels are set", + "class": "scc_class", + "remarks": "rule_set_3" + }, + { + "name": "Check_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "policy-kyverno-require-labels", + "remarks": "rule_set_3" + }, + { + "name": "Policy_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "policy-kyverno-require-labels", + "remarks": "rule_set_3" + } + ], + "control-implementations": [ + { + "uuid": "d872a255-e447-46c6-9164-1419f016c953", + "source": "https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json", + "description": "NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE", + "set-parameters": [ + { + "param-id": "minimum_nginx_deployment_replicas", + "values": [ + "3" + ] + } + ], + "implemented-requirements": [ + { + "uuid": "699e41bc-1f42-4893-abdc-7a77b42ac44c", + "control-id": "cm-6", + "description": "", + "props": [ + { + "name": "Rule_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "test_configuration_check", + "class": "scc_class" + }, + { + "name": "Rule_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "install_kyverno", + "class": "scc_class" + }, + { + "name": "Rule_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "test_required_label", + "class": "scc_class" + } + ] + }, + { + "uuid": "01de518e-4d49-4c88-8338-7c75826d7272", + "control-id": "cm-2", + "description": "", + "props": [ + { + "name": "Rule_Id", + "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud", + "value": "test_proxy_check", + "class": "scc_class" + } + ] + } + ] + } + ] + } + ] + } +} \ No newline at end of file diff --git a/docs/ocm/oscal/profile.json b/docs/ocm/oscal/profile.json new file mode 100644 index 0000000..ebac6c2 --- /dev/null +++ b/docs/ocm/oscal/profile.json @@ -0,0 +1,75 @@ +{ + "profile": { + "uuid": "beade175-48ad-47c0-ac38-e9c2514cba22", + "metadata": { + "title": "NIST Special Publication 800-53 Revision 5 Customized BASELINE", + "last-modified": "2021-06-08T13:57:33.585986-04:00", + "version": "Final", + "oscal-version": "1.0.0", + "roles": [ + { + "id": "creator", + "title": "Document Creator" + }, + { + "id": "contact", + "title": "Contact" + } + ], + "parties": [ + { + "uuid": "c748c806-1d77-4695-bb40-e117b2afa82e", + "type": "organization", + "name": "Joint Task Force, Transformation Initiative", + "email-addresses": [ + "sec-cert@nist.gov" + ], + "addresses": [ + { + "addr-lines": [ + "National Institute of Standards and Technology", + "Attn: Computer Security Division", + "Information Technology Laboratory", + "100 Bureau Drive (Mail Stop 8930)" + ], + "city": "Gaithersburg", + "state": "MD", + "postal-code": "20899-8930" + } + ] + } + ], + "responsible-parties": [ + { + "role-id": "creator", + "party-uuids": [ + "c748c806-1d77-4695-bb40-e117b2afa82e" + ] + }, + { + "role-id": "contact", + "party-uuids": [ + "c748c806-1d77-4695-bb40-e117b2afa82e" + ] + } + ] + }, + "imports": [ + { + "href": "./catalog.json", + "include-controls": [ + { + "with-ids": [ + "ac-6", + "cm-2", + "cm-6" + ] + } + ] + } + ], + "merge": { + "as-is": true + } + } +} \ No newline at end of file diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/kustomization.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/kustomization.yaml new file mode 100755 index 0000000..0573618 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/kustomization.yaml @@ -0,0 +1,2 @@ +generators: +- ./policy-generator.yaml diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-generator.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-generator.yaml new file mode 100755 index 0000000..6b557c2 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-generator.yaml @@ -0,0 +1,17 @@ +apiVersion: policy.open-cluster-management.io/v1 +kind: PolicyGenerator +metadata: + name: policy-generator +policyDefaults: + consolidateManifests: false + orderManifests: false + namespace: namespace +policies: + - consolidateManifests: false + orderManifests: false + name: policy-install-kyverno-from-manifests + manifests: + - remediationAction: enforce + severity: low + complianceType: musthave + path: ./policy-install-kyverno-from-manifests diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno.yaml new file mode 100755 index 0000000..b95c3a8 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno.yaml @@ -0,0 +1,18 @@ +aggregationRule: + clusterRoleSelectors: + - matchLabels: + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-generaterequest.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-generaterequest.yaml new file mode 100755 index 0000000..c7a24df --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-generaterequest.yaml @@ -0,0 +1,27 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + rbac.authorization.k8s.io/aggregate-to-admin: "true" + name: kyverno:admin-generaterequest +rules: +- apiGroups: + - kyverno.io + resources: + - generaterequests + verbs: + - create + - delete + - get + - list + - patch + - update + - watch diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-policies.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-policies.yaml new file mode 100755 index 0000000..6536359 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-policies.yaml @@ -0,0 +1,28 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + rbac.authorization.k8s.io/aggregate-to-admin: "true" + name: kyverno:admin-policies +rules: +- apiGroups: + - kyverno.io + resources: + - policies + - clusterpolicies + verbs: + - create + - delete + - get + - list + - patch + - update + - watch diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-policyreport.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-policyreport.yaml new file mode 100755 index 0000000..83d5566 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-policyreport.yaml @@ -0,0 +1,28 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + rbac.authorization.k8s.io/aggregate-to-admin: "true" + name: kyverno:admin-policyreport +rules: +- apiGroups: + - wgpolicyk8s.io + resources: + - policyreports + - clusterpolicyreports + verbs: + - create + - delete + - get + - list + - patch + - update + - watch diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-reports.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-reports.yaml new file mode 100755 index 0000000..e6a17c6 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-reports.yaml @@ -0,0 +1,30 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + rbac.authorization.k8s.io/aggregate-to-admin: "true" + name: kyverno:admin-reports +rules: +- apiGroups: + - kyverno.io + resources: + - admissionreports + - clusteradmissionreports + - backgroundscanreports + - clusterbackgroundscanreports + verbs: + - create + - delete + - get + - list + - patch + - update + - watch diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-updaterequest.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-updaterequest.yaml new file mode 100755 index 0000000..135f9b9 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:admin-updaterequest.yaml @@ -0,0 +1,27 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + rbac.authorization.k8s.io/aggregate-to-admin: "true" + name: kyverno:admin-updaterequest +rules: +- apiGroups: + - kyverno.io + resources: + - updaterequests + verbs: + - create + - delete + - get + - list + - patch + - update + - watch diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:events.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:events.yaml new file mode 100755 index 0000000..96d19f7 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:events.yaml @@ -0,0 +1,23 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:events +rules: +- apiGroups: + - '*' + resources: + - events + verbs: + - create + - update + - patch + - delete diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:generate.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:generate.yaml new file mode 100755 index 0000000..ccf48f7 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:generate.yaml @@ -0,0 +1,48 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:generate +rules: +- apiGroups: + - networking.k8s.io + resources: + - ingresses + - ingressclasses + - networkpolicies + verbs: + - create + - update + - patch + - delete +- apiGroups: + - "" + resources: + - namespaces + - configmaps + - secrets + - resourcequotas + - limitranges + verbs: + - create + - update + - patch + - delete +- apiGroups: + - rbac.authorization.k8s.io + resources: + - rolebindings + - roles + verbs: + - create + - update + - patch + - delete diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:policies.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:policies.yaml new file mode 100755 index 0000000..20477d1 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:policies.yaml @@ -0,0 +1,54 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:policies +rules: +- apiGroups: + - kyverno.io + resources: + - policies + - policies/status + - clusterpolicies + - clusterpolicies/status + - generaterequests + - generaterequests/status + - updaterequests + - updaterequests/status + - admissionreports + - clusteradmissionreports + - backgroundscanreports + - clusterbackgroundscanreports + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + - deletecollection +- apiGroups: + - wgpolicyk8s.io + resources: + - policyreports + - policyreports/status + - clusterpolicyreports + - clusterpolicyreports/status + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + - deletecollection diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:userinfo.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:userinfo.yaml new file mode 100755 index 0000000..e62b08b --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:userinfo.yaml @@ -0,0 +1,24 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:userinfo +rules: +- apiGroups: + - rbac.authorization.k8s.io + resources: + - roles + - clusterroles + - rolebindings + - clusterrolebindings + verbs: + - watch + - list diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:view.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:view.yaml new file mode 100755 index 0000000..06c8cd9 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:view.yaml @@ -0,0 +1,22 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:view +rules: +- apiGroups: + - '*' + resources: + - '*' + verbs: + - get + - list + - watch diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:webhook.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:webhook.yaml new file mode 100755 index 0000000..bdb5b0b --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRole.kyverno:webhook.yaml @@ -0,0 +1,27 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:webhook +rules: +- apiGroups: + - admissionregistration.k8s.io + resources: + - mutatingwebhookconfigurations + - validatingwebhookconfigurations + verbs: + - create + - delete + - get + - list + - patch + - update + - watch diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRoleBinding.kyverno.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRoleBinding.kyverno.yaml new file mode 100755 index 0000000..b1709e7 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ClusterRoleBinding.kyverno.yaml @@ -0,0 +1,21 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: kyverno +subjects: +- kind: ServiceAccount + name: kyverno + namespace: kyverno diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ConfigMap.kyverno-metrics.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ConfigMap.kyverno-metrics.yaml new file mode 100755 index 0000000..8d489d6 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ConfigMap.kyverno-metrics.yaml @@ -0,0 +1,16 @@ +apiVersion: v1 +data: + namespaces: '{"exclude":[],"include":[]}' +kind: ConfigMap +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno-metrics + namespace: kyverno diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ConfigMap.kyverno.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ConfigMap.kyverno.yaml new file mode 100755 index 0000000..38cf2b6 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ConfigMap.kyverno.yaml @@ -0,0 +1,17 @@ +apiVersion: v1 +data: + resourceFilters: '[*,kyverno,*][Event,*,*][*,kube-system,*][*,kube-public,*][*,kube-node-lease,*][Node,*,*][APIService,*,*][TokenReview,*,*][SubjectAccessReview,*,*][SelfSubjectAccessReview,*,*][Binding,*,*][ReplicaSet,*,*][AdmissionReport,*,*][ClusterAdmissionReport,*,*][BackgroundScanReport,*,*][ClusterBackgroundScanReport,*,*][ClusterRole,*,kyverno:*][ClusterRoleBinding,*,kyverno:*][ServiceAccount,kyverno,kyverno][ConfigMap,kyverno,kyverno][ConfigMap,kyverno,kyverno-metrics][Deployment,kyverno,kyverno][Job,kyverno,kyverno-hook-pre-delete][NetworkPolicy,kyverno,kyverno][PodDisruptionBudget,kyverno,kyverno][Role,kyverno,kyverno:*][RoleBinding,kyverno,kyverno:*][Secret,kyverno,kyverno-svc.kyverno.svc.*][Service,kyverno,kyverno-svc][Service,kyverno,kyverno-svc-metrics][ServiceMonitor,kyverno,kyverno-svc-service-monitor][Pod,kyverno,kyverno-test]' + webhooks: '[{"namespaceSelector": {"matchExpressions": [{"key":"kubernetes.io/metadata.name","operator":"NotIn","values":["kyverno"]}]}}]' +kind: ConfigMap +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno + namespace: kyverno diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.admissionreports.kyverno.io.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.admissionreports.kyverno.io.yaml new file mode 100755 index 0000000..f380fc5 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.admissionreports.kyverno.io.yaml @@ -0,0 +1,348 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + config.kubernetes.io/index: "1" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "1" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: admissionreports.kyverno.io +spec: + group: kyverno.io + names: + categories: + - kyverno + kind: AdmissionReport + listKind: AdmissionReportList + plural: admissionreports + shortNames: + - admr + singular: admissionreport + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .metadata.ownerReferences[0].apiVersion + name: ApiVersion + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].kind + name: Kind + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].name + name: Subject + priority: 1 + type: string + - jsonPath: .spec.summary.pass + name: Pass + type: integer + - jsonPath: .spec.summary.fail + name: Fail + type: integer + - jsonPath: .spec.summary.warn + name: Warn + type: integer + - jsonPath: .spec.summary.error + name: Error + type: integer + - jsonPath: .spec.summary.skip + name: Skip + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + - jsonPath: .metadata.labels['audit\.kyverno\.io/resource\.hash'] + name: Hash + priority: 1 + type: string + - jsonPath: .metadata.labels['audit\.kyverno\.io/report\.aggregate'] + name: AGGREGATE + priority: 1 + type: string + name: v1alpha2 + schema: + openAPIV3Schema: + description: AdmissionReport is the Schema for the AdmissionReports API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + properties: + owner: + description: Owner is a reference to the report owner (e.g. a Deployment, + Namespace, or Node) + properties: + apiVersion: + description: API version of the referent. + type: string + blockOwnerDeletion: + description: If true, AND if the owner has the "foregroundDeletion" + finalizer, then the owner cannot be deleted from the key-value + store until this reference is removed. See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion + for how the garbage collector interacts with this field and + enforces the foreground deletion. Defaults to false. To set + this field, a user needs "delete" permission of the owner, otherwise + 422 (Unprocessable Entity) will be returned. + type: boolean + controller: + description: If true, this reference points to the managing controller. + type: boolean + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#names' + type: string + uid: + description: 'UID of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#uids' + type: string + required: + - apiVersion + - kind + - name + - uid + type: object + x-kubernetes-map-type: atomic + results: + description: PolicyReportResult provides result details + items: + description: PolicyReportResult provides the result for an individual + policy + properties: + category: + description: Category indicates policy category + type: string + message: + description: Description is a short user friendly message for + the policy rule + type: string + policy: + description: Policy is the name or identifier of the policy + type: string + properties: + additionalProperties: + type: string + description: Properties provides additional information for + the policy rule + type: object + resourceSelector: + description: SubjectSelector is an optional label selector for + checked Kubernetes resources. For example, a policy result + may apply to all pods that match a label. Either a Subject + or a SubjectSelector can be specified. If neither are provided, + the result is assumed to be for the policy report scope. + properties: + matchExpressions: + description: matchExpressions is a list of label selector + requirements. The requirements are ANDed. + items: + description: A label selector requirement is a selector + that contains values, a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key that the selector + applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an array of string values. + If the operator is In or NotIn, the values array + must be non-empty. If the operator is Exists or + DoesNotExist, the values array must be empty. This + array is replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} pairs. + A single {key,value} in the matchLabels map is equivalent + to an element of matchExpressions, whose key field is + "key", the operator is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + resources: + description: Subjects is an optional reference to the checked + Kubernetes resources + items: + description: "ObjectReference contains enough information + to let you inspect or modify the referred object. --- New + uses of this type are discouraged because of difficulty + describing its usage when embedded in APIs. 1. Ignored fields. + \ It includes many fields which are not generally honored. + \ For instance, ResourceVersion and FieldPath are both very + rarely valid in actual usage. 2. Invalid usage help. It + is impossible to add specific help for individual usage. + \ In most embedded usages, there are particular restrictions + like, \"must refer only to types A and B\" or \"UID not + honored\" or \"name must be restricted\". Those cannot be + well described when embedded. 3. Inconsistent validation. + \ Because the usages are different, the validation rules + are different by usage, which makes it hard for users to + predict what will happen. 4. The fields are both imprecise + and overly precise. Kind is not a precise mapping to a + URL. This can produce ambiguity during interpretation and + require a REST mapping. In most cases, the dependency is + on the group,resource tuple and the version of the actual + struct is irrelevant. 5. We cannot easily change it. Because + this type is embedded in many locations, updates to this + type will affect numerous schemas. Don't make new APIs + embed an underspecified API type they do not control. \n + Instead of using this type, create a locally provided and + used type that is well-focused on your reference. For example, + ServiceReferences for admission registration: https://github.com/kubernetes/api/blob/release-1.17/admissionregistration/v1/types.go#L533 + ." + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an object instead + of an entire object, this string should contain a valid + JSON/Go field access statement, such as desiredState.manifest.containers[2]. + For example, if the object reference is to a container + within a pod, this would take on a value like: "spec.containers{name}" + (where "name" refers to the name of the container that + triggered the event) or if no container name is specified + "spec.containers[2]" (container with index 2 in this + pod). This syntax is chosen only to have some well-defined + way of referencing a part of an object. TODO: this design + is not final and this field is subject to change in + the future.' + type: string + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to which this reference + is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + type: array + result: + description: Result indicates the outcome of the policy rule + execution + enum: + - pass + - fail + - warn + - error + - skip + type: string + rule: + description: Rule is the name or identifier of the rule within + the policy + type: string + scored: + description: Scored indicates if this result is scored + type: boolean + severity: + description: Severity indicates policy check result criticality + enum: + - critical + - high + - low + - medium + - info + type: string + source: + description: Source is an identifier for the policy engine that + manages this report + type: string + timestamp: + description: Timestamp indicates the time the result was found + properties: + nanos: + description: Non-negative fractions of a second at nanosecond + resolution. Negative second values with fractions must + still have non-negative nanos values that count forward + in time. Must be from 0 to 999,999,999 inclusive. This + field may be limited in precision depending on context. + format: int32 + type: integer + seconds: + description: Represents seconds of UTC time since Unix epoch + 1970-01-01T00:00:00Z. Must be from 0001-01-01T00:00:00Z + to 9999-12-31T23:59:59Z inclusive. + format: int64 + type: integer + required: + - nanos + - seconds + type: object + required: + - policy + type: object + type: array + summary: + description: PolicyReportSummary provides a summary of results + properties: + error: + description: Error provides the count of policies that could not + be evaluated + type: integer + fail: + description: Fail provides the count of policies whose requirements + were not met + type: integer + pass: + description: Pass provides the count of policies whose requirements + were met + type: integer + skip: + description: Skip indicates the count of policies that were not + selected for evaluation + type: integer + warn: + description: Warn provides the count of non-scored policies whose + requirements were not met + type: integer + type: object + required: + - owner + type: object + required: + - spec + type: object + served: true + storage: true + subresources: {} diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.backgroundscanreports.kyverno.io.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.backgroundscanreports.kyverno.io.yaml new file mode 100755 index 0000000..cbb13b2 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.backgroundscanreports.kyverno.io.yaml @@ -0,0 +1,308 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + config.kubernetes.io/index: "2" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "2" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: backgroundscanreports.kyverno.io +spec: + group: kyverno.io + names: + categories: + - kyverno + kind: BackgroundScanReport + listKind: BackgroundScanReportList + plural: backgroundscanreports + shortNames: + - bgscanr + singular: backgroundscanreport + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .metadata.ownerReferences[0].apiVersion + name: ApiVersion + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].kind + name: Kind + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].name + name: Subject + priority: 1 + type: string + - jsonPath: .spec.summary.pass + name: Pass + type: integer + - jsonPath: .spec.summary.fail + name: Fail + type: integer + - jsonPath: .spec.summary.warn + name: Warn + type: integer + - jsonPath: .spec.summary.error + name: Error + type: integer + - jsonPath: .spec.summary.skip + name: Skip + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + - jsonPath: .metadata.labels['audit\.kyverno\.io/resource\.hash'] + name: Hash + priority: 1 + type: string + name: v1alpha2 + schema: + openAPIV3Schema: + description: BackgroundScanReport is the Schema for the BackgroundScanReports + API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + properties: + results: + description: PolicyReportResult provides result details + items: + description: PolicyReportResult provides the result for an individual + policy + properties: + category: + description: Category indicates policy category + type: string + message: + description: Description is a short user friendly message for + the policy rule + type: string + policy: + description: Policy is the name or identifier of the policy + type: string + properties: + additionalProperties: + type: string + description: Properties provides additional information for + the policy rule + type: object + resourceSelector: + description: SubjectSelector is an optional label selector for + checked Kubernetes resources. For example, a policy result + may apply to all pods that match a label. Either a Subject + or a SubjectSelector can be specified. If neither are provided, + the result is assumed to be for the policy report scope. + properties: + matchExpressions: + description: matchExpressions is a list of label selector + requirements. The requirements are ANDed. + items: + description: A label selector requirement is a selector + that contains values, a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key that the selector + applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an array of string values. + If the operator is In or NotIn, the values array + must be non-empty. If the operator is Exists or + DoesNotExist, the values array must be empty. This + array is replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} pairs. + A single {key,value} in the matchLabels map is equivalent + to an element of matchExpressions, whose key field is + "key", the operator is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + resources: + description: Subjects is an optional reference to the checked + Kubernetes resources + items: + description: "ObjectReference contains enough information + to let you inspect or modify the referred object. --- New + uses of this type are discouraged because of difficulty + describing its usage when embedded in APIs. 1. Ignored fields. + \ It includes many fields which are not generally honored. + \ For instance, ResourceVersion and FieldPath are both very + rarely valid in actual usage. 2. Invalid usage help. It + is impossible to add specific help for individual usage. + \ In most embedded usages, there are particular restrictions + like, \"must refer only to types A and B\" or \"UID not + honored\" or \"name must be restricted\". Those cannot be + well described when embedded. 3. Inconsistent validation. + \ Because the usages are different, the validation rules + are different by usage, which makes it hard for users to + predict what will happen. 4. The fields are both imprecise + and overly precise. Kind is not a precise mapping to a + URL. This can produce ambiguity during interpretation and + require a REST mapping. In most cases, the dependency is + on the group,resource tuple and the version of the actual + struct is irrelevant. 5. We cannot easily change it. Because + this type is embedded in many locations, updates to this + type will affect numerous schemas. Don't make new APIs + embed an underspecified API type they do not control. \n + Instead of using this type, create a locally provided and + used type that is well-focused on your reference. For example, + ServiceReferences for admission registration: https://github.com/kubernetes/api/blob/release-1.17/admissionregistration/v1/types.go#L533 + ." + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an object instead + of an entire object, this string should contain a valid + JSON/Go field access statement, such as desiredState.manifest.containers[2]. + For example, if the object reference is to a container + within a pod, this would take on a value like: "spec.containers{name}" + (where "name" refers to the name of the container that + triggered the event) or if no container name is specified + "spec.containers[2]" (container with index 2 in this + pod). This syntax is chosen only to have some well-defined + way of referencing a part of an object. TODO: this design + is not final and this field is subject to change in + the future.' + type: string + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to which this reference + is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + type: array + result: + description: Result indicates the outcome of the policy rule + execution + enum: + - pass + - fail + - warn + - error + - skip + type: string + rule: + description: Rule is the name or identifier of the rule within + the policy + type: string + scored: + description: Scored indicates if this result is scored + type: boolean + severity: + description: Severity indicates policy check result criticality + enum: + - critical + - high + - low + - medium + - info + type: string + source: + description: Source is an identifier for the policy engine that + manages this report + type: string + timestamp: + description: Timestamp indicates the time the result was found + properties: + nanos: + description: Non-negative fractions of a second at nanosecond + resolution. Negative second values with fractions must + still have non-negative nanos values that count forward + in time. Must be from 0 to 999,999,999 inclusive. This + field may be limited in precision depending on context. + format: int32 + type: integer + seconds: + description: Represents seconds of UTC time since Unix epoch + 1970-01-01T00:00:00Z. Must be from 0001-01-01T00:00:00Z + to 9999-12-31T23:59:59Z inclusive. + format: int64 + type: integer + required: + - nanos + - seconds + type: object + required: + - policy + type: object + type: array + summary: + description: PolicyReportSummary provides a summary of results + properties: + error: + description: Error provides the count of policies that could not + be evaluated + type: integer + fail: + description: Fail provides the count of policies whose requirements + were not met + type: integer + pass: + description: Pass provides the count of policies whose requirements + were met + type: integer + skip: + description: Skip indicates the count of policies that were not + selected for evaluation + type: integer + warn: + description: Warn provides the count of non-scored policies whose + requirements were not met + type: integer + type: object + type: object + required: + - spec + type: object + served: true + storage: true + subresources: {} diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusteradmissionreports.kyverno.io.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusteradmissionreports.kyverno.io.yaml new file mode 100755 index 0000000..361f52e --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusteradmissionreports.kyverno.io.yaml @@ -0,0 +1,349 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + config.kubernetes.io/index: "3" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "3" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: clusteradmissionreports.kyverno.io +spec: + group: kyverno.io + names: + categories: + - kyverno + kind: ClusterAdmissionReport + listKind: ClusterAdmissionReportList + plural: clusteradmissionreports + shortNames: + - cadmr + singular: clusteradmissionreport + scope: Cluster + versions: + - additionalPrinterColumns: + - jsonPath: .metadata.ownerReferences[0].apiVersion + name: ApiVersion + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].kind + name: Kind + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].name + name: Subject + priority: 1 + type: string + - jsonPath: .spec.summary.pass + name: Pass + type: integer + - jsonPath: .spec.summary.fail + name: Fail + type: integer + - jsonPath: .spec.summary.warn + name: Warn + type: integer + - jsonPath: .spec.summary.error + name: Error + type: integer + - jsonPath: .spec.summary.skip + name: Skip + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + - jsonPath: .metadata.labels['audit\.kyverno\.io/resource\.hash'] + name: Hash + priority: 1 + type: string + - jsonPath: .metadata.labels['audit\.kyverno\.io/report\.aggregate'] + name: AGGREGATE + priority: 1 + type: string + name: v1alpha2 + schema: + openAPIV3Schema: + description: ClusterAdmissionReport is the Schema for the ClusterAdmissionReports + API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + properties: + owner: + description: Owner is a reference to the report owner (e.g. a Deployment, + Namespace, or Node) + properties: + apiVersion: + description: API version of the referent. + type: string + blockOwnerDeletion: + description: If true, AND if the owner has the "foregroundDeletion" + finalizer, then the owner cannot be deleted from the key-value + store until this reference is removed. See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion + for how the garbage collector interacts with this field and + enforces the foreground deletion. Defaults to false. To set + this field, a user needs "delete" permission of the owner, otherwise + 422 (Unprocessable Entity) will be returned. + type: boolean + controller: + description: If true, this reference points to the managing controller. + type: boolean + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#names' + type: string + uid: + description: 'UID of the referent. More info: http://kubernetes.io/docs/user-guide/identifiers#uids' + type: string + required: + - apiVersion + - kind + - name + - uid + type: object + x-kubernetes-map-type: atomic + results: + description: PolicyReportResult provides result details + items: + description: PolicyReportResult provides the result for an individual + policy + properties: + category: + description: Category indicates policy category + type: string + message: + description: Description is a short user friendly message for + the policy rule + type: string + policy: + description: Policy is the name or identifier of the policy + type: string + properties: + additionalProperties: + type: string + description: Properties provides additional information for + the policy rule + type: object + resourceSelector: + description: SubjectSelector is an optional label selector for + checked Kubernetes resources. For example, a policy result + may apply to all pods that match a label. Either a Subject + or a SubjectSelector can be specified. If neither are provided, + the result is assumed to be for the policy report scope. + properties: + matchExpressions: + description: matchExpressions is a list of label selector + requirements. The requirements are ANDed. + items: + description: A label selector requirement is a selector + that contains values, a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key that the selector + applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an array of string values. + If the operator is In or NotIn, the values array + must be non-empty. If the operator is Exists or + DoesNotExist, the values array must be empty. This + array is replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} pairs. + A single {key,value} in the matchLabels map is equivalent + to an element of matchExpressions, whose key field is + "key", the operator is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + resources: + description: Subjects is an optional reference to the checked + Kubernetes resources + items: + description: "ObjectReference contains enough information + to let you inspect or modify the referred object. --- New + uses of this type are discouraged because of difficulty + describing its usage when embedded in APIs. 1. Ignored fields. + \ It includes many fields which are not generally honored. + \ For instance, ResourceVersion and FieldPath are both very + rarely valid in actual usage. 2. Invalid usage help. It + is impossible to add specific help for individual usage. + \ In most embedded usages, there are particular restrictions + like, \"must refer only to types A and B\" or \"UID not + honored\" or \"name must be restricted\". Those cannot be + well described when embedded. 3. Inconsistent validation. + \ Because the usages are different, the validation rules + are different by usage, which makes it hard for users to + predict what will happen. 4. The fields are both imprecise + and overly precise. Kind is not a precise mapping to a + URL. This can produce ambiguity during interpretation and + require a REST mapping. In most cases, the dependency is + on the group,resource tuple and the version of the actual + struct is irrelevant. 5. We cannot easily change it. Because + this type is embedded in many locations, updates to this + type will affect numerous schemas. Don't make new APIs + embed an underspecified API type they do not control. \n + Instead of using this type, create a locally provided and + used type that is well-focused on your reference. For example, + ServiceReferences for admission registration: https://github.com/kubernetes/api/blob/release-1.17/admissionregistration/v1/types.go#L533 + ." + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an object instead + of an entire object, this string should contain a valid + JSON/Go field access statement, such as desiredState.manifest.containers[2]. + For example, if the object reference is to a container + within a pod, this would take on a value like: "spec.containers{name}" + (where "name" refers to the name of the container that + triggered the event) or if no container name is specified + "spec.containers[2]" (container with index 2 in this + pod). This syntax is chosen only to have some well-defined + way of referencing a part of an object. TODO: this design + is not final and this field is subject to change in + the future.' + type: string + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to which this reference + is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + type: array + result: + description: Result indicates the outcome of the policy rule + execution + enum: + - pass + - fail + - warn + - error + - skip + type: string + rule: + description: Rule is the name or identifier of the rule within + the policy + type: string + scored: + description: Scored indicates if this result is scored + type: boolean + severity: + description: Severity indicates policy check result criticality + enum: + - critical + - high + - low + - medium + - info + type: string + source: + description: Source is an identifier for the policy engine that + manages this report + type: string + timestamp: + description: Timestamp indicates the time the result was found + properties: + nanos: + description: Non-negative fractions of a second at nanosecond + resolution. Negative second values with fractions must + still have non-negative nanos values that count forward + in time. Must be from 0 to 999,999,999 inclusive. This + field may be limited in precision depending on context. + format: int32 + type: integer + seconds: + description: Represents seconds of UTC time since Unix epoch + 1970-01-01T00:00:00Z. Must be from 0001-01-01T00:00:00Z + to 9999-12-31T23:59:59Z inclusive. + format: int64 + type: integer + required: + - nanos + - seconds + type: object + required: + - policy + type: object + type: array + summary: + description: PolicyReportSummary provides a summary of results + properties: + error: + description: Error provides the count of policies that could not + be evaluated + type: integer + fail: + description: Fail provides the count of policies whose requirements + were not met + type: integer + pass: + description: Pass provides the count of policies whose requirements + were met + type: integer + skip: + description: Skip indicates the count of policies that were not + selected for evaluation + type: integer + warn: + description: Warn provides the count of non-scored policies whose + requirements were not met + type: integer + type: object + required: + - owner + type: object + required: + - spec + type: object + served: true + storage: true + subresources: {} diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusterbackgroundscanreports.kyverno.io.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusterbackgroundscanreports.kyverno.io.yaml new file mode 100755 index 0000000..8e24698 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusterbackgroundscanreports.kyverno.io.yaml @@ -0,0 +1,308 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + config.kubernetes.io/index: "4" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "4" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: clusterbackgroundscanreports.kyverno.io +spec: + group: kyverno.io + names: + categories: + - kyverno + kind: ClusterBackgroundScanReport + listKind: ClusterBackgroundScanReportList + plural: clusterbackgroundscanreports + shortNames: + - cbgscanr + singular: clusterbackgroundscanreport + scope: Cluster + versions: + - additionalPrinterColumns: + - jsonPath: .metadata.ownerReferences[0].apiVersion + name: ApiVersion + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].kind + name: Kind + priority: 1 + type: string + - jsonPath: .metadata.ownerReferences[0].name + name: Subject + priority: 1 + type: string + - jsonPath: .spec.summary.pass + name: Pass + type: integer + - jsonPath: .spec.summary.fail + name: Fail + type: integer + - jsonPath: .spec.summary.warn + name: Warn + type: integer + - jsonPath: .spec.summary.error + name: Error + type: integer + - jsonPath: .spec.summary.skip + name: Skip + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + - jsonPath: .metadata.labels['audit\.kyverno\.io/resource\.hash'] + name: Hash + priority: 1 + type: string + name: v1alpha2 + schema: + openAPIV3Schema: + description: ClusterBackgroundScanReport is the Schema for the ClusterBackgroundScanReports + API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + properties: + results: + description: PolicyReportResult provides result details + items: + description: PolicyReportResult provides the result for an individual + policy + properties: + category: + description: Category indicates policy category + type: string + message: + description: Description is a short user friendly message for + the policy rule + type: string + policy: + description: Policy is the name or identifier of the policy + type: string + properties: + additionalProperties: + type: string + description: Properties provides additional information for + the policy rule + type: object + resourceSelector: + description: SubjectSelector is an optional label selector for + checked Kubernetes resources. For example, a policy result + may apply to all pods that match a label. Either a Subject + or a SubjectSelector can be specified. If neither are provided, + the result is assumed to be for the policy report scope. + properties: + matchExpressions: + description: matchExpressions is a list of label selector + requirements. The requirements are ANDed. + items: + description: A label selector requirement is a selector + that contains values, a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key that the selector + applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are In, NotIn, + Exists and DoesNotExist. + type: string + values: + description: values is an array of string values. + If the operator is In or NotIn, the values array + must be non-empty. If the operator is Exists or + DoesNotExist, the values array must be empty. This + array is replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} pairs. + A single {key,value} in the matchLabels map is equivalent + to an element of matchExpressions, whose key field is + "key", the operator is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + resources: + description: Subjects is an optional reference to the checked + Kubernetes resources + items: + description: "ObjectReference contains enough information + to let you inspect or modify the referred object. --- New + uses of this type are discouraged because of difficulty + describing its usage when embedded in APIs. 1. Ignored fields. + \ It includes many fields which are not generally honored. + \ For instance, ResourceVersion and FieldPath are both very + rarely valid in actual usage. 2. Invalid usage help. It + is impossible to add specific help for individual usage. + \ In most embedded usages, there are particular restrictions + like, \"must refer only to types A and B\" or \"UID not + honored\" or \"name must be restricted\". Those cannot be + well described when embedded. 3. Inconsistent validation. + \ Because the usages are different, the validation rules + are different by usage, which makes it hard for users to + predict what will happen. 4. The fields are both imprecise + and overly precise. Kind is not a precise mapping to a + URL. This can produce ambiguity during interpretation and + require a REST mapping. In most cases, the dependency is + on the group,resource tuple and the version of the actual + struct is irrelevant. 5. We cannot easily change it. Because + this type is embedded in many locations, updates to this + type will affect numerous schemas. Don't make new APIs + embed an underspecified API type they do not control. \n + Instead of using this type, create a locally provided and + used type that is well-focused on your reference. For example, + ServiceReferences for admission registration: https://github.com/kubernetes/api/blob/release-1.17/admissionregistration/v1/types.go#L533 + ." + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an object instead + of an entire object, this string should contain a valid + JSON/Go field access statement, such as desiredState.manifest.containers[2]. + For example, if the object reference is to a container + within a pod, this would take on a value like: "spec.containers{name}" + (where "name" refers to the name of the container that + triggered the event) or if no container name is specified + "spec.containers[2]" (container with index 2 in this + pod). This syntax is chosen only to have some well-defined + way of referencing a part of an object. TODO: this design + is not final and this field is subject to change in + the future.' + type: string + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to which this reference + is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + type: array + result: + description: Result indicates the outcome of the policy rule + execution + enum: + - pass + - fail + - warn + - error + - skip + type: string + rule: + description: Rule is the name or identifier of the rule within + the policy + type: string + scored: + description: Scored indicates if this result is scored + type: boolean + severity: + description: Severity indicates policy check result criticality + enum: + - critical + - high + - low + - medium + - info + type: string + source: + description: Source is an identifier for the policy engine that + manages this report + type: string + timestamp: + description: Timestamp indicates the time the result was found + properties: + nanos: + description: Non-negative fractions of a second at nanosecond + resolution. Negative second values with fractions must + still have non-negative nanos values that count forward + in time. Must be from 0 to 999,999,999 inclusive. This + field may be limited in precision depending on context. + format: int32 + type: integer + seconds: + description: Represents seconds of UTC time since Unix epoch + 1970-01-01T00:00:00Z. Must be from 0001-01-01T00:00:00Z + to 9999-12-31T23:59:59Z inclusive. + format: int64 + type: integer + required: + - nanos + - seconds + type: object + required: + - policy + type: object + type: array + summary: + description: PolicyReportSummary provides a summary of results + properties: + error: + description: Error provides the count of policies that could not + be evaluated + type: integer + fail: + description: Fail provides the count of policies whose requirements + were not met + type: integer + pass: + description: Pass provides the count of policies whose requirements + were met + type: integer + skip: + description: Skip indicates the count of policies that were not + selected for evaluation + type: integer + warn: + description: Warn provides the count of non-scored policies whose + requirements were not met + type: integer + type: object + type: object + required: + - spec + type: object + served: true + storage: true + subresources: {} diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusterpolicies.kyverno.io.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusterpolicies.kyverno.io.yaml new file mode 100755 index 0000000..fa5f802 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusterpolicies.kyverno.io.yaml @@ -0,0 +1,11930 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + config.kubernetes.io/index: "5" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "5" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: clusterpolicies.kyverno.io +spec: + group: kyverno.io + names: + categories: + - kyverno + kind: ClusterPolicy + listKind: ClusterPolicyList + plural: clusterpolicies + shortNames: + - cpol + singular: clusterpolicy + scope: Cluster + versions: + - additionalPrinterColumns: + - jsonPath: .spec.background + name: Background + type: boolean + - jsonPath: .spec.validationFailureAction + name: Validate Action + type: string + - jsonPath: .spec.failurePolicy + name: Failure Policy + priority: 1 + type: string + - jsonPath: .status.ready + name: Ready + type: boolean + name: v1 + schema: + openAPIV3Schema: + description: ClusterPolicy declares validation, mutation, and generation behaviors + for matching resources. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: Spec declares policy behaviors. + properties: + applyRules: + description: ApplyRules controls how rules in a policy are applied. + Rule are processed in the order of declaration. When set to `One` + processing stops after a rule has been applied i.e. the rule matches + and results in a pass, fail, or error. When set to `All` all rules + in the policy are processed. The default is `All`. + enum: + - All + - One + type: string + background: + default: true + description: Background controls if rules are applied to existing + resources during a background scan. Optional. Default value is "true". + The value must be set to "false" if the policy rule uses variables + that are only available in the admission review request (e.g. user + name). + type: boolean + failurePolicy: + description: FailurePolicy defines how unexpected policy errors and + webhook response timeout errors are handled. Rules within the same + policy share the same failure behavior. Allowed values are Ignore + or Fail. Defaults to Fail. + enum: + - Ignore + - Fail + type: string + generateExistingOnPolicyUpdate: + description: GenerateExistingOnPolicyUpdate controls whether to trigger + generate rule in existing resources If is set to "true" generate + rule will be triggered and applied to existing matched resources. + Defaults to "false" if not specified. + type: boolean + mutateExistingOnPolicyUpdate: + description: MutateExistingOnPolicyUpdate controls if a mutateExisting + policy is applied on policy events. Default value is "false". + type: boolean + rules: + description: Rules is a list of Rule instances. A Policy contains + multiple rules and each rule can validate, mutate, or generate resources. + items: + description: Rule defines a validation, mutation, or generation + control for matching resources. Each rules contains a match declaration + to select resources, and an optional exclude declaration to specify + which resources to exclude. + properties: + context: + description: Context defines variables and data sources that + can be used during rule execution. + items: + description: ContextEntry adds variables and data sources + to a rule Context. Either a ConfigMap reference or a APILookup + must be provided. + properties: + apiCall: + description: APICall defines an HTTP request to the Kubernetes + API server. The JSON data retrieved is stored in the + context. + properties: + jmesPath: + description: JMESPath is an optional JSON Match Expression + that can be used to transform the JSON response + returned from the API server. For example a JMESPath + of "items | length(@)" applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments across + all namespaces. + type: string + urlPath: + description: URLPath is the URL path to be used in + the HTTP GET request to the Kubernetes API server + (e.g. "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format used by the + `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests to an OCI/Docker + V2 registry to fetch image details. + properties: + jmesPath: + description: JMESPath is an optional JSON Match Expression + that can be used to transform the ImageData struct + returned as a result of processing the image reference. + type: string + reference: + description: 'Reference is image reference to a container + image in the registry. Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath context + variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary JSON + object that the variable may take if the JMESPath + expression evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath Expression + that can be used to transform the variable. + type: string + value: + description: Value is any arbitrary JSON object representable + in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this policy rule + should not be applied. The exclude criteria can include resource + information (e.g. kind, name, namespace, labels) and admission + review request information like the name or role. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide role + names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information about + the resource being created or modified. Requires at least + one tag to be specified when under MatchResources. Specifying + ResourceDescription directly under match is being deprecated. + Please specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations (key-value + pairs of type string). Annotation keys and values + support the wildcard characters "*" (matches zero + or many characters) and "?" (matches at least one + character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. The + name supports wildcard characters "*" (matches zero + or many characters) and "?" (at least one character). + NOTE: "Name" is being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. Each + name supports wildcard characters "*" (matches zero + or many characters) and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters `*` + (matches zero or many characters) and `?` (matches + one character).Wildcards allows writing label selectors + like ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not match + an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are ANDed. + items: + description: A label selector requirement is a + selector that contains values, a key, and an + operator that relates the key and values. + properties: + key: + description: key is the label key that the + selector applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. If the + operator is Exists or DoesNotExist, the + values array must be empty. This array is + replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", + and the values array contains only "value". The + requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces names. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label keys + and values in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` (matches + one character). Wildcards allows writing label selectors + like ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not match + an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are ANDed. + items: + description: A label selector requirement is a + selector that contains values, a key, and an + operator that relates the key and values. + properties: + key: + description: key is the label key that the + selector applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. If the + operator is Exists or DoesNotExist, the + values array must be empty. This array is + replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", + and the values array contains only "value". The + requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role names + for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names like + users, user groups, and service accounts. + items: + description: Subject contains a reference to the object + or user identities a role binding applies to. This + can either hold a direct API object reference, or a + value for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of the referenced + subject. Defaults to "" for ServiceAccount subjects. + Defaults to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. Values + defined by this API group are "User", "Group", and + "ServiceAccount". If the Authorizer does not recognized + the kind value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as "User" + or "Group", and this value is not empty the Authorizer + should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + generate: + description: Generation is used to create new resources. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + clone: + description: Clone specifies the source resource used to + populate each generated resource. At most one of Data + or Clone can be specified. If neither are provided, the + generated resource will be created with default data only. + properties: + name: + description: Name specifies name of the resource. + type: string + namespace: + description: Namespace specifies source resource namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list of source resource + used to populate each generated resource. + properties: + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source resource namespace. + type: string + selector: + description: Selector is a label selector. Label keys + and values in `matchLabels`. wildcard characters are + not supported. + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are ANDed. + items: + description: A label selector requirement is a + selector that contains values, a key, and an + operator that relates the key and values. + properties: + key: + description: key is the label key that the + selector applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. If the + operator is Exists or DoesNotExist, the + values array must be empty. This array is + replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", + and the values array contains only "value". The + requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource declaration used + to populate each generated resource. At most one of Data + or Clone must be specified. If neither are provided, the + generated resource will be created with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + synchronize: + description: Synchronize controls if generated resources + should be kept in-sync with their source resource. If + Synchronize is set to "true" changes to generated resources + will be overwritten with resource data from Data or the + resource specified in the Clone declaration. Optional. + Defaults to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name of the field within + 'path' that will be used to uniquely identify an image. + Note - this field MUST be unique. + type: string + name: + description: Name is the entry the image will be available + under 'images.' in the context. If this field + is not defined, image entries will appear under 'images.custom'. + type: string + path: + description: Path is the path to the object containing + the image field in a custom resource. It should be + slash-separated. Each slash-separated key must be + a valid YAML key or a wildcard '*'. Wildcard keys + are expanded in case of arrays or objects. + type: string + value: + description: Value is an optional name of the field + within 'path' that points to the image URI. This is + useful when a custom 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping from kinds to + ImageExtractorConfigs. This config is only valid for verifyImages + rules. + type: object + match: + description: MatchResources defines when this policy rule should + be applied. The match criteria can include resource information + (e.g. kind, name, namespace, labels) and admission review + request information like the user name or role. At least one + kind is required. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide role + names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information about + the resource being created or modified. Requires at least + one tag to be specified when under MatchResources. Specifying + ResourceDescription directly under match is being deprecated. + Please specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations (key-value + pairs of type string). Annotation keys and values + support the wildcard characters "*" (matches zero + or many characters) and "?" (matches at least one + character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. The + name supports wildcard characters "*" (matches zero + or many characters) and "?" (at least one character). + NOTE: "Name" is being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. Each + name supports wildcard characters "*" (matches zero + or many characters) and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters `*` + (matches zero or many characters) and `?` (matches + one character).Wildcards allows writing label selectors + like ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not match + an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are ANDed. + items: + description: A label selector requirement is a + selector that contains values, a key, and an + operator that relates the key and values. + properties: + key: + description: key is the label key that the + selector applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. If the + operator is Exists or DoesNotExist, the + values array must be empty. This array is + replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", + and the values array contains only "value". The + requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces names. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label keys + and values in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` (matches + one character). Wildcards allows writing label selectors + like ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not match + an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are ANDed. + items: + description: A label selector requirement is a + selector that contains values, a key, and an + operator that relates the key and values. + properties: + key: + description: key is the label key that the + selector applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. If the + operator is Exists or DoesNotExist, the + values array must be empty. This array is + replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", + and the values array contains only "value". The + requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role names + for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names like + users, user groups, and service accounts. + items: + description: Subject contains a reference to the object + or user identities a role binding applies to. This + can either hold a direct API object reference, or a + value for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of the referenced + subject. Defaults to "" for ServiceAccount subjects. + Defaults to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. Values + defined by this API group are "User", "Group", and + "ServiceAccount". If the Authorizer does not recognized + the kind value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as "User" + or "Group", and this value is not empty the Authorizer + should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + mutate: + description: Mutation is used to modify matching resources. + properties: + foreach: + description: ForEach applies mutation rules to a list of + sub-elements by creating a context for each entry in the + list and looping over it to apply the specified logic. + items: + description: ForEach applies mutation rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + context: + description: Context defines variables and data sources + that can be used during rule execution. + items: + description: ContextEntry adds variables and data + sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON data + retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the JSON response returned from the API + server. For example a JMESPath of "items + | length(@)" applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to + be used in the HTTP GET request to the + Kubernetes API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). The + format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the ImageData struct returned as a result + of processing the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath + context variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take + if the JMESPath expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary JSON + object representable in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath expression + that results in one or more elements to which the + validation logic is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is a strategic merge + patch used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC 6902 + JSON Patch declarations used to modify resources. + See https://tools.ietf.org/html/rfc6902 and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, all of the conditions need to + pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, at least one of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic merge patch + used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC 6902 JSON + Patch declarations used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target resources to be + mutated. + items: + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the rule, It must be + unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine if a policy + rule should be applied by evaluating a set of conditions. + The declaration can contain nested `any` or `all` statements. + A direct list of conditions (without `any` or `all` statements + is supported for backwards compatibility but will be deprecated + in the next major release. See: https://kyverno.io/docs/writing-policies/preconditions/' + x-kubernetes-preserve-unknown-fields: true + validate: + description: Validation is used to validate matching resources. + properties: + anyPattern: + description: AnyPattern specifies list of validation patterns. + At least one of the patterns must be satisfied for the + validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used to pass or fail + a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared under + an `any` or `all` statement. A direct list of conditions + (without `any` or `all` statements) is also supported + for backwards compatibility but will be deprecated + in the next major release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + foreach: + description: ForEach applies validate rules to a list of + sub-elements by creating a context for each entry in the + list and looping over it to apply the specified logic. + items: + description: ForEach applies validate rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must be satisfied + for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables and data sources + that can be used during rule execution. + items: + description: ContextEntry adds variables and data + sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON data + retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the JSON response returned from the API + server. For example a JMESPath of "items + | length(@)" applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to + be used in the HTTP GET request to the + Kubernetes API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). The + format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the ImageData struct returned as a result + of processing the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath + context variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take + if the JMESPath expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary JSON + object representable in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions used to pass + or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared + under an `any` or `all` statement. A direct + list of conditions (without `any` or `all` statements) + is also supported for backwards compatibility + but will be deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies whether to use + the current list element as the scope for validation. + Defaults to "true" if not specified. When set to + "false", "request.object" is used as the validation + scope within the foreach block to allow referencing + other elements in the subtree. + type: boolean + list: + description: List specifies a JMESPath expression + that results in one or more elements to which the + validation logic is applied. + type: string + pattern: + description: Pattern specifies an overlay-style pattern + used to check resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, all of the conditions need to + pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, at least one of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions for manifest + verification + properties: + annotationDomain: + description: AnnotationDomain is custom domain of annotation + for message and signature. Default is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required number + of entries that must match. If the count is + null, all entries must match (a logical AND). + If the count is 1, at least one entry must match + (a logical OR). If the count contains a value + N, then N must be less than or equal to the + size of entries, and at least N entries must + match. + minimum: 1 + type: integer + entries: + description: Entries contains the available attestors. + An attestor can be a static key, attributes + for keyless verification, or a nested attestor + declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for image + verification. Every specified key-value + pair must exist and match in the verified + payload. The payload may contain other + key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set of + match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies one + or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is an + optional PEM encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are + certificate-extensions used for keyless + signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked and a root certificate chain + is expected instead. If an empty object + is provided the public instance of + Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional set + of PEM encoded trusted root certificates. + If not provided, the system roots + are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image signatures. + The keys can be directly specified + or can be a variable reference to + a key specified in a ConfigMap (see + https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified each + key is processed as a separate staticKey + entry (.attestors[*].entries.keys) + within the set of attestors and the + count is applied across the keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional alternate + OCI repository to use for signatures and + attestations that match this rule. If + specified Repository will override other + OCI image repository locations for this + Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored while comparing + manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional alternate OCI + repository to use for resource bundle reference. The + repository can be overridden per Attestor or Attestation. + type: string + type: object + message: + description: Message specifies a custom message to be displayed + on failure. + type: string + pattern: + description: Pattern specifies an overlay-style pattern + used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions for Kubernetes + Pod Security admission by specifying exclusions for Pod + Security Standards controls. + properties: + exclude: + description: Exclude specifies the Pod Security Standard + controls to be excluded. + items: + description: PodSecurityStandard specifies the Pod + Security Standard controls to be excluded. + properties: + controlName: + description: 'ControlName specifies the name of + the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. Wildcards (''*'' and + ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security Standard + level to be applied to workloads. Allowed values are + privileged, baseline, and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod Security Standard + versions that Kubernetes supports. Allowed values + are v1.19, v1.20, v1.21, v1.22, v1.23, v1.24, v1.25, + latest. Defaults to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify image signatures + and mutate them to add a digest + items: + description: ImageVerification validates that images that + match the specified pattern are signed with the supplied + public key. Once the image is verified it is mutated to + include the SHA digest retrieved during the registration. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are certificate-extensions + used for keyless signing. Deprecated. + type: object + annotations: + additionalProperties: + type: string + description: Annotations are used for image verification. + Every specified key-value pair must exist and match + in the verified payload. The payload may contain other + key-value pairs. Deprecated. Use annotations per Attestor + instead. + type: object + attestations: + description: Attestations are optional checks for signed + in-toto Statements used to verify the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations from the OCI registry + and decodes them into a list of Statement declarations. + items: + description: Attestation are checks for signed in-toto + Statements that are used to verify the image. See + https://github.com/in-toto/attestation. Kyverno fetches + signed attestations from the OCI registry and decodes + them into a list of Statements. + properties: + attestors: + description: Attestors specify the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. If the + count is null, all entries must match (a + logical AND). If the count is 1, at least + one entry must match (a logical OR). If + the count contains a value N, then N must + be less than or equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static key, + attributes for keyless verification, or + a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set + of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is + an optional PEM encoded set of + certificates used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions used + for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked and a root + certificate chain is expected + instead. If an empty object is + provided the public instance of + Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted root + certificates. If not provided, + the system roots are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image + signatures. The keys can be directly + specified or can be a variable + reference to a key specified in + a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors and + the count is applied across the + keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use for + signatures and attestations that match + this rule. If specified Repository + will override other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used to verify attributes + within a Predicate. If no Conditions are specified + the attestation check is satisfied as long there + are predicates that match the predicate type. + items: + description: AnyAllConditions consists of conditions + wrapped denoting a logical criteria to be fulfilled. + AnyConditions get fulfilled when at least one + of its sub-conditions passes. AllConditions + get fulfilled only when all of its sub-conditions + pass. + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of + the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines the type of Predicate + contained within the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required number + of entries that must match. If the count is null, + all entries must match (a logical AND). If the + count is 1, at least one entry must match (a logical + OR). If the count contains a value N, then N must + be less than or equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available attestors. + An attestor can be a static key, attributes for + keyless verification, or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for image + verification. Every specified key-value + pair must exist and match in the verified + payload. The payload may contain other key-value + pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set of match + authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies one or + more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is an optional + PEM encoded set of certificates used + to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not checked. + If an empty object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address of + the transparency log. Defaults to + the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are + certificate-extensions used for keyless + signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not checked + and a root certificate chain is expected + instead. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address of + the transparency log. Defaults to + the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional set + of PEM encoded trusted root certificates. + If not provided, the system roots are + used. + type: string + subject: + description: Subject is the verified identity + used for keyless signing, for example + the email address + type: string + type: object + keys: + description: Keys specifies one or more public + keys + properties: + publicKeys: + description: Keys is a set of X.509 public + keys used to verify image signatures. + The keys can be directly specified or + can be a variable reference to a key + specified in a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified each + key is processed as a separate staticKey + entry (.attestors[*].entries.keys) within + the set of attestors and the count is + applied across the keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not checked. + If an empty object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address of + the transparency log. Defaults to + the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional alternate + OCI repository to use for signatures and + attestations that match this rule. If specified + Repository will override other OCI image + repository locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + image: + description: 'Image is the image name consisting of the + registry address, repository, image, and tag. Wildcards + (''*'' and ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images. + Deprecated. Use ImageReferences instead.' + type: string + imageReferences: + description: 'ImageReferences is a list of matching image + reference patterns. At least one pattern in the list + must match the image for the rule to apply. Each image + reference consists of a registry address (defaults to + docker.io), repository, image, and tag (defaults to + latest). Wildcards (''*'' and ''?'') are allowed. See: + https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + issuer: + description: Issuer is the certificate issuer used for + keyless signing. Deprecated. Use KeylessAttestor instead. + type: string + key: + description: Key is the PEM encoded public key that the + image or attestation is signed with. Deprecated. Use + StaticKeyAttestor instead. + type: string + mutateDigest: + default: true + description: MutateDigest enables replacement of image + tags with digests. Defaults to true. + type: boolean + repository: + description: Repository is an optional alternate OCI repository + to use for image signatures and attestations that match + this rule. If specified Repository will override the + default OCI image repository configured for the installation. + The repository can also be overridden per Attestor or + Attestation. + type: string + required: + default: true + description: Required validates that images are verified + i.e. have matched passed a signature or attestation + check. + type: boolean + roots: + description: Roots is the PEM encoded Root certificate + chain used for keyless signing Deprecated. Use KeylessAttestor + instead. + type: string + subject: + description: Subject is the identity used for keyless + signing, for example an email address Deprecated. Use + KeylessAttestor instead. + type: string + verifyDigest: + default: true + description: VerifyDigest validates that images have a + digest. + type: boolean + type: object + type: array + type: object + type: array + schemaValidation: + description: SchemaValidation skips validation checks for policies + as well as patched resources. Optional. The default value is set + to "true", it must be set to "false" to disable the validation checks. + type: boolean + validationFailureAction: + default: audit + description: ValidationFailureAction defines if a validation policy + rule violation should block the admission review request (enforce), + or allow (audit) the admission review request and report an error + in a policy report. Optional. Allowed values are audit or enforce. + The default value is "audit". + enum: + - audit + - enforce + type: string + validationFailureActionOverrides: + description: ValidationFailureActionOverrides is a Cluster Policy + attribute that specifies ValidationFailureAction namespace-wise. + It overrides ValidationFailureAction for the specified namespaces. + items: + properties: + action: + description: ValidationFailureAction defines the policy validation + failure action + enum: + - audit + - enforce + type: string + namespaces: + items: + type: string + type: array + type: object + type: array + webhookTimeoutSeconds: + description: WebhookTimeoutSeconds specifies the maximum time in seconds + allowed to apply this policy. After the configured time expires, + the admission request may fail, or may simply ignore the policy + results, based on the failure policy. The default timeout is 10s, + the value must be between 1 and 30 seconds. + format: int32 + type: integer + type: object + status: + description: Status contains policy runtime data. + properties: + autogen: + description: Autogen contains autogen status information + properties: + rules: + description: Rules is a list of Rule instances. It contains auto + generated rules added for pod controllers + items: + description: Rule defines a validation, mutation, or generation + control for matching resources. Each rules contains a match + declaration to select resources, and an optional exclude declaration + to specify which resources to exclude. + properties: + context: + description: Context defines variables and data sources + that can be used during rule execution. + items: + description: ContextEntry adds variables and data sources + to a rule Context. Either a ConfigMap reference or a + APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request to the + Kubernetes API server. The JSON data retrieved is + stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON Match + Expression that can be used to transform the + JSON response returned from the API server. + For example a JMESPath of "items | length(@)" + applied to the API server response to the URLPath + "/apis/apps/v1/deployments" will return the + total count of deployments across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to be used + in the HTTP GET request to the Kubernetes API + server (e.g. "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests to an + OCI/Docker V2 registry to fetch image details. + properties: + jmesPath: + description: JMESPath is an optional JSON Match + Expression that can be used to transform the + ImageData struct returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference to + a container image in the registry. Example: + ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath + context variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take if the + JMESPath expression evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform the + variable. + type: string + value: + description: Value is any arbitrary JSON object + representable in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this policy rule + should not be applied. The exclude criteria can include + resource information (e.g. kind, name, namespace, labels) + and admission review request information like the name + or role. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. Requires + at least one tag to be specified when under MatchResources. + Specifying ResourceDescription directly under match + is being deprecated. Please specify under "any" or + "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation keys + and values support the wildcard characters "*" + (matches zero or many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated in + favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key and + value but does not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the wildcard + characters `*` (matches zero or many characters) + and `?` (matches one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] matches any + key and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role names + for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names like + users, user groups, and service accounts. + items: + description: Subject contains a reference to the object + or user identities a role binding applies to. This + can either hold a direct API object reference, or + a value for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of the + referenced subject. Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as "User" + or "Group", and this value is not empty the + Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + generate: + description: Generation is used to create new resources. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + clone: + description: Clone specifies the source resource used + to populate each generated resource. At most one of + Data or Clone can be specified. If neither are provided, + the generated resource will be created with default + data only. + properties: + name: + description: Name specifies name of the resource. + type: string + namespace: + description: Namespace specifies source resource + namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list of source + resource used to populate each generated resource. + properties: + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source resource + namespace. + type: string + selector: + description: Selector is a label selector. Label + keys and values in `matchLabels`. wildcard characters + are not supported. + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource declaration + used to populate each generated resource. At most + one of Data or Clone must be specified. If neither + are provided, the generated resource will be created + with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + synchronize: + description: Synchronize controls if generated resources + should be kept in-sync with their source resource. + If Synchronize is set to "true" changes to generated + resources will be overwritten with resource data from + Data or the resource specified in the Clone declaration. + Optional. Defaults to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name of the field + within 'path' that will be used to uniquely identify + an image. Note - this field MUST be unique. + type: string + name: + description: Name is the entry the image will be + available under 'images.' in the context. + If this field is not defined, image entries will + appear under 'images.custom'. + type: string + path: + description: Path is the path to the object containing + the image field in a custom resource. It should + be slash-separated. Each slash-separated key must + be a valid YAML key or a wildcard '*'. Wildcard + keys are expanded in case of arrays or objects. + type: string + value: + description: Value is an optional name of the field + within 'path' that points to the image URI. This + is useful when a custom 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping from kinds + to ImageExtractorConfigs. This config is only valid for + verifyImages rules. + type: object + match: + description: MatchResources defines when this policy rule + should be applied. The match criteria can include resource + information (e.g. kind, name, namespace, labels) and admission + review request information like the user name or role. + At least one kind is required. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. Requires + at least one tag to be specified when under MatchResources. + Specifying ResourceDescription directly under match + is being deprecated. Please specify under "any" or + "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation keys + and values support the wildcard characters "*" + (matches zero or many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated in + favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key and + value but does not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the wildcard + characters `*` (matches zero or many characters) + and `?` (matches one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] matches any + key and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role names + for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names like + users, user groups, and service accounts. + items: + description: Subject contains a reference to the object + or user identities a role binding applies to. This + can either hold a direct API object reference, or + a value for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of the + referenced subject. Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as "User" + or "Group", and this value is not empty the + Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + mutate: + description: Mutation is used to modify matching resources. + properties: + foreach: + description: ForEach applies mutation rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + items: + description: ForEach applies mutation rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and + data sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON + data retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the JSON response + returned from the API server. For + example a JMESPath of "items | length(@)" + applied to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path + to be used in the HTTP GET request + to the Kubernetes API server (e.g. + "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format + used by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch + image details. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the ImageData struct + returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be + defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that the variable + may take if the JMESPath expression + evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional + JMESPath Expression that can be used + to transform the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath expression + that results in one or more elements to which + the validation logic is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is a strategic + merge patch used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC + 6902 JSON Patch declarations used to modify + resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of + the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic merge + patch used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC 6902 JSON + Patch declarations used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target resources to + be mutated. + items: + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the rule, It must + be unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine if a policy + rule should be applied by evaluating a set of conditions. + The declaration can contain nested `any` or `all` statements. + A direct list of conditions (without `any` or `all` statements + is supported for backwards compatibility but will be deprecated + in the next major release. See: https://kyverno.io/docs/writing-policies/preconditions/' + x-kubernetes-preserve-unknown-fields: true + validate: + description: Validation is used to validate matching resources. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must be satisfied + for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used to pass or + fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared + under an `any` or `all` statement. A direct list + of conditions (without `any` or `all` statements) + is also supported for backwards compatibility + but will be deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + foreach: + description: ForEach applies validate rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + items: + description: ForEach applies validate rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must + be satisfied for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and + data sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON + data retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the JSON response + returned from the API server. For + example a JMESPath of "items | length(@)" + applied to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path + to be used in the HTTP GET request + to the Kubernetes API server (e.g. + "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format + used by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch + image details. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the ImageData struct + returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be + defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that the variable + may take if the JMESPath expression + evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional + JMESPath Expression that can be used + to transform the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions used to pass + or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared + under an `any` or `all` statement. A direct + list of conditions (without `any` or `all` + statements) is also supported for backwards + compatibility but will be deprecated in + the next major release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies whether to + use the current list element as the scope for + validation. Defaults to "true" if not specified. + When set to "false", "request.object" is used + as the validation scope within the foreach block + to allow referencing other elements in the subtree. + type: boolean + list: + description: List specifies a JMESPath expression + that results in one or more elements to which + the validation logic is applied. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of + the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions for manifest + verification + properties: + annotationDomain: + description: AnnotationDomain is custom domain of + annotation for message and signature. Default + is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. If the + count is null, all entries must match (a + logical AND). If the count is 1, at least + one entry must match (a logical OR). If + the count contains a value N, then N must + be less than or equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static key, + attributes for keyless verification, or + a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set + of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is + an optional PEM encoded set of + certificates used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions used + for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked and a root + certificate chain is expected + instead. If an empty object is + provided the public instance of + Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted root + certificates. If not provided, + the system roots are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image + signatures. The keys can be directly + specified or can be a variable + reference to a key specified in + a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors and + the count is applied across the + keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use for + signatures and attestations that match + this rule. If specified Repository + will override other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored while + comparing manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional alternate + OCI repository to use for resource bundle reference. + The repository can be overridden per Attestor + or Attestation. + type: string + type: object + message: + description: Message specifies a custom message to be + displayed on failure. + type: string + pattern: + description: Pattern specifies an overlay-style pattern + used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions for Kubernetes + Pod Security admission by specifying exclusions for + Pod Security Standards controls. + properties: + exclude: + description: Exclude specifies the Pod Security + Standard controls to be excluded. + items: + description: PodSecurityStandard specifies the + Pod Security Standard controls to be excluded. + properties: + controlName: + description: 'ControlName specifies the name + of the Pod Security Standard control. See: + https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. + Wildcards (''*'' and ''?'') are allowed. + See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security Standard + level to be applied to workloads. Allowed values + are privileged, baseline, and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod Security Standard + versions that Kubernetes supports. Allowed values + are v1.19, v1.20, v1.21, v1.22, v1.23, v1.24, + v1.25, latest. Defaults to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify image signatures + and mutate them to add a digest + items: + description: ImageVerification validates that images that + match the specified pattern are signed with the supplied + public key. Once the image is verified it is mutated + to include the SHA digest retrieved during the registration. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are certificate-extensions + used for keyless signing. Deprecated. + type: object + annotations: + additionalProperties: + type: string + description: Annotations are used for image verification. + Every specified key-value pair must exist and match + in the verified payload. The payload may contain + other key-value pairs. Deprecated. Use annotations + per Attestor instead. + type: object + attestations: + description: Attestations are optional checks for + signed in-toto Statements used to verify the image. + See https://github.com/in-toto/attestation. Kyverno + fetches signed attestations from the OCI registry + and decodes them into a list of Statement declarations. + items: + description: Attestation are checks for signed in-toto + Statements that are used to verify the image. + See https://github.com/in-toto/attestation. Kyverno + fetches signed attestations from the OCI registry + and decodes them into a list of Statements. + properties: + attestors: + description: Attestors specify the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. If + the count is null, all entries must + match (a logical AND). If the count + is 1, at least one entry must match + (a logical OR). If the count contains + a value N, then N must be less than + or equal to the size of entries, and + at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static + key, attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used + for image verification. Every + specified key-value pair must + exist and match in the verified + payload. The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is a nested + AttestorSet used to specify a + more complex set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is + an optional PEM encoded public + certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates used to + verify + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of + attribute used to verify a Sigstore + keyless attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked and a root + certificate chain is expected + instead. If an empty object + is provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted + root certificates. If not + provided, the system roots + are used. + type: string + subject: + description: Subject is the + verified identity used for + keyless signing, for example + the email address + type: string + type: object + keys: + description: Keys specifies one + or more public keys + properties: + publicKeys: + description: Keys is a set of + X.509 public keys used to + verify image signatures. The + keys can be directly specified + or can be a variable reference + to a key specified in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a + separate staticKey entry (.attestors[*].entries.keys) + within the set of attestors + and the count is applied across + the keys. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use + for signatures and attestations + that match this rule. If specified + Repository will override other + OCI image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used to verify attributes + within a Predicate. If no Conditions are specified + the attestation check is satisfied as long + there are predicates that match the predicate + type. + items: + description: AnyAllConditions consists of + conditions wrapped denoting a logical criteria + to be fulfilled. AnyConditions get fulfilled + when at least one of its sub-conditions + passes. AllConditions get fulfilled only + when all of its sub-conditions pass. + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is + useful for finer control of when an + rule is applied. A condition can reference + object data using JMESPath notation. + Here, all of the conditions need to + pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for conditional + rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is + useful for finer control of when an + rule is applied. A condition can reference + object data using JMESPath notation. + Here, at least one of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for conditional + rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines the type + of Predicate contained within the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required number + of entries that must match. If the count is + null, all entries must match (a logical AND). + If the count is 1, at least one entry must + match (a logical OR). If the count contains + a value N, then N must be less than or equal + to the size of entries, and at least N entries + must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static key, + attributes for keyless verification, or a + nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set of + match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies one + or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is an + optional PEM encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions used + for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked and a root certificate chain + is expected instead. If an empty + object is provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted root + certificates. If not provided, the + system roots are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image + signatures. The keys can be directly + specified or can be a variable reference + to a key specified in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors and + the count is applied across the + keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use for + signatures and attestations that match + this rule. If specified Repository will + override other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + image: + description: 'Image is the image name consisting of + the registry address, repository, image, and tag. + Wildcards (''*'' and ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images. + Deprecated. Use ImageReferences instead.' + type: string + imageReferences: + description: 'ImageReferences is a list of matching + image reference patterns. At least one pattern in + the list must match the image for the rule to apply. + Each image reference consists of a registry address + (defaults to docker.io), repository, image, and + tag (defaults to latest). Wildcards (''*'' and ''?'') + are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + issuer: + description: Issuer is the certificate issuer used + for keyless signing. Deprecated. Use KeylessAttestor + instead. + type: string + key: + description: Key is the PEM encoded public key that + the image or attestation is signed with. Deprecated. + Use StaticKeyAttestor instead. + type: string + mutateDigest: + default: true + description: MutateDigest enables replacement of image + tags with digests. Defaults to true. + type: boolean + repository: + description: Repository is an optional alternate OCI + repository to use for image signatures and attestations + that match this rule. If specified Repository will + override the default OCI image repository configured + for the installation. The repository can also be + overridden per Attestor or Attestation. + type: string + required: + default: true + description: Required validates that images are verified + i.e. have matched passed a signature or attestation + check. + type: boolean + roots: + description: Roots is the PEM encoded Root certificate + chain used for keyless signing Deprecated. Use KeylessAttestor + instead. + type: string + subject: + description: Subject is the identity used for keyless + signing, for example an email address Deprecated. + Use KeylessAttestor instead. + type: string + verifyDigest: + default: true + description: VerifyDigest validates that images have + a digest. + type: boolean + type: object + type: array + type: object + type: array + type: object + conditions: + description: Conditions is a list of conditions that apply to the + policy + items: + description: "Condition contains details for one aspect of the current + state of this API Resource. --- This struct is intended for direct + use as an array at the field path .status.conditions. For example, + \n type FooStatus struct{ // Represents the observations of a + foo's current state. // Known .status.conditions.type are: \"Available\", + \"Progressing\", and \"Degraded\" // +patchMergeKey=type // +patchStrategy=merge + // +listType=map // +listMapKey=type Conditions []metav1.Condition + `json:\"conditions,omitempty\" patchStrategy:\"merge\" patchMergeKey:\"type\" + protobuf:\"bytes,1,rep,name=conditions\"` \n // other fields }" + properties: + lastTransitionTime: + description: lastTransitionTime is the last time the condition + transitioned from one status to another. This should be when + the underlying condition changed. If that is not known, then + using the time when the API field changed is acceptable. + format: date-time + type: string + message: + description: message is a human readable message indicating + details about the transition. This may be an empty string. + maxLength: 32768 + type: string + observedGeneration: + description: observedGeneration represents the .metadata.generation + that the condition was set based upon. For instance, if .metadata.generation + is currently 12, but the .status.conditions[x].observedGeneration + is 9, the condition is out of date with respect to the current + state of the instance. + format: int64 + minimum: 0 + type: integer + reason: + description: reason contains a programmatic identifier indicating + the reason for the condition's last transition. Producers + of specific condition types may define expected values and + meanings for this field, and whether the values are considered + a guaranteed API. The value should be a CamelCase string. + This field may not be empty. + maxLength: 1024 + minLength: 1 + pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$ + type: string + status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown + type: string + type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + --- Many .condition.type values are consistent across resources + like Available, but because arbitrary conditions can be useful + (see .node.status.conditions), the ability to deconflict is + important. The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt) + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ + type: string + required: + - lastTransitionTime + - message + - reason + - status + - type + type: object + type: array + ready: + description: Ready indicates if the policy is ready to serve the admission + request. Deprecated in favor of Conditions + type: boolean + required: + - ready + type: object + required: + - spec + type: object + served: true + storage: true + subresources: + status: {} + - additionalPrinterColumns: + - jsonPath: .spec.background + name: Background + type: boolean + - jsonPath: .spec.validationFailureAction + name: Validate Action + type: string + - jsonPath: .spec.failurePolicy + name: Failure Policy + priority: 1 + type: string + - jsonPath: .status.ready + name: Ready + type: boolean + name: v2beta1 + schema: + openAPIV3Schema: + description: ClusterPolicy declares validation, mutation, and generation behaviors + for matching resources. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: Spec declares policy behaviors. + properties: + applyRules: + description: ApplyRules controls how rules in a policy are applied. + Rule are processed in the order of declaration. When set to `One` + processing stops after a rule has been applied i.e. the rule matches + and results in a pass, fail, or error. When set to `All` all rules + in the policy are processed. The default is `All`. + enum: + - All + - One + type: string + background: + default: true + description: Background controls if rules are applied to existing + resources during a background scan. Optional. Default value is "true". + The value must be set to "false" if the policy rule uses variables + that are only available in the admission review request (e.g. user + name). + type: boolean + failurePolicy: + description: FailurePolicy defines how unexpected policy errors and + webhook response timeout errors are handled. Rules within the same + policy share the same failure behavior. Allowed values are Ignore + or Fail. Defaults to Fail. + enum: + - Ignore + - Fail + type: string + generateExistingOnPolicyUpdate: + description: GenerateExistingOnPolicyUpdate controls whether to trigger + generate rule in existing resources If is set to "true" generate + rule will be triggered and applied to existing matched resources. + Defaults to "false" if not specified. + type: boolean + mutateExistingOnPolicyUpdate: + description: MutateExistingOnPolicyUpdate controls if a mutateExisting + policy is applied on policy events. Default value is "false". + type: boolean + rules: + description: Rules is a list of Rule instances. A Policy contains + multiple rules and each rule can validate, mutate, or generate resources. + items: + description: Rule defines a validation, mutation, or generation + control for matching resources. Each rules contains a match declaration + to select resources, and an optional exclude declaration to specify + which resources to exclude. + properties: + context: + description: Context defines variables and data sources that + can be used during rule execution. + items: + description: ContextEntry adds variables and data sources + to a rule Context. Either a ConfigMap reference or a APILookup + must be provided. + properties: + apiCall: + description: APICall defines an HTTP request to the Kubernetes + API server. The JSON data retrieved is stored in the + context. + properties: + jmesPath: + description: JMESPath is an optional JSON Match Expression + that can be used to transform the JSON response + returned from the API server. For example a JMESPath + of "items | length(@)" applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments across + all namespaces. + type: string + urlPath: + description: URLPath is the URL path to be used in + the HTTP GET request to the Kubernetes API server + (e.g. "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format used by the + `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests to an OCI/Docker + V2 registry to fetch image details. + properties: + jmesPath: + description: JMESPath is an optional JSON Match Expression + that can be used to transform the ImageData struct + returned as a result of processing the image reference. + type: string + reference: + description: 'Reference is image reference to a container + image in the registry. Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath context + variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary JSON + object that the variable may take if the JMESPath + expression evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath Expression + that can be used to transform the variable. + type: string + value: + description: Value is any arbitrary JSON object representable + in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this policy rule + should not be applied. The exclude criteria can include resource + information (e.g. kind, name, namespace, labels) and admission + review request information like the name or role. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + type: object + generate: + description: Generation is used to create new resources. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + clone: + description: Clone specifies the source resource used to + populate each generated resource. At most one of Data + or Clone can be specified. If neither are provided, the + generated resource will be created with default data only. + properties: + name: + description: Name specifies name of the resource. + type: string + namespace: + description: Namespace specifies source resource namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list of source resource + used to populate each generated resource. + properties: + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source resource namespace. + type: string + selector: + description: Selector is a label selector. Label keys + and values in `matchLabels`. wildcard characters are + not supported. + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are ANDed. + items: + description: A label selector requirement is a + selector that contains values, a key, and an + operator that relates the key and values. + properties: + key: + description: key is the label key that the + selector applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. If the + operator is Exists or DoesNotExist, the + values array must be empty. This array is + replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", + and the values array contains only "value". The + requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource declaration used + to populate each generated resource. At most one of Data + or Clone must be specified. If neither are provided, the + generated resource will be created with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + synchronize: + description: Synchronize controls if generated resources + should be kept in-sync with their source resource. If + Synchronize is set to "true" changes to generated resources + will be overwritten with resource data from Data or the + resource specified in the Clone declaration. Optional. + Defaults to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name of the field within + 'path' that will be used to uniquely identify an image. + Note - this field MUST be unique. + type: string + name: + description: Name is the entry the image will be available + under 'images.' in the context. If this field + is not defined, image entries will appear under 'images.custom'. + type: string + path: + description: Path is the path to the object containing + the image field in a custom resource. It should be + slash-separated. Each slash-separated key must be + a valid YAML key or a wildcard '*'. Wildcard keys + are expanded in case of arrays or objects. + type: string + value: + description: Value is an optional name of the field + within 'path' that points to the image URI. This is + useful when a custom 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping from kinds to + ImageExtractorConfigs. This config is only valid for verifyImages + rules. + type: object + match: + description: MatchResources defines when this policy rule should + be applied. The match criteria can include resource information + (e.g. kind, name, namespace, labels) and admission review + request information like the user name or role. At least one + kind is required. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + type: object + mutate: + description: Mutation is used to modify matching resources. + properties: + foreach: + description: ForEach applies mutation rules to a list of + sub-elements by creating a context for each entry in the + list and looping over it to apply the specified logic. + items: + description: ForEach applies mutation rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + context: + description: Context defines variables and data sources + that can be used during rule execution. + items: + description: ContextEntry adds variables and data + sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON data + retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the JSON response returned from the API + server. For example a JMESPath of "items + | length(@)" applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to + be used in the HTTP GET request to the + Kubernetes API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). The + format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the ImageData struct returned as a result + of processing the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath + context variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take + if the JMESPath expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary JSON + object representable in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath expression + that results in one or more elements to which the + validation logic is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is a strategic merge + patch used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC 6902 + JSON Patch declarations used to modify resources. + See https://tools.ietf.org/html/rfc6902 and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, all of the conditions need to + pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, at least one of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic merge patch + used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC 6902 JSON + Patch declarations used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target resources to be + mutated. + items: + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the rule, It must be + unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine if a policy + rule should be applied by evaluating a set of conditions. + The declaration can contain nested `any` or `all` statements. + A direct list of conditions (without `any` or `all` statements + is supported for backwards compatibility but See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based conditional + rule execution. This is useful for finer control of when + an rule is applied. A condition can reference object data + using JMESPath notation. Here, all of the conditions need + to pass + items: + properties: + key: + description: Key is the context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional operation + to perform. Valid operators are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, or set + of values. The values can be fixed set or can be + variables declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based conditional + rule execution. This is useful for finer control of when + an rule is applied. A condition can reference object data + using JMESPath notation. Here, at least one of the conditions + need to pass + items: + properties: + key: + description: Key is the context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional operation + to perform. Valid operators are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, or set + of values. The values can be fixed set or can be + variables declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + validate: + description: Validation is used to validate matching resources. + properties: + anyPattern: + description: AnyPattern specifies list of validation patterns. + At least one of the patterns must be satisfied for the + validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used to pass or fail + a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared under + an `any` or `all` statement. A direct list of conditions + (without `any` or `all` statements) is also supported + for backwards compatibility See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A condition + can reference object data using JMESPath notation. + Here, all of the conditions need to pass + items: + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators are: + Equals, NotEquals, In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A condition + can reference object data using JMESPath notation. + Here, at least one of the conditions need to pass + items: + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators are: + Equals, NotEquals, In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: object + foreach: + description: ForEach applies validate rules to a list of + sub-elements by creating a context for each entry in the + list and looping over it to apply the specified logic. + items: + description: ForEach applies validate rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must be satisfied + for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables and data sources + that can be used during rule execution. + items: + description: ContextEntry adds variables and data + sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON data + retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the JSON response returned from the API + server. For example a JMESPath of "items + | length(@)" applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to + be used in the HTTP GET request to the + Kubernetes API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). The + format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the ImageData struct returned as a result + of processing the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath + context variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take + if the JMESPath expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary JSON + object representable in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions used to pass + or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared + under an `any` or `all` statement. A direct + list of conditions (without `any` or `all` statements) + is also supported for backwards compatibility + but will be deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies whether to use + the current list element as the scope for validation. + Defaults to "true" if not specified. When set to + "false", "request.object" is used as the validation + scope within the foreach block to allow referencing + other elements in the subtree. + type: boolean + list: + description: List specifies a JMESPath expression + that results in one or more elements to which the + validation logic is applied. + type: string + pattern: + description: Pattern specifies an overlay-style pattern + used to check resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, all of the conditions need to + pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, at least one of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions for manifest + verification + properties: + annotationDomain: + description: AnnotationDomain is custom domain of annotation + for message and signature. Default is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required number + of entries that must match. If the count is + null, all entries must match (a logical AND). + If the count is 1, at least one entry must match + (a logical OR). If the count contains a value + N, then N must be less than or equal to the + size of entries, and at least N entries must + match. + minimum: 1 + type: integer + entries: + description: Entries contains the available attestors. + An attestor can be a static key, attributes + for keyless verification, or a nested attestor + declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for image + verification. Every specified key-value + pair must exist and match in the verified + payload. The payload may contain other + key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set of + match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies one + or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is an + optional PEM encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are + certificate-extensions used for keyless + signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked and a root certificate chain + is expected instead. If an empty object + is provided the public instance of + Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional set + of PEM encoded trusted root certificates. + If not provided, the system roots + are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image signatures. + The keys can be directly specified + or can be a variable reference to + a key specified in a ConfigMap (see + https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified each + key is processed as a separate staticKey + entry (.attestors[*].entries.keys) + within the set of attestors and the + count is applied across the keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional alternate + OCI repository to use for signatures and + attestations that match this rule. If + specified Repository will override other + OCI image repository locations for this + Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored while comparing + manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional alternate OCI + repository to use for resource bundle reference. The + repository can be overridden per Attestor or Attestation. + type: string + type: object + message: + description: Message specifies a custom message to be displayed + on failure. + type: string + pattern: + description: Pattern specifies an overlay-style pattern + used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions for Kubernetes + Pod Security admission by specifying exclusions for Pod + Security Standards controls. + properties: + exclude: + description: Exclude specifies the Pod Security Standard + controls to be excluded. + items: + description: PodSecurityStandard specifies the Pod + Security Standard controls to be excluded. + properties: + controlName: + description: 'ControlName specifies the name of + the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. Wildcards (''*'' and + ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security Standard + level to be applied to workloads. Allowed values are + privileged, baseline, and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod Security Standard + versions that Kubernetes supports. Allowed values + are v1.19, v1.20, v1.21, v1.22, v1.23, v1.24, v1.25, + latest. Defaults to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify image signatures + and mutate them to add a digest + items: + description: ImageVerification validates that images that + match the specified pattern are signed with the supplied + public key. Once the image is verified it is mutated to + include the SHA digest retrieved during the registration. + properties: + attestations: + description: Attestations are optional checks for signed + in-toto Statements used to verify the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations from the OCI registry + and decodes them into a list of Statement declarations. + items: + description: Attestation are checks for signed in-toto + Statements that are used to verify the image. See + https://github.com/in-toto/attestation. Kyverno fetches + signed attestations from the OCI registry and decodes + them into a list of Statements. + properties: + attestors: + description: Attestors specify the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. If the + count is null, all entries must match (a + logical AND). If the count is 1, at least + one entry must match (a logical OR). If + the count contains a value N, then N must + be less than or equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static key, + attributes for keyless verification, or + a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set + of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is + an optional PEM encoded set of + certificates used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions used + for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked and a root + certificate chain is expected + instead. If an empty object is + provided the public instance of + Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted root + certificates. If not provided, + the system roots are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image + signatures. The keys can be directly + specified or can be a variable + reference to a key specified in + a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors and + the count is applied across the + keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use for + signatures and attestations that match + this rule. If specified Repository + will override other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used to verify attributes + within a Predicate. If no Conditions are specified + the attestation check is satisfied as long there + are predicates that match the predicate type. + items: + description: AnyAllConditions consists of conditions + wrapped denoting a logical criteria to be fulfilled. + AnyConditions get fulfilled when at least one + of its sub-conditions passes. AllConditions + get fulfilled only when all of its sub-conditions + pass. + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of + the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines the type of Predicate + contained within the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required number + of entries that must match. If the count is null, + all entries must match (a logical AND). If the + count is 1, at least one entry must match (a logical + OR). If the count contains a value N, then N must + be less than or equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available attestors. + An attestor can be a static key, attributes for + keyless verification, or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for image + verification. Every specified key-value + pair must exist and match in the verified + payload. The payload may contain other key-value + pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set of match + authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies one or + more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is an optional + PEM encoded set of certificates used + to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not checked. + If an empty object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address of + the transparency log. Defaults to + the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are + certificate-extensions used for keyless + signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not checked + and a root certificate chain is expected + instead. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address of + the transparency log. Defaults to + the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional set + of PEM encoded trusted root certificates. + If not provided, the system roots are + used. + type: string + subject: + description: Subject is the verified identity + used for keyless signing, for example + the email address + type: string + type: object + keys: + description: Keys specifies one or more public + keys + properties: + publicKeys: + description: Keys is a set of X.509 public + keys used to verify image signatures. + The keys can be directly specified or + can be a variable reference to a key + specified in a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified each + key is processed as a separate staticKey + entry (.attestors[*].entries.keys) within + the set of attestors and the count is + applied across the keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not checked. + If an empty object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address of + the transparency log. Defaults to + the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional alternate + OCI repository to use for signatures and + attestations that match this rule. If specified + Repository will override other OCI image + repository locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + imageReferences: + description: 'ImageReferences is a list of matching image + reference patterns. At least one pattern in the list + must match the image for the rule to apply. Each image + reference consists of a registry address (defaults to + docker.io), repository, image, and tag (defaults to + latest). Wildcards (''*'' and ''?'') are allowed. See: + https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + mutateDigest: + default: true + description: MutateDigest enables replacement of image + tags with digests. Defaults to true. + type: boolean + repository: + description: Repository is an optional alternate OCI repository + to use for image signatures and attestations that match + this rule. If specified Repository will override the + default OCI image repository configured for the installation. + The repository can also be overridden per Attestor or + Attestation. + type: string + required: + default: true + description: Required validates that images are verified + i.e. have matched passed a signature or attestation + check. + type: boolean + verifyDigest: + default: true + description: VerifyDigest validates that images have a + digest. + type: boolean + type: object + type: array + type: object + type: array + schemaValidation: + description: SchemaValidation skips validation checks for policies + as well as patched resources. Optional. The default value is set + to "true", it must be set to "false" to disable the validation checks. + type: boolean + validationFailureAction: + default: audit + description: ValidationFailureAction defines if a validation policy + rule violation should block the admission review request (enforce), + or allow (audit) the admission review request and report an error + in a policy report. Optional. Allowed values are audit or enforce. + The default value is "audit". + enum: + - audit + - enforce + type: string + validationFailureActionOverrides: + description: ValidationFailureActionOverrides is a Cluster Policy + attribute that specifies ValidationFailureAction namespace-wise. + It overrides ValidationFailureAction for the specified namespaces. + items: + properties: + action: + description: ValidationFailureAction defines the policy validation + failure action + enum: + - audit + - enforce + type: string + namespaces: + items: + type: string + type: array + type: object + type: array + webhookTimeoutSeconds: + description: WebhookTimeoutSeconds specifies the maximum time in seconds + allowed to apply this policy. After the configured time expires, + the admission request may fail, or may simply ignore the policy + results, based on the failure policy. The default timeout is 10s, + the value must be between 1 and 30 seconds. + format: int32 + type: integer + type: object + status: + description: Status contains policy runtime data. + properties: + autogen: + description: Autogen contains autogen status information + properties: + rules: + description: Rules is a list of Rule instances. It contains auto + generated rules added for pod controllers + items: + description: Rule defines a validation, mutation, or generation + control for matching resources. Each rules contains a match + declaration to select resources, and an optional exclude declaration + to specify which resources to exclude. + properties: + context: + description: Context defines variables and data sources + that can be used during rule execution. + items: + description: ContextEntry adds variables and data sources + to a rule Context. Either a ConfigMap reference or a + APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request to the + Kubernetes API server. The JSON data retrieved is + stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON Match + Expression that can be used to transform the + JSON response returned from the API server. + For example a JMESPath of "items | length(@)" + applied to the API server response to the URLPath + "/apis/apps/v1/deployments" will return the + total count of deployments across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to be used + in the HTTP GET request to the Kubernetes API + server (e.g. "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests to an + OCI/Docker V2 registry to fetch image details. + properties: + jmesPath: + description: JMESPath is an optional JSON Match + Expression that can be used to transform the + ImageData struct returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference to + a container image in the registry. Example: + ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath + context variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take if the + JMESPath expression evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform the + variable. + type: string + value: + description: Value is any arbitrary JSON object + representable in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this policy rule + should not be applied. The exclude criteria can include + resource information (e.g. kind, name, namespace, labels) + and admission review request information like the name + or role. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. Requires + at least one tag to be specified when under MatchResources. + Specifying ResourceDescription directly under match + is being deprecated. Please specify under "any" or + "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation keys + and values support the wildcard characters "*" + (matches zero or many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated in + favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key and + value but does not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the wildcard + characters `*` (matches zero or many characters) + and `?` (matches one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] matches any + key and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role names + for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names like + users, user groups, and service accounts. + items: + description: Subject contains a reference to the object + or user identities a role binding applies to. This + can either hold a direct API object reference, or + a value for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of the + referenced subject. Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as "User" + or "Group", and this value is not empty the + Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + generate: + description: Generation is used to create new resources. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + clone: + description: Clone specifies the source resource used + to populate each generated resource. At most one of + Data or Clone can be specified. If neither are provided, + the generated resource will be created with default + data only. + properties: + name: + description: Name specifies name of the resource. + type: string + namespace: + description: Namespace specifies source resource + namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list of source + resource used to populate each generated resource. + properties: + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source resource + namespace. + type: string + selector: + description: Selector is a label selector. Label + keys and values in `matchLabels`. wildcard characters + are not supported. + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource declaration + used to populate each generated resource. At most + one of Data or Clone must be specified. If neither + are provided, the generated resource will be created + with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + synchronize: + description: Synchronize controls if generated resources + should be kept in-sync with their source resource. + If Synchronize is set to "true" changes to generated + resources will be overwritten with resource data from + Data or the resource specified in the Clone declaration. + Optional. Defaults to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name of the field + within 'path' that will be used to uniquely identify + an image. Note - this field MUST be unique. + type: string + name: + description: Name is the entry the image will be + available under 'images.' in the context. + If this field is not defined, image entries will + appear under 'images.custom'. + type: string + path: + description: Path is the path to the object containing + the image field in a custom resource. It should + be slash-separated. Each slash-separated key must + be a valid YAML key or a wildcard '*'. Wildcard + keys are expanded in case of arrays or objects. + type: string + value: + description: Value is an optional name of the field + within 'path' that points to the image URI. This + is useful when a custom 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping from kinds + to ImageExtractorConfigs. This config is only valid for + verifyImages rules. + type: object + match: + description: MatchResources defines when this policy rule + should be applied. The match criteria can include resource + information (e.g. kind, name, namespace, labels) and admission + review request information like the user name or role. + At least one kind is required. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. Requires + at least one tag to be specified when under MatchResources. + Specifying ResourceDescription directly under match + is being deprecated. Please specify under "any" or + "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation keys + and values support the wildcard characters "*" + (matches zero or many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated in + favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key and + value but does not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the wildcard + characters `*` (matches zero or many characters) + and `?` (matches one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] matches any + key and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role names + for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names like + users, user groups, and service accounts. + items: + description: Subject contains a reference to the object + or user identities a role binding applies to. This + can either hold a direct API object reference, or + a value for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of the + referenced subject. Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as "User" + or "Group", and this value is not empty the + Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + mutate: + description: Mutation is used to modify matching resources. + properties: + foreach: + description: ForEach applies mutation rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + items: + description: ForEach applies mutation rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and + data sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON + data retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the JSON response + returned from the API server. For + example a JMESPath of "items | length(@)" + applied to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path + to be used in the HTTP GET request + to the Kubernetes API server (e.g. + "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format + used by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch + image details. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the ImageData struct + returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be + defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that the variable + may take if the JMESPath expression + evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional + JMESPath Expression that can be used + to transform the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath expression + that results in one or more elements to which + the validation logic is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is a strategic + merge patch used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC + 6902 JSON Patch declarations used to modify + resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of + the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic merge + patch used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC 6902 JSON + Patch declarations used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target resources to + be mutated. + items: + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the rule, It must + be unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine if a policy + rule should be applied by evaluating a set of conditions. + The declaration can contain nested `any` or `all` statements. + A direct list of conditions (without `any` or `all` statements + is supported for backwards compatibility but will be deprecated + in the next major release. See: https://kyverno.io/docs/writing-policies/preconditions/' + x-kubernetes-preserve-unknown-fields: true + validate: + description: Validation is used to validate matching resources. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must be satisfied + for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used to pass or + fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared + under an `any` or `all` statement. A direct list + of conditions (without `any` or `all` statements) + is also supported for backwards compatibility + but will be deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + foreach: + description: ForEach applies validate rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + items: + description: ForEach applies validate rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must + be satisfied for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and + data sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON + data retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the JSON response + returned from the API server. For + example a JMESPath of "items | length(@)" + applied to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path + to be used in the HTTP GET request + to the Kubernetes API server (e.g. + "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format + used by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch + image details. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the ImageData struct + returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be + defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that the variable + may take if the JMESPath expression + evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional + JMESPath Expression that can be used + to transform the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions used to pass + or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared + under an `any` or `all` statement. A direct + list of conditions (without `any` or `all` + statements) is also supported for backwards + compatibility but will be deprecated in + the next major release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies whether to + use the current list element as the scope for + validation. Defaults to "true" if not specified. + When set to "false", "request.object" is used + as the validation scope within the foreach block + to allow referencing other elements in the subtree. + type: boolean + list: + description: List specifies a JMESPath expression + that results in one or more elements to which + the validation logic is applied. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of + the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions for manifest + verification + properties: + annotationDomain: + description: AnnotationDomain is custom domain of + annotation for message and signature. Default + is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. If the + count is null, all entries must match (a + logical AND). If the count is 1, at least + one entry must match (a logical OR). If + the count contains a value N, then N must + be less than or equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static key, + attributes for keyless verification, or + a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set + of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is + an optional PEM encoded set of + certificates used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions used + for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked and a root + certificate chain is expected + instead. If an empty object is + provided the public instance of + Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted root + certificates. If not provided, + the system roots are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image + signatures. The keys can be directly + specified or can be a variable + reference to a key specified in + a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors and + the count is applied across the + keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use for + signatures and attestations that match + this rule. If specified Repository + will override other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored while + comparing manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional alternate + OCI repository to use for resource bundle reference. + The repository can be overridden per Attestor + or Attestation. + type: string + type: object + message: + description: Message specifies a custom message to be + displayed on failure. + type: string + pattern: + description: Pattern specifies an overlay-style pattern + used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions for Kubernetes + Pod Security admission by specifying exclusions for + Pod Security Standards controls. + properties: + exclude: + description: Exclude specifies the Pod Security + Standard controls to be excluded. + items: + description: PodSecurityStandard specifies the + Pod Security Standard controls to be excluded. + properties: + controlName: + description: 'ControlName specifies the name + of the Pod Security Standard control. See: + https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. + Wildcards (''*'' and ''?'') are allowed. + See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security Standard + level to be applied to workloads. Allowed values + are privileged, baseline, and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod Security Standard + versions that Kubernetes supports. Allowed values + are v1.19, v1.20, v1.21, v1.22, v1.23, v1.24, + v1.25, latest. Defaults to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify image signatures + and mutate them to add a digest + items: + description: ImageVerification validates that images that + match the specified pattern are signed with the supplied + public key. Once the image is verified it is mutated + to include the SHA digest retrieved during the registration. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are certificate-extensions + used for keyless signing. Deprecated. + type: object + annotations: + additionalProperties: + type: string + description: Annotations are used for image verification. + Every specified key-value pair must exist and match + in the verified payload. The payload may contain + other key-value pairs. Deprecated. Use annotations + per Attestor instead. + type: object + attestations: + description: Attestations are optional checks for + signed in-toto Statements used to verify the image. + See https://github.com/in-toto/attestation. Kyverno + fetches signed attestations from the OCI registry + and decodes them into a list of Statement declarations. + items: + description: Attestation are checks for signed in-toto + Statements that are used to verify the image. + See https://github.com/in-toto/attestation. Kyverno + fetches signed attestations from the OCI registry + and decodes them into a list of Statements. + properties: + attestors: + description: Attestors specify the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. If + the count is null, all entries must + match (a logical AND). If the count + is 1, at least one entry must match + (a logical OR). If the count contains + a value N, then N must be less than + or equal to the size of entries, and + at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static + key, attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used + for image verification. Every + specified key-value pair must + exist and match in the verified + payload. The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is a nested + AttestorSet used to specify a + more complex set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is + an optional PEM encoded public + certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates used to + verify + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of + attribute used to verify a Sigstore + keyless attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked and a root + certificate chain is expected + instead. If an empty object + is provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted + root certificates. If not + provided, the system roots + are used. + type: string + subject: + description: Subject is the + verified identity used for + keyless signing, for example + the email address + type: string + type: object + keys: + description: Keys specifies one + or more public keys + properties: + publicKeys: + description: Keys is a set of + X.509 public keys used to + verify image signatures. The + keys can be directly specified + or can be a variable reference + to a key specified in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a + separate staticKey entry (.attestors[*].entries.keys) + within the set of attestors + and the count is applied across + the keys. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use + for signatures and attestations + that match this rule. If specified + Repository will override other + OCI image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used to verify attributes + within a Predicate. If no Conditions are specified + the attestation check is satisfied as long + there are predicates that match the predicate + type. + items: + description: AnyAllConditions consists of + conditions wrapped denoting a logical criteria + to be fulfilled. AnyConditions get fulfilled + when at least one of its sub-conditions + passes. AllConditions get fulfilled only + when all of its sub-conditions pass. + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is + useful for finer control of when an + rule is applied. A condition can reference + object data using JMESPath notation. + Here, all of the conditions need to + pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for conditional + rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is + useful for finer control of when an + rule is applied. A condition can reference + object data using JMESPath notation. + Here, at least one of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for conditional + rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines the type + of Predicate contained within the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required number + of entries that must match. If the count is + null, all entries must match (a logical AND). + If the count is 1, at least one entry must + match (a logical OR). If the count contains + a value N, then N must be less than or equal + to the size of entries, and at least N entries + must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static key, + attributes for keyless verification, or a + nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set of + match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies one + or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is an + optional PEM encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions used + for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked and a root certificate chain + is expected instead. If an empty + object is provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted root + certificates. If not provided, the + system roots are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image + signatures. The keys can be directly + specified or can be a variable reference + to a key specified in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors and + the count is applied across the + keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use for + signatures and attestations that match + this rule. If specified Repository will + override other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + image: + description: 'Image is the image name consisting of + the registry address, repository, image, and tag. + Wildcards (''*'' and ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images. + Deprecated. Use ImageReferences instead.' + type: string + imageReferences: + description: 'ImageReferences is a list of matching + image reference patterns. At least one pattern in + the list must match the image for the rule to apply. + Each image reference consists of a registry address + (defaults to docker.io), repository, image, and + tag (defaults to latest). Wildcards (''*'' and ''?'') + are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + issuer: + description: Issuer is the certificate issuer used + for keyless signing. Deprecated. Use KeylessAttestor + instead. + type: string + key: + description: Key is the PEM encoded public key that + the image or attestation is signed with. Deprecated. + Use StaticKeyAttestor instead. + type: string + mutateDigest: + default: true + description: MutateDigest enables replacement of image + tags with digests. Defaults to true. + type: boolean + repository: + description: Repository is an optional alternate OCI + repository to use for image signatures and attestations + that match this rule. If specified Repository will + override the default OCI image repository configured + for the installation. The repository can also be + overridden per Attestor or Attestation. + type: string + required: + default: true + description: Required validates that images are verified + i.e. have matched passed a signature or attestation + check. + type: boolean + roots: + description: Roots is the PEM encoded Root certificate + chain used for keyless signing Deprecated. Use KeylessAttestor + instead. + type: string + subject: + description: Subject is the identity used for keyless + signing, for example an email address Deprecated. + Use KeylessAttestor instead. + type: string + verifyDigest: + default: true + description: VerifyDigest validates that images have + a digest. + type: boolean + type: object + type: array + type: object + type: array + type: object + conditions: + description: Conditions is a list of conditions that apply to the + policy + items: + description: "Condition contains details for one aspect of the current + state of this API Resource. --- This struct is intended for direct + use as an array at the field path .status.conditions. For example, + \n type FooStatus struct{ // Represents the observations of a + foo's current state. // Known .status.conditions.type are: \"Available\", + \"Progressing\", and \"Degraded\" // +patchMergeKey=type // +patchStrategy=merge + // +listType=map // +listMapKey=type Conditions []metav1.Condition + `json:\"conditions,omitempty\" patchStrategy:\"merge\" patchMergeKey:\"type\" + protobuf:\"bytes,1,rep,name=conditions\"` \n // other fields }" + properties: + lastTransitionTime: + description: lastTransitionTime is the last time the condition + transitioned from one status to another. This should be when + the underlying condition changed. If that is not known, then + using the time when the API field changed is acceptable. + format: date-time + type: string + message: + description: message is a human readable message indicating + details about the transition. This may be an empty string. + maxLength: 32768 + type: string + observedGeneration: + description: observedGeneration represents the .metadata.generation + that the condition was set based upon. For instance, if .metadata.generation + is currently 12, but the .status.conditions[x].observedGeneration + is 9, the condition is out of date with respect to the current + state of the instance. + format: int64 + minimum: 0 + type: integer + reason: + description: reason contains a programmatic identifier indicating + the reason for the condition's last transition. Producers + of specific condition types may define expected values and + meanings for this field, and whether the values are considered + a guaranteed API. The value should be a CamelCase string. + This field may not be empty. + maxLength: 1024 + minLength: 1 + pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$ + type: string + status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown + type: string + type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + --- Many .condition.type values are consistent across resources + like Available, but because arbitrary conditions can be useful + (see .node.status.conditions), the ability to deconflict is + important. The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt) + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ + type: string + required: + - lastTransitionTime + - message + - reason + - status + - type + type: object + type: array + ready: + description: Ready indicates if the policy is ready to serve the admission + request. Deprecated in favor of Conditions + type: boolean + required: + - ready + type: object + required: + - spec + type: object + served: true + storage: false + subresources: + status: {} diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusterpolicyreports.wgpolicyk8s.io.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusterpolicyreports.wgpolicyk8s.io.yaml new file mode 100755 index 0000000..313afbe --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.clusterpolicyreports.wgpolicyk8s.io.yaml @@ -0,0 +1,370 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + config.kubernetes.io/index: "6" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "6" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: clusterpolicyreports.wgpolicyk8s.io +spec: + group: wgpolicyk8s.io + names: + kind: ClusterPolicyReport + listKind: ClusterPolicyReportList + plural: clusterpolicyreports + shortNames: + - cpolr + singular: clusterpolicyreport + scope: Cluster + versions: + - additionalPrinterColumns: + - jsonPath: .scope.kind + name: Kind + priority: 1 + type: string + - jsonPath: .scope.name + name: Name + priority: 1 + type: string + - jsonPath: .summary.pass + name: Pass + type: integer + - jsonPath: .summary.fail + name: Fail + type: integer + - jsonPath: .summary.warn + name: Warn + type: integer + - jsonPath: .summary.error + name: Error + type: integer + - jsonPath: .summary.skip + name: Skip + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + name: v1alpha2 + schema: + openAPIV3Schema: + description: ClusterPolicyReport is the Schema for the clusterpolicyreports + API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + results: + description: PolicyReportResult provides result details + items: + description: PolicyReportResult provides the result for an individual + policy + properties: + category: + description: Category indicates policy category + type: string + message: + description: Description is a short user friendly message for the + policy rule + type: string + policy: + description: Policy is the name or identifier of the policy + type: string + properties: + additionalProperties: + type: string + description: Properties provides additional information for the + policy rule + type: object + resourceSelector: + description: SubjectSelector is an optional label selector for checked + Kubernetes resources. For example, a policy result may apply to + all pods that match a label. Either a Subject or a SubjectSelector + can be specified. If neither are provided, the result is assumed + to be for the policy report scope. + properties: + matchExpressions: + description: matchExpressions is a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector requirement is a selector that + contains values, a key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that the selector applies + to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are In, NotIn, Exists + and DoesNotExist. + type: string + values: + description: values is an array of string values. If the + operator is In or NotIn, the values array must be non-empty. + If the operator is Exists or DoesNotExist, the values + array must be empty. This array is replaced during a + strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} pairs. A single + {key,value} in the matchLabels map is equivalent to an element + of matchExpressions, whose key field is "key", the operator + is "In", and the values array contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + resources: + description: Subjects is an optional reference to the checked Kubernetes + resources + items: + description: "ObjectReference contains enough information to let + you inspect or modify the referred object. --- New uses of this + type are discouraged because of difficulty describing its usage + when embedded in APIs. 1. Ignored fields. It includes many + fields which are not generally honored. For instance, ResourceVersion + and FieldPath are both very rarely valid in actual usage. 2. + Invalid usage help. It is impossible to add specific help for + individual usage. In most embedded usages, there are particular + restrictions like, \"must refer only to types A and B\" or \"UID + not honored\" or \"name must be restricted\". Those cannot be + well described when embedded. 3. Inconsistent validation. Because + the usages are different, the validation rules are different + by usage, which makes it hard for users to predict what will + happen. 4. The fields are both imprecise and overly precise. + \ Kind is not a precise mapping to a URL. This can produce ambiguity + during interpretation and require a REST mapping. In most cases, + the dependency is on the group,resource tuple and the version + of the actual struct is irrelevant. 5. We cannot easily change + it. Because this type is embedded in many locations, updates + to this type will affect numerous schemas. Don't make new APIs + embed an underspecified API type they do not control. \n Instead + of using this type, create a locally provided and used type + that is well-focused on your reference. For example, ServiceReferences + for admission registration: https://github.com/kubernetes/api/blob/release-1.17/admissionregistration/v1/types.go#L533 + ." + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an object instead + of an entire object, this string should contain a valid + JSON/Go field access statement, such as desiredState.manifest.containers[2]. + For example, if the object reference is to a container within + a pod, this would take on a value like: "spec.containers{name}" + (where "name" refers to the name of the container that triggered + the event) or if no container name is specified "spec.containers[2]" + (container with index 2 in this pod). This syntax is chosen + only to have some well-defined way of referencing a part + of an object. TODO: this design is not final and this field + is subject to change in the future.' + type: string + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to which this reference + is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + type: array + result: + description: Result indicates the outcome of the policy rule execution + enum: + - pass + - fail + - warn + - error + - skip + type: string + rule: + description: Rule is the name or identifier of the rule within the + policy + type: string + scored: + description: Scored indicates if this result is scored + type: boolean + severity: + description: Severity indicates policy check result criticality + enum: + - critical + - high + - low + - medium + - info + type: string + source: + description: Source is an identifier for the policy engine that + manages this report + type: string + timestamp: + description: Timestamp indicates the time the result was found + properties: + nanos: + description: Non-negative fractions of a second at nanosecond + resolution. Negative second values with fractions must still + have non-negative nanos values that count forward in time. + Must be from 0 to 999,999,999 inclusive. This field may be + limited in precision depending on context. + format: int32 + type: integer + seconds: + description: Represents seconds of UTC time since Unix epoch + 1970-01-01T00:00:00Z. Must be from 0001-01-01T00:00:00Z to + 9999-12-31T23:59:59Z inclusive. + format: int64 + type: integer + required: + - nanos + - seconds + type: object + required: + - policy + type: object + type: array + scope: + description: Scope is an optional reference to the report scope (e.g. + a Deployment, Namespace, or Node) + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an object instead of an entire + object, this string should contain a valid JSON/Go field access + statement, such as desiredState.manifest.containers[2]. For example, + if the object reference is to a container within a pod, this would + take on a value like: "spec.containers{name}" (where "name" refers + to the name of the container that triggered the event) or if no + container name is specified "spec.containers[2]" (container with + index 2 in this pod). This syntax is chosen only to have some well-defined + way of referencing a part of an object. TODO: this design is not + final and this field is subject to change in the future.' + type: string + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to which this reference is + made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + scopeSelector: + description: ScopeSelector is an optional selector for multiple scopes + (e.g. Pods). Either one of, or none of, but not both of, Scope or ScopeSelector + should be specified. + properties: + matchExpressions: + description: matchExpressions is a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector requirement is a selector that contains + values, a key, and an operator that relates the key and values. + properties: + key: + description: key is the label key that the selector applies + to. + type: string + operator: + description: operator represents a key's relationship to a set + of values. Valid operators are In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string values. If the operator + is In or NotIn, the values array must be non-empty. If the + operator is Exists or DoesNotExist, the values array must + be empty. This array is replaced during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} pairs. A single {key,value} + in the matchLabels map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", and the values array + contains only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + summary: + description: PolicyReportSummary provides a summary of results + properties: + error: + description: Error provides the count of policies that could not be + evaluated + type: integer + fail: + description: Fail provides the count of policies whose requirements + were not met + type: integer + pass: + description: Pass provides the count of policies whose requirements + were met + type: integer + skip: + description: Skip indicates the count of policies that were not selected + for evaluation + type: integer + warn: + description: Warn provides the count of non-scored policies whose + requirements were not met + type: integer + type: object + type: object + served: true + storage: true + subresources: {} diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.generaterequests.kyverno.io.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.generaterequests.kyverno.io.yaml new file mode 100755 index 0000000..0739a00 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.generaterequests.kyverno.io.yaml @@ -0,0 +1,191 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + config.kubernetes.io/index: "7" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "7" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: generaterequests.kyverno.io +spec: + group: kyverno.io + names: + kind: GenerateRequest + listKind: GenerateRequestList + plural: generaterequests + shortNames: + - gr + singular: generaterequest + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .spec.policy + name: Policy + type: string + - jsonPath: .spec.resource.kind + name: ResourceKind + type: string + - jsonPath: .spec.resource.name + name: ResourceName + type: string + - jsonPath: .spec.resource.namespace + name: ResourceNamespace + type: string + - jsonPath: .status.state + name: status + type: string + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + name: v1 + schema: + openAPIV3Schema: + description: GenerateRequest is a request to process generate rule. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: Spec is the information to identify the generate request. + properties: + context: + description: Context ... + properties: + admissionRequestInfo: + description: AdmissionRequestInfoObject stores the admission request + and operation details + properties: + admissionRequest: + type: string + operation: + description: Operation is the type of resource operation being + checked for admission control + type: string + type: object + userInfo: + description: RequestInfo contains permission info carried in an + admission request. + properties: + clusterRoles: + description: ClusterRoles is a list of possible clusterRoles + send the request. + items: + type: string + nullable: true + type: array + roles: + description: Roles is a list of possible role send the request. + items: + type: string + nullable: true + type: array + userInfo: + description: UserInfo is the userInfo carried in the admission + request. + properties: + extra: + additionalProperties: + description: ExtraValue masks the value so protobuf + can generate + items: + type: string + type: array + description: Any additional information provided by the + authenticator. + type: object + groups: + description: The names of groups this user is a part of. + items: + type: string + type: array + uid: + description: A unique value that identifies this user + across time. If this user is deleted and another user + by the same name is added, they will have different + UIDs. + type: string + username: + description: The name that uniquely identifies this user + among all active users. + type: string + type: object + type: object + type: object + policy: + description: Specifies the name of the policy. + type: string + resource: + description: ResourceSpec is the information to identify the generate + request. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + required: + - context + - policy + - resource + type: object + status: + description: Status contains statistics related to generate request. + properties: + generatedResources: + description: This will track the resources that are generated by the + generate Policy. Will be used during clean up resources. + items: + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + type: array + message: + description: Specifies request status message. + type: string + state: + description: State represents state of the generate request. + type: string + required: + - state + type: object + required: + - spec + type: object + served: true + storage: true + subresources: + status: {} diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.policies.kyverno.io.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.policies.kyverno.io.yaml new file mode 100755 index 0000000..8b0505e --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.policies.kyverno.io.yaml @@ -0,0 +1,11934 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + config.kubernetes.io/index: "8" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "8" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: policies.kyverno.io +spec: + group: kyverno.io + names: + categories: + - kyverno + - all + kind: Policy + listKind: PolicyList + plural: policies + shortNames: + - pol + singular: policy + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .spec.background + name: Background + type: boolean + - jsonPath: .spec.validationFailureAction + name: Validate Action + type: string + - jsonPath: .spec.failurePolicy + name: Failure Policy + priority: 1 + type: string + - jsonPath: .status.ready + name: Ready + type: boolean + name: v1 + schema: + openAPIV3Schema: + description: 'Policy declares validation, mutation, and generation behaviors + for matching resources. See: https://kyverno.io/docs/writing-policies/ for + more information.' + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: Spec defines policy behaviors and contains one or more rules. + properties: + applyRules: + description: ApplyRules controls how rules in a policy are applied. + Rule are processed in the order of declaration. When set to `One` + processing stops after a rule has been applied i.e. the rule matches + and results in a pass, fail, or error. When set to `All` all rules + in the policy are processed. The default is `All`. + enum: + - All + - One + type: string + background: + default: true + description: Background controls if rules are applied to existing + resources during a background scan. Optional. Default value is "true". + The value must be set to "false" if the policy rule uses variables + that are only available in the admission review request (e.g. user + name). + type: boolean + failurePolicy: + description: FailurePolicy defines how unexpected policy errors and + webhook response timeout errors are handled. Rules within the same + policy share the same failure behavior. Allowed values are Ignore + or Fail. Defaults to Fail. + enum: + - Ignore + - Fail + type: string + generateExistingOnPolicyUpdate: + description: GenerateExistingOnPolicyUpdate controls whether to trigger + generate rule in existing resources If is set to "true" generate + rule will be triggered and applied to existing matched resources. + Defaults to "false" if not specified. + type: boolean + mutateExistingOnPolicyUpdate: + description: MutateExistingOnPolicyUpdate controls if a mutateExisting + policy is applied on policy events. Default value is "false". + type: boolean + rules: + description: Rules is a list of Rule instances. A Policy contains + multiple rules and each rule can validate, mutate, or generate resources. + items: + description: Rule defines a validation, mutation, or generation + control for matching resources. Each rules contains a match declaration + to select resources, and an optional exclude declaration to specify + which resources to exclude. + properties: + context: + description: Context defines variables and data sources that + can be used during rule execution. + items: + description: ContextEntry adds variables and data sources + to a rule Context. Either a ConfigMap reference or a APILookup + must be provided. + properties: + apiCall: + description: APICall defines an HTTP request to the Kubernetes + API server. The JSON data retrieved is stored in the + context. + properties: + jmesPath: + description: JMESPath is an optional JSON Match Expression + that can be used to transform the JSON response + returned from the API server. For example a JMESPath + of "items | length(@)" applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments across + all namespaces. + type: string + urlPath: + description: URLPath is the URL path to be used in + the HTTP GET request to the Kubernetes API server + (e.g. "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format used by the + `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests to an OCI/Docker + V2 registry to fetch image details. + properties: + jmesPath: + description: JMESPath is an optional JSON Match Expression + that can be used to transform the ImageData struct + returned as a result of processing the image reference. + type: string + reference: + description: 'Reference is image reference to a container + image in the registry. Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath context + variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary JSON + object that the variable may take if the JMESPath + expression evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath Expression + that can be used to transform the variable. + type: string + value: + description: Value is any arbitrary JSON object representable + in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this policy rule + should not be applied. The exclude criteria can include resource + information (e.g. kind, name, namespace, labels) and admission + review request information like the name or role. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide role + names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information about + the resource being created or modified. Requires at least + one tag to be specified when under MatchResources. Specifying + ResourceDescription directly under match is being deprecated. + Please specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations (key-value + pairs of type string). Annotation keys and values + support the wildcard characters "*" (matches zero + or many characters) and "?" (matches at least one + character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. The + name supports wildcard characters "*" (matches zero + or many characters) and "?" (at least one character). + NOTE: "Name" is being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. Each + name supports wildcard characters "*" (matches zero + or many characters) and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters `*` + (matches zero or many characters) and `?` (matches + one character).Wildcards allows writing label selectors + like ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not match + an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are ANDed. + items: + description: A label selector requirement is a + selector that contains values, a key, and an + operator that relates the key and values. + properties: + key: + description: key is the label key that the + selector applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. If the + operator is Exists or DoesNotExist, the + values array must be empty. This array is + replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", + and the values array contains only "value". The + requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces names. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label keys + and values in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` (matches + one character). Wildcards allows writing label selectors + like ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not match + an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are ANDed. + items: + description: A label selector requirement is a + selector that contains values, a key, and an + operator that relates the key and values. + properties: + key: + description: key is the label key that the + selector applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. If the + operator is Exists or DoesNotExist, the + values array must be empty. This array is + replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", + and the values array contains only "value". The + requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role names + for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names like + users, user groups, and service accounts. + items: + description: Subject contains a reference to the object + or user identities a role binding applies to. This + can either hold a direct API object reference, or a + value for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of the referenced + subject. Defaults to "" for ServiceAccount subjects. + Defaults to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. Values + defined by this API group are "User", "Group", and + "ServiceAccount". If the Authorizer does not recognized + the kind value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as "User" + or "Group", and this value is not empty the Authorizer + should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + generate: + description: Generation is used to create new resources. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + clone: + description: Clone specifies the source resource used to + populate each generated resource. At most one of Data + or Clone can be specified. If neither are provided, the + generated resource will be created with default data only. + properties: + name: + description: Name specifies name of the resource. + type: string + namespace: + description: Namespace specifies source resource namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list of source resource + used to populate each generated resource. + properties: + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source resource namespace. + type: string + selector: + description: Selector is a label selector. Label keys + and values in `matchLabels`. wildcard characters are + not supported. + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are ANDed. + items: + description: A label selector requirement is a + selector that contains values, a key, and an + operator that relates the key and values. + properties: + key: + description: key is the label key that the + selector applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. If the + operator is Exists or DoesNotExist, the + values array must be empty. This array is + replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", + and the values array contains only "value". The + requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource declaration used + to populate each generated resource. At most one of Data + or Clone must be specified. If neither are provided, the + generated resource will be created with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + synchronize: + description: Synchronize controls if generated resources + should be kept in-sync with their source resource. If + Synchronize is set to "true" changes to generated resources + will be overwritten with resource data from Data or the + resource specified in the Clone declaration. Optional. + Defaults to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name of the field within + 'path' that will be used to uniquely identify an image. + Note - this field MUST be unique. + type: string + name: + description: Name is the entry the image will be available + under 'images.' in the context. If this field + is not defined, image entries will appear under 'images.custom'. + type: string + path: + description: Path is the path to the object containing + the image field in a custom resource. It should be + slash-separated. Each slash-separated key must be + a valid YAML key or a wildcard '*'. Wildcard keys + are expanded in case of arrays or objects. + type: string + value: + description: Value is an optional name of the field + within 'path' that points to the image URI. This is + useful when a custom 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping from kinds to + ImageExtractorConfigs. This config is only valid for verifyImages + rules. + type: object + match: + description: MatchResources defines when this policy rule should + be applied. The match criteria can include resource information + (e.g. kind, name, namespace, labels) and admission review + request information like the user name or role. At least one + kind is required. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide role + names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information about + the resource being created or modified. Requires at least + one tag to be specified when under MatchResources. Specifying + ResourceDescription directly under match is being deprecated. + Please specify under "any" or "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations (key-value + pairs of type string). Annotation keys and values + support the wildcard characters "*" (matches zero + or many characters) and "?" (matches at least one + character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. The + name supports wildcard characters "*" (matches zero + or many characters) and "?" (at least one character). + NOTE: "Name" is being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. Each + name supports wildcard characters "*" (matches zero + or many characters) and "?" (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters `*` + (matches zero or many characters) and `?` (matches + one character).Wildcards allows writing label selectors + like ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not match + an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are ANDed. + items: + description: A label selector requirement is a + selector that contains values, a key, and an + operator that relates the key and values. + properties: + key: + description: key is the label key that the + selector applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. If the + operator is Exists or DoesNotExist, the + values array must be empty. This array is + replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", + and the values array contains only "value". The + requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces names. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label keys + and values in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` (matches + one character). Wildcards allows writing label selectors + like ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not match + an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are ANDed. + items: + description: A label selector requirement is a + selector that contains values, a key, and an + operator that relates the key and values. + properties: + key: + description: key is the label key that the + selector applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. If the + operator is Exists or DoesNotExist, the + values array must be empty. This array is + replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", + and the values array contains only "value". The + requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role names + for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names like + users, user groups, and service accounts. + items: + description: Subject contains a reference to the object + or user identities a role binding applies to. This + can either hold a direct API object reference, or a + value for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of the referenced + subject. Defaults to "" for ServiceAccount subjects. + Defaults to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. Values + defined by this API group are "User", "Group", and + "ServiceAccount". If the Authorizer does not recognized + the kind value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as "User" + or "Group", and this value is not empty the Authorizer + should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + mutate: + description: Mutation is used to modify matching resources. + properties: + foreach: + description: ForEach applies mutation rules to a list of + sub-elements by creating a context for each entry in the + list and looping over it to apply the specified logic. + items: + description: ForEach applies mutation rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + context: + description: Context defines variables and data sources + that can be used during rule execution. + items: + description: ContextEntry adds variables and data + sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON data + retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the JSON response returned from the API + server. For example a JMESPath of "items + | length(@)" applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to + be used in the HTTP GET request to the + Kubernetes API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). The + format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the ImageData struct returned as a result + of processing the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath + context variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take + if the JMESPath expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary JSON + object representable in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath expression + that results in one or more elements to which the + validation logic is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is a strategic merge + patch used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC 6902 + JSON Patch declarations used to modify resources. + See https://tools.ietf.org/html/rfc6902 and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, all of the conditions need to + pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, at least one of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic merge patch + used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC 6902 JSON + Patch declarations used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target resources to be + mutated. + items: + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the rule, It must be + unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine if a policy + rule should be applied by evaluating a set of conditions. + The declaration can contain nested `any` or `all` statements. + A direct list of conditions (without `any` or `all` statements + is supported for backwards compatibility but will be deprecated + in the next major release. See: https://kyverno.io/docs/writing-policies/preconditions/' + x-kubernetes-preserve-unknown-fields: true + validate: + description: Validation is used to validate matching resources. + properties: + anyPattern: + description: AnyPattern specifies list of validation patterns. + At least one of the patterns must be satisfied for the + validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used to pass or fail + a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared under + an `any` or `all` statement. A direct list of conditions + (without `any` or `all` statements) is also supported + for backwards compatibility but will be deprecated + in the next major release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + foreach: + description: ForEach applies validate rules to a list of + sub-elements by creating a context for each entry in the + list and looping over it to apply the specified logic. + items: + description: ForEach applies validate rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must be satisfied + for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables and data sources + that can be used during rule execution. + items: + description: ContextEntry adds variables and data + sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON data + retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the JSON response returned from the API + server. For example a JMESPath of "items + | length(@)" applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to + be used in the HTTP GET request to the + Kubernetes API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). The + format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the ImageData struct returned as a result + of processing the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath + context variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take + if the JMESPath expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary JSON + object representable in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions used to pass + or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared + under an `any` or `all` statement. A direct + list of conditions (without `any` or `all` statements) + is also supported for backwards compatibility + but will be deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies whether to use + the current list element as the scope for validation. + Defaults to "true" if not specified. When set to + "false", "request.object" is used as the validation + scope within the foreach block to allow referencing + other elements in the subtree. + type: boolean + list: + description: List specifies a JMESPath expression + that results in one or more elements to which the + validation logic is applied. + type: string + pattern: + description: Pattern specifies an overlay-style pattern + used to check resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, all of the conditions need to + pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, at least one of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions for manifest + verification + properties: + annotationDomain: + description: AnnotationDomain is custom domain of annotation + for message and signature. Default is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required number + of entries that must match. If the count is + null, all entries must match (a logical AND). + If the count is 1, at least one entry must match + (a logical OR). If the count contains a value + N, then N must be less than or equal to the + size of entries, and at least N entries must + match. + minimum: 1 + type: integer + entries: + description: Entries contains the available attestors. + An attestor can be a static key, attributes + for keyless verification, or a nested attestor + declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for image + verification. Every specified key-value + pair must exist and match in the verified + payload. The payload may contain other + key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set of + match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies one + or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is an + optional PEM encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are + certificate-extensions used for keyless + signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked and a root certificate chain + is expected instead. If an empty object + is provided the public instance of + Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional set + of PEM encoded trusted root certificates. + If not provided, the system roots + are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image signatures. + The keys can be directly specified + or can be a variable reference to + a key specified in a ConfigMap (see + https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified each + key is processed as a separate staticKey + entry (.attestors[*].entries.keys) + within the set of attestors and the + count is applied across the keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional alternate + OCI repository to use for signatures and + attestations that match this rule. If + specified Repository will override other + OCI image repository locations for this + Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored while comparing + manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional alternate OCI + repository to use for resource bundle reference. The + repository can be overridden per Attestor or Attestation. + type: string + type: object + message: + description: Message specifies a custom message to be displayed + on failure. + type: string + pattern: + description: Pattern specifies an overlay-style pattern + used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions for Kubernetes + Pod Security admission by specifying exclusions for Pod + Security Standards controls. + properties: + exclude: + description: Exclude specifies the Pod Security Standard + controls to be excluded. + items: + description: PodSecurityStandard specifies the Pod + Security Standard controls to be excluded. + properties: + controlName: + description: 'ControlName specifies the name of + the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. Wildcards (''*'' and + ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security Standard + level to be applied to workloads. Allowed values are + privileged, baseline, and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod Security Standard + versions that Kubernetes supports. Allowed values + are v1.19, v1.20, v1.21, v1.22, v1.23, v1.24, v1.25, + latest. Defaults to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify image signatures + and mutate them to add a digest + items: + description: ImageVerification validates that images that + match the specified pattern are signed with the supplied + public key. Once the image is verified it is mutated to + include the SHA digest retrieved during the registration. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are certificate-extensions + used for keyless signing. Deprecated. + type: object + annotations: + additionalProperties: + type: string + description: Annotations are used for image verification. + Every specified key-value pair must exist and match + in the verified payload. The payload may contain other + key-value pairs. Deprecated. Use annotations per Attestor + instead. + type: object + attestations: + description: Attestations are optional checks for signed + in-toto Statements used to verify the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations from the OCI registry + and decodes them into a list of Statement declarations. + items: + description: Attestation are checks for signed in-toto + Statements that are used to verify the image. See + https://github.com/in-toto/attestation. Kyverno fetches + signed attestations from the OCI registry and decodes + them into a list of Statements. + properties: + attestors: + description: Attestors specify the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. If the + count is null, all entries must match (a + logical AND). If the count is 1, at least + one entry must match (a logical OR). If + the count contains a value N, then N must + be less than or equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static key, + attributes for keyless verification, or + a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set + of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is + an optional PEM encoded set of + certificates used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions used + for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked and a root + certificate chain is expected + instead. If an empty object is + provided the public instance of + Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted root + certificates. If not provided, + the system roots are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image + signatures. The keys can be directly + specified or can be a variable + reference to a key specified in + a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors and + the count is applied across the + keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use for + signatures and attestations that match + this rule. If specified Repository + will override other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used to verify attributes + within a Predicate. If no Conditions are specified + the attestation check is satisfied as long there + are predicates that match the predicate type. + items: + description: AnyAllConditions consists of conditions + wrapped denoting a logical criteria to be fulfilled. + AnyConditions get fulfilled when at least one + of its sub-conditions passes. AllConditions + get fulfilled only when all of its sub-conditions + pass. + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of + the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines the type of Predicate + contained within the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required number + of entries that must match. If the count is null, + all entries must match (a logical AND). If the + count is 1, at least one entry must match (a logical + OR). If the count contains a value N, then N must + be less than or equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available attestors. + An attestor can be a static key, attributes for + keyless verification, or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for image + verification. Every specified key-value + pair must exist and match in the verified + payload. The payload may contain other key-value + pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set of match + authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies one or + more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is an optional + PEM encoded set of certificates used + to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not checked. + If an empty object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address of + the transparency log. Defaults to + the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are + certificate-extensions used for keyless + signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not checked + and a root certificate chain is expected + instead. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address of + the transparency log. Defaults to + the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional set + of PEM encoded trusted root certificates. + If not provided, the system roots are + used. + type: string + subject: + description: Subject is the verified identity + used for keyless signing, for example + the email address + type: string + type: object + keys: + description: Keys specifies one or more public + keys + properties: + publicKeys: + description: Keys is a set of X.509 public + keys used to verify image signatures. + The keys can be directly specified or + can be a variable reference to a key + specified in a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified each + key is processed as a separate staticKey + entry (.attestors[*].entries.keys) within + the set of attestors and the count is + applied across the keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not checked. + If an empty object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address of + the transparency log. Defaults to + the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional alternate + OCI repository to use for signatures and + attestations that match this rule. If specified + Repository will override other OCI image + repository locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + image: + description: 'Image is the image name consisting of the + registry address, repository, image, and tag. Wildcards + (''*'' and ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images. + Deprecated. Use ImageReferences instead.' + type: string + imageReferences: + description: 'ImageReferences is a list of matching image + reference patterns. At least one pattern in the list + must match the image for the rule to apply. Each image + reference consists of a registry address (defaults to + docker.io), repository, image, and tag (defaults to + latest). Wildcards (''*'' and ''?'') are allowed. See: + https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + issuer: + description: Issuer is the certificate issuer used for + keyless signing. Deprecated. Use KeylessAttestor instead. + type: string + key: + description: Key is the PEM encoded public key that the + image or attestation is signed with. Deprecated. Use + StaticKeyAttestor instead. + type: string + mutateDigest: + default: true + description: MutateDigest enables replacement of image + tags with digests. Defaults to true. + type: boolean + repository: + description: Repository is an optional alternate OCI repository + to use for image signatures and attestations that match + this rule. If specified Repository will override the + default OCI image repository configured for the installation. + The repository can also be overridden per Attestor or + Attestation. + type: string + required: + default: true + description: Required validates that images are verified + i.e. have matched passed a signature or attestation + check. + type: boolean + roots: + description: Roots is the PEM encoded Root certificate + chain used for keyless signing Deprecated. Use KeylessAttestor + instead. + type: string + subject: + description: Subject is the identity used for keyless + signing, for example an email address Deprecated. Use + KeylessAttestor instead. + type: string + verifyDigest: + default: true + description: VerifyDigest validates that images have a + digest. + type: boolean + type: object + type: array + type: object + type: array + schemaValidation: + description: SchemaValidation skips validation checks for policies + as well as patched resources. Optional. The default value is set + to "true", it must be set to "false" to disable the validation checks. + type: boolean + validationFailureAction: + default: audit + description: ValidationFailureAction defines if a validation policy + rule violation should block the admission review request (enforce), + or allow (audit) the admission review request and report an error + in a policy report. Optional. Allowed values are audit or enforce. + The default value is "audit". + enum: + - audit + - enforce + type: string + validationFailureActionOverrides: + description: ValidationFailureActionOverrides is a Cluster Policy + attribute that specifies ValidationFailureAction namespace-wise. + It overrides ValidationFailureAction for the specified namespaces. + items: + properties: + action: + description: ValidationFailureAction defines the policy validation + failure action + enum: + - audit + - enforce + type: string + namespaces: + items: + type: string + type: array + type: object + type: array + webhookTimeoutSeconds: + description: WebhookTimeoutSeconds specifies the maximum time in seconds + allowed to apply this policy. After the configured time expires, + the admission request may fail, or may simply ignore the policy + results, based on the failure policy. The default timeout is 10s, + the value must be between 1 and 30 seconds. + format: int32 + type: integer + type: object + status: + description: Status contains policy runtime information. Deprecated. Policy + metrics are available via the metrics endpoint + properties: + autogen: + description: Autogen contains autogen status information + properties: + rules: + description: Rules is a list of Rule instances. It contains auto + generated rules added for pod controllers + items: + description: Rule defines a validation, mutation, or generation + control for matching resources. Each rules contains a match + declaration to select resources, and an optional exclude declaration + to specify which resources to exclude. + properties: + context: + description: Context defines variables and data sources + that can be used during rule execution. + items: + description: ContextEntry adds variables and data sources + to a rule Context. Either a ConfigMap reference or a + APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request to the + Kubernetes API server. The JSON data retrieved is + stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON Match + Expression that can be used to transform the + JSON response returned from the API server. + For example a JMESPath of "items | length(@)" + applied to the API server response to the URLPath + "/apis/apps/v1/deployments" will return the + total count of deployments across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to be used + in the HTTP GET request to the Kubernetes API + server (e.g. "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests to an + OCI/Docker V2 registry to fetch image details. + properties: + jmesPath: + description: JMESPath is an optional JSON Match + Expression that can be used to transform the + ImageData struct returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference to + a container image in the registry. Example: + ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath + context variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take if the + JMESPath expression evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform the + variable. + type: string + value: + description: Value is any arbitrary JSON object + representable in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this policy rule + should not be applied. The exclude criteria can include + resource information (e.g. kind, name, namespace, labels) + and admission review request information like the name + or role. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. Requires + at least one tag to be specified when under MatchResources. + Specifying ResourceDescription directly under match + is being deprecated. Please specify under "any" or + "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation keys + and values support the wildcard characters "*" + (matches zero or many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated in + favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key and + value but does not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the wildcard + characters `*` (matches zero or many characters) + and `?` (matches one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] matches any + key and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role names + for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names like + users, user groups, and service accounts. + items: + description: Subject contains a reference to the object + or user identities a role binding applies to. This + can either hold a direct API object reference, or + a value for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of the + referenced subject. Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as "User" + or "Group", and this value is not empty the + Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + generate: + description: Generation is used to create new resources. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + clone: + description: Clone specifies the source resource used + to populate each generated resource. At most one of + Data or Clone can be specified. If neither are provided, + the generated resource will be created with default + data only. + properties: + name: + description: Name specifies name of the resource. + type: string + namespace: + description: Namespace specifies source resource + namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list of source + resource used to populate each generated resource. + properties: + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source resource + namespace. + type: string + selector: + description: Selector is a label selector. Label + keys and values in `matchLabels`. wildcard characters + are not supported. + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource declaration + used to populate each generated resource. At most + one of Data or Clone must be specified. If neither + are provided, the generated resource will be created + with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + synchronize: + description: Synchronize controls if generated resources + should be kept in-sync with their source resource. + If Synchronize is set to "true" changes to generated + resources will be overwritten with resource data from + Data or the resource specified in the Clone declaration. + Optional. Defaults to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name of the field + within 'path' that will be used to uniquely identify + an image. Note - this field MUST be unique. + type: string + name: + description: Name is the entry the image will be + available under 'images.' in the context. + If this field is not defined, image entries will + appear under 'images.custom'. + type: string + path: + description: Path is the path to the object containing + the image field in a custom resource. It should + be slash-separated. Each slash-separated key must + be a valid YAML key or a wildcard '*'. Wildcard + keys are expanded in case of arrays or objects. + type: string + value: + description: Value is an optional name of the field + within 'path' that points to the image URI. This + is useful when a custom 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping from kinds + to ImageExtractorConfigs. This config is only valid for + verifyImages rules. + type: object + match: + description: MatchResources defines when this policy rule + should be applied. The match criteria can include resource + information (e.g. kind, name, namespace, labels) and admission + review request information like the user name or role. + At least one kind is required. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. Requires + at least one tag to be specified when under MatchResources. + Specifying ResourceDescription directly under match + is being deprecated. Please specify under "any" or + "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation keys + and values support the wildcard characters "*" + (matches zero or many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated in + favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key and + value but does not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the wildcard + characters `*` (matches zero or many characters) + and `?` (matches one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] matches any + key and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role names + for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names like + users, user groups, and service accounts. + items: + description: Subject contains a reference to the object + or user identities a role binding applies to. This + can either hold a direct API object reference, or + a value for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of the + referenced subject. Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as "User" + or "Group", and this value is not empty the + Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + mutate: + description: Mutation is used to modify matching resources. + properties: + foreach: + description: ForEach applies mutation rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + items: + description: ForEach applies mutation rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and + data sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON + data retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the JSON response + returned from the API server. For + example a JMESPath of "items | length(@)" + applied to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path + to be used in the HTTP GET request + to the Kubernetes API server (e.g. + "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format + used by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch + image details. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the ImageData struct + returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be + defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that the variable + may take if the JMESPath expression + evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional + JMESPath Expression that can be used + to transform the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath expression + that results in one or more elements to which + the validation logic is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is a strategic + merge patch used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC + 6902 JSON Patch declarations used to modify + resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of + the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic merge + patch used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC 6902 JSON + Patch declarations used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target resources to + be mutated. + items: + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the rule, It must + be unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine if a policy + rule should be applied by evaluating a set of conditions. + The declaration can contain nested `any` or `all` statements. + A direct list of conditions (without `any` or `all` statements + is supported for backwards compatibility but will be deprecated + in the next major release. See: https://kyverno.io/docs/writing-policies/preconditions/' + x-kubernetes-preserve-unknown-fields: true + validate: + description: Validation is used to validate matching resources. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must be satisfied + for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used to pass or + fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared + under an `any` or `all` statement. A direct list + of conditions (without `any` or `all` statements) + is also supported for backwards compatibility + but will be deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + foreach: + description: ForEach applies validate rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + items: + description: ForEach applies validate rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must + be satisfied for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and + data sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON + data retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the JSON response + returned from the API server. For + example a JMESPath of "items | length(@)" + applied to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path + to be used in the HTTP GET request + to the Kubernetes API server (e.g. + "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format + used by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch + image details. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the ImageData struct + returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be + defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that the variable + may take if the JMESPath expression + evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional + JMESPath Expression that can be used + to transform the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions used to pass + or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared + under an `any` or `all` statement. A direct + list of conditions (without `any` or `all` + statements) is also supported for backwards + compatibility but will be deprecated in + the next major release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies whether to + use the current list element as the scope for + validation. Defaults to "true" if not specified. + When set to "false", "request.object" is used + as the validation scope within the foreach block + to allow referencing other elements in the subtree. + type: boolean + list: + description: List specifies a JMESPath expression + that results in one or more elements to which + the validation logic is applied. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of + the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions for manifest + verification + properties: + annotationDomain: + description: AnnotationDomain is custom domain of + annotation for message and signature. Default + is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. If the + count is null, all entries must match (a + logical AND). If the count is 1, at least + one entry must match (a logical OR). If + the count contains a value N, then N must + be less than or equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static key, + attributes for keyless verification, or + a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set + of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is + an optional PEM encoded set of + certificates used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions used + for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked and a root + certificate chain is expected + instead. If an empty object is + provided the public instance of + Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted root + certificates. If not provided, + the system roots are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image + signatures. The keys can be directly + specified or can be a variable + reference to a key specified in + a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors and + the count is applied across the + keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use for + signatures and attestations that match + this rule. If specified Repository + will override other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored while + comparing manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional alternate + OCI repository to use for resource bundle reference. + The repository can be overridden per Attestor + or Attestation. + type: string + type: object + message: + description: Message specifies a custom message to be + displayed on failure. + type: string + pattern: + description: Pattern specifies an overlay-style pattern + used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions for Kubernetes + Pod Security admission by specifying exclusions for + Pod Security Standards controls. + properties: + exclude: + description: Exclude specifies the Pod Security + Standard controls to be excluded. + items: + description: PodSecurityStandard specifies the + Pod Security Standard controls to be excluded. + properties: + controlName: + description: 'ControlName specifies the name + of the Pod Security Standard control. See: + https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. + Wildcards (''*'' and ''?'') are allowed. + See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security Standard + level to be applied to workloads. Allowed values + are privileged, baseline, and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod Security Standard + versions that Kubernetes supports. Allowed values + are v1.19, v1.20, v1.21, v1.22, v1.23, v1.24, + v1.25, latest. Defaults to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify image signatures + and mutate them to add a digest + items: + description: ImageVerification validates that images that + match the specified pattern are signed with the supplied + public key. Once the image is verified it is mutated + to include the SHA digest retrieved during the registration. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are certificate-extensions + used for keyless signing. Deprecated. + type: object + annotations: + additionalProperties: + type: string + description: Annotations are used for image verification. + Every specified key-value pair must exist and match + in the verified payload. The payload may contain + other key-value pairs. Deprecated. Use annotations + per Attestor instead. + type: object + attestations: + description: Attestations are optional checks for + signed in-toto Statements used to verify the image. + See https://github.com/in-toto/attestation. Kyverno + fetches signed attestations from the OCI registry + and decodes them into a list of Statement declarations. + items: + description: Attestation are checks for signed in-toto + Statements that are used to verify the image. + See https://github.com/in-toto/attestation. Kyverno + fetches signed attestations from the OCI registry + and decodes them into a list of Statements. + properties: + attestors: + description: Attestors specify the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. If + the count is null, all entries must + match (a logical AND). If the count + is 1, at least one entry must match + (a logical OR). If the count contains + a value N, then N must be less than + or equal to the size of entries, and + at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static + key, attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used + for image verification. Every + specified key-value pair must + exist and match in the verified + payload. The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is a nested + AttestorSet used to specify a + more complex set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is + an optional PEM encoded public + certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates used to + verify + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of + attribute used to verify a Sigstore + keyless attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked and a root + certificate chain is expected + instead. If an empty object + is provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted + root certificates. If not + provided, the system roots + are used. + type: string + subject: + description: Subject is the + verified identity used for + keyless signing, for example + the email address + type: string + type: object + keys: + description: Keys specifies one + or more public keys + properties: + publicKeys: + description: Keys is a set of + X.509 public keys used to + verify image signatures. The + keys can be directly specified + or can be a variable reference + to a key specified in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a + separate staticKey entry (.attestors[*].entries.keys) + within the set of attestors + and the count is applied across + the keys. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use + for signatures and attestations + that match this rule. If specified + Repository will override other + OCI image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used to verify attributes + within a Predicate. If no Conditions are specified + the attestation check is satisfied as long + there are predicates that match the predicate + type. + items: + description: AnyAllConditions consists of + conditions wrapped denoting a logical criteria + to be fulfilled. AnyConditions get fulfilled + when at least one of its sub-conditions + passes. AllConditions get fulfilled only + when all of its sub-conditions pass. + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is + useful for finer control of when an + rule is applied. A condition can reference + object data using JMESPath notation. + Here, all of the conditions need to + pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for conditional + rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is + useful for finer control of when an + rule is applied. A condition can reference + object data using JMESPath notation. + Here, at least one of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for conditional + rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines the type + of Predicate contained within the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required number + of entries that must match. If the count is + null, all entries must match (a logical AND). + If the count is 1, at least one entry must + match (a logical OR). If the count contains + a value N, then N must be less than or equal + to the size of entries, and at least N entries + must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static key, + attributes for keyless verification, or a + nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set of + match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies one + or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is an + optional PEM encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions used + for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked and a root certificate chain + is expected instead. If an empty + object is provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted root + certificates. If not provided, the + system roots are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image + signatures. The keys can be directly + specified or can be a variable reference + to a key specified in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors and + the count is applied across the + keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use for + signatures and attestations that match + this rule. If specified Repository will + override other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + image: + description: 'Image is the image name consisting of + the registry address, repository, image, and tag. + Wildcards (''*'' and ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images. + Deprecated. Use ImageReferences instead.' + type: string + imageReferences: + description: 'ImageReferences is a list of matching + image reference patterns. At least one pattern in + the list must match the image for the rule to apply. + Each image reference consists of a registry address + (defaults to docker.io), repository, image, and + tag (defaults to latest). Wildcards (''*'' and ''?'') + are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + issuer: + description: Issuer is the certificate issuer used + for keyless signing. Deprecated. Use KeylessAttestor + instead. + type: string + key: + description: Key is the PEM encoded public key that + the image or attestation is signed with. Deprecated. + Use StaticKeyAttestor instead. + type: string + mutateDigest: + default: true + description: MutateDigest enables replacement of image + tags with digests. Defaults to true. + type: boolean + repository: + description: Repository is an optional alternate OCI + repository to use for image signatures and attestations + that match this rule. If specified Repository will + override the default OCI image repository configured + for the installation. The repository can also be + overridden per Attestor or Attestation. + type: string + required: + default: true + description: Required validates that images are verified + i.e. have matched passed a signature or attestation + check. + type: boolean + roots: + description: Roots is the PEM encoded Root certificate + chain used for keyless signing Deprecated. Use KeylessAttestor + instead. + type: string + subject: + description: Subject is the identity used for keyless + signing, for example an email address Deprecated. + Use KeylessAttestor instead. + type: string + verifyDigest: + default: true + description: VerifyDigest validates that images have + a digest. + type: boolean + type: object + type: array + type: object + type: array + type: object + conditions: + description: Conditions is a list of conditions that apply to the + policy + items: + description: "Condition contains details for one aspect of the current + state of this API Resource. --- This struct is intended for direct + use as an array at the field path .status.conditions. For example, + \n type FooStatus struct{ // Represents the observations of a + foo's current state. // Known .status.conditions.type are: \"Available\", + \"Progressing\", and \"Degraded\" // +patchMergeKey=type // +patchStrategy=merge + // +listType=map // +listMapKey=type Conditions []metav1.Condition + `json:\"conditions,omitempty\" patchStrategy:\"merge\" patchMergeKey:\"type\" + protobuf:\"bytes,1,rep,name=conditions\"` \n // other fields }" + properties: + lastTransitionTime: + description: lastTransitionTime is the last time the condition + transitioned from one status to another. This should be when + the underlying condition changed. If that is not known, then + using the time when the API field changed is acceptable. + format: date-time + type: string + message: + description: message is a human readable message indicating + details about the transition. This may be an empty string. + maxLength: 32768 + type: string + observedGeneration: + description: observedGeneration represents the .metadata.generation + that the condition was set based upon. For instance, if .metadata.generation + is currently 12, but the .status.conditions[x].observedGeneration + is 9, the condition is out of date with respect to the current + state of the instance. + format: int64 + minimum: 0 + type: integer + reason: + description: reason contains a programmatic identifier indicating + the reason for the condition's last transition. Producers + of specific condition types may define expected values and + meanings for this field, and whether the values are considered + a guaranteed API. The value should be a CamelCase string. + This field may not be empty. + maxLength: 1024 + minLength: 1 + pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$ + type: string + status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown + type: string + type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + --- Many .condition.type values are consistent across resources + like Available, but because arbitrary conditions can be useful + (see .node.status.conditions), the ability to deconflict is + important. The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt) + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ + type: string + required: + - lastTransitionTime + - message + - reason + - status + - type + type: object + type: array + ready: + description: Ready indicates if the policy is ready to serve the admission + request. Deprecated in favor of Conditions + type: boolean + required: + - ready + type: object + required: + - spec + type: object + served: true + storage: true + subresources: + status: {} + - additionalPrinterColumns: + - jsonPath: .spec.background + name: Background + type: boolean + - jsonPath: .spec.validationFailureAction + name: Validate Action + type: string + - jsonPath: .spec.failurePolicy + name: Failure Policy + priority: 1 + type: string + - jsonPath: .status.ready + name: Ready + type: boolean + name: v2beta1 + schema: + openAPIV3Schema: + description: 'Policy declares validation, mutation, and generation behaviors + for matching resources. See: https://kyverno.io/docs/writing-policies/ for + more information.' + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: Spec defines policy behaviors and contains one or more rules. + properties: + applyRules: + description: ApplyRules controls how rules in a policy are applied. + Rule are processed in the order of declaration. When set to `One` + processing stops after a rule has been applied i.e. the rule matches + and results in a pass, fail, or error. When set to `All` all rules + in the policy are processed. The default is `All`. + enum: + - All + - One + type: string + background: + default: true + description: Background controls if rules are applied to existing + resources during a background scan. Optional. Default value is "true". + The value must be set to "false" if the policy rule uses variables + that are only available in the admission review request (e.g. user + name). + type: boolean + failurePolicy: + description: FailurePolicy defines how unexpected policy errors and + webhook response timeout errors are handled. Rules within the same + policy share the same failure behavior. Allowed values are Ignore + or Fail. Defaults to Fail. + enum: + - Ignore + - Fail + type: string + generateExistingOnPolicyUpdate: + description: GenerateExistingOnPolicyUpdate controls whether to trigger + generate rule in existing resources If is set to "true" generate + rule will be triggered and applied to existing matched resources. + Defaults to "false" if not specified. + type: boolean + mutateExistingOnPolicyUpdate: + description: MutateExistingOnPolicyUpdate controls if a mutateExisting + policy is applied on policy events. Default value is "false". + type: boolean + rules: + description: Rules is a list of Rule instances. A Policy contains + multiple rules and each rule can validate, mutate, or generate resources. + items: + description: Rule defines a validation, mutation, or generation + control for matching resources. Each rules contains a match declaration + to select resources, and an optional exclude declaration to specify + which resources to exclude. + properties: + context: + description: Context defines variables and data sources that + can be used during rule execution. + items: + description: ContextEntry adds variables and data sources + to a rule Context. Either a ConfigMap reference or a APILookup + must be provided. + properties: + apiCall: + description: APICall defines an HTTP request to the Kubernetes + API server. The JSON data retrieved is stored in the + context. + properties: + jmesPath: + description: JMESPath is an optional JSON Match Expression + that can be used to transform the JSON response + returned from the API server. For example a JMESPath + of "items | length(@)" applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments across + all namespaces. + type: string + urlPath: + description: URLPath is the URL path to be used in + the HTTP GET request to the Kubernetes API server + (e.g. "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format used by the + `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests to an OCI/Docker + V2 registry to fetch image details. + properties: + jmesPath: + description: JMESPath is an optional JSON Match Expression + that can be used to transform the ImageData struct + returned as a result of processing the image reference. + type: string + reference: + description: 'Reference is image reference to a container + image in the registry. Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath context + variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary JSON + object that the variable may take if the JMESPath + expression evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath Expression + that can be used to transform the variable. + type: string + value: + description: Value is any arbitrary JSON object representable + in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this policy rule + should not be applied. The exclude criteria can include resource + information (e.g. kind, name, namespace, labels) and admission + review request information like the name or role. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + type: object + generate: + description: Generation is used to create new resources. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + clone: + description: Clone specifies the source resource used to + populate each generated resource. At most one of Data + or Clone can be specified. If neither are provided, the + generated resource will be created with default data only. + properties: + name: + description: Name specifies name of the resource. + type: string + namespace: + description: Namespace specifies source resource namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list of source resource + used to populate each generated resource. + properties: + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source resource namespace. + type: string + selector: + description: Selector is a label selector. Label keys + and values in `matchLabels`. wildcard characters are + not supported. + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are ANDed. + items: + description: A label selector requirement is a + selector that contains values, a key, and an + operator that relates the key and values. + properties: + key: + description: key is the label key that the + selector applies to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. If the + operator is Exists or DoesNotExist, the + values array must be empty. This array is + replaced during a strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", + and the values array contains only "value". The + requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource declaration used + to populate each generated resource. At most one of Data + or Clone must be specified. If neither are provided, the + generated resource will be created with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + synchronize: + description: Synchronize controls if generated resources + should be kept in-sync with their source resource. If + Synchronize is set to "true" changes to generated resources + will be overwritten with resource data from Data or the + resource specified in the Clone declaration. Optional. + Defaults to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name of the field within + 'path' that will be used to uniquely identify an image. + Note - this field MUST be unique. + type: string + name: + description: Name is the entry the image will be available + under 'images.' in the context. If this field + is not defined, image entries will appear under 'images.custom'. + type: string + path: + description: Path is the path to the object containing + the image field in a custom resource. It should be + slash-separated. Each slash-separated key must be + a valid YAML key or a wildcard '*'. Wildcard keys + are expanded in case of arrays or objects. + type: string + value: + description: Value is an optional name of the field + within 'path' that points to the image URI. This is + useful when a custom 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping from kinds to + ImageExtractorConfigs. This config is only valid for verifyImages + rules. + type: object + match: + description: MatchResources defines when this policy rule should + be applied. The match criteria can include resource information + (e.g. kind, name, namespace, labels) and admission review + request information like the user name or role. At least one + kind is required. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or "OR" + between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and "?" + (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated + in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key + and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the + wildcard characters `*` (matches zero or many + characters) and `?` (matches one character). + Wildcards allows writing label selectors like + ["storage.k8s.io/*": "*"]. Note that using ["*" + : "*"] matches any key and value but does not + match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of + label selector requirements. The requirements + are ANDed. + items: + description: A label selector requirement + is a selector that contains values, a + key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only + "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to the + object or user identities a role binding applies + to. This can either hold a direct API object + reference, or a value for non-objects such as + user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of + the referenced subject. Defaults to "" for + ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as + "User" or "Group", and this value is not empty + the Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + type: object + mutate: + description: Mutation is used to modify matching resources. + properties: + foreach: + description: ForEach applies mutation rules to a list of + sub-elements by creating a context for each entry in the + list and looping over it to apply the specified logic. + items: + description: ForEach applies mutation rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + context: + description: Context defines variables and data sources + that can be used during rule execution. + items: + description: ContextEntry adds variables and data + sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON data + retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the JSON response returned from the API + server. For example a JMESPath of "items + | length(@)" applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to + be used in the HTTP GET request to the + Kubernetes API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). The + format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the ImageData struct returned as a result + of processing the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath + context variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take + if the JMESPath expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary JSON + object representable in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath expression + that results in one or more elements to which the + validation logic is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is a strategic merge + patch used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC 6902 + JSON Patch declarations used to modify resources. + See https://tools.ietf.org/html/rfc6902 and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, all of the conditions need to + pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, at least one of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic merge patch + used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC 6902 JSON + Patch declarations used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target resources to be + mutated. + items: + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the rule, It must be + unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine if a policy + rule should be applied by evaluating a set of conditions. + The declaration can contain nested `any` or `all` statements. + A direct list of conditions (without `any` or `all` statements + is supported for backwards compatibility but See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based conditional + rule execution. This is useful for finer control of when + an rule is applied. A condition can reference object data + using JMESPath notation. Here, all of the conditions need + to pass + items: + properties: + key: + description: Key is the context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional operation + to perform. Valid operators are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, or set + of values. The values can be fixed set or can be + variables declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based conditional + rule execution. This is useful for finer control of when + an rule is applied. A condition can reference object data + using JMESPath notation. Here, at least one of the conditions + need to pass + items: + properties: + key: + description: Key is the context entry (using JMESPath) + for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional operation + to perform. Valid operators are: Equals, NotEquals, + In, AnyIn, AllIn, NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, or set + of values. The values can be fixed set or can be + variables declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + validate: + description: Validation is used to validate matching resources. + properties: + anyPattern: + description: AnyPattern specifies list of validation patterns. + At least one of the patterns must be satisfied for the + validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used to pass or fail + a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared under + an `any` or `all` statement. A direct list of conditions + (without `any` or `all` statements) is also supported + for backwards compatibility See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A condition + can reference object data using JMESPath notation. + Here, all of the conditions need to pass + items: + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators are: + Equals, NotEquals, In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A condition + can reference object data using JMESPath notation. + Here, at least one of the conditions need to pass + items: + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators are: + Equals, NotEquals, In, AnyIn, AllIn, NotIn, + AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - AnyIn + - AllIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: object + foreach: + description: ForEach applies validate rules to a list of + sub-elements by creating a context for each entry in the + list and looping over it to apply the specified logic. + items: + description: ForEach applies validate rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must be satisfied + for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables and data sources + that can be used during rule execution. + items: + description: ContextEntry adds variables and data + sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON data + retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the JSON response returned from the API + server. For example a JMESPath of "items + | length(@)" applied to the API server + response to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to + be used in the HTTP GET request to the + Kubernetes API server (e.g. "/api/v1/namespaces" + or "/apis/apps/v1/deployments"). The + format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch image + details. + properties: + jmesPath: + description: JMESPath is an optional JSON + Match Expression that can be used to transform + the ImageData struct returned as a result + of processing the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath + context variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take + if the JMESPath expression evaluates to + nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform + the variable. + type: string + value: + description: Value is any arbitrary JSON + object representable in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions used to pass + or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared + under an `any` or `all` statement. A direct + list of conditions (without `any` or `all` statements) + is also supported for backwards compatibility + but will be deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies whether to use + the current list element as the scope for validation. + Defaults to "true" if not specified. When set to + "false", "request.object" is used as the validation + scope within the foreach block to allow referencing + other elements in the subtree. + type: boolean + list: + description: List specifies a JMESPath expression + that results in one or more elements to which the + validation logic is applied. + type: string + pattern: + description: Pattern specifies an overlay-style pattern + used to check resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, all of the conditions need to + pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful for + finer control of when an rule is applied. A + condition can reference object data using JMESPath + notation. Here, at least one of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry (using + JMESPath) for conditional rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, AllIn, + NotIn, AnyNotIn, AllNotIn, GreaterThanOrEquals, + GreaterThan, LessThanOrEquals, LessThan, + DurationGreaterThanOrEquals, DurationGreaterThan, + DurationLessThanOrEquals, DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional value, + or set of values. The values can be fixed + set or can be variables declared using + JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions for manifest + verification + properties: + annotationDomain: + description: AnnotationDomain is custom domain of annotation + for message and signature. Default is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required number + of entries that must match. If the count is + null, all entries must match (a logical AND). + If the count is 1, at least one entry must match + (a logical OR). If the count contains a value + N, then N must be less than or equal to the + size of entries, and at least N entries must + match. + minimum: 1 + type: integer + entries: + description: Entries contains the available attestors. + An attestor can be a static key, attributes + for keyless verification, or a nested attestor + declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for image + verification. Every specified key-value + pair must exist and match in the verified + payload. The payload may contain other + key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set of + match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies one + or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is an + optional PEM encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are + certificate-extensions used for keyless + signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked and a root certificate chain + is expected instead. If an empty object + is provided the public instance of + Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional set + of PEM encoded trusted root certificates. + If not provided, the system roots + are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image signatures. + The keys can be directly specified + or can be a variable reference to + a key specified in a ConfigMap (see + https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified each + key is processed as a separate staticKey + entry (.attestors[*].entries.keys) + within the set of attestors and the + count is applied across the keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional alternate + OCI repository to use for signatures and + attestations that match this rule. If + specified Repository will override other + OCI image repository locations for this + Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored while comparing + manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional alternate OCI + repository to use for resource bundle reference. The + repository can be overridden per Attestor or Attestation. + type: string + type: object + message: + description: Message specifies a custom message to be displayed + on failure. + type: string + pattern: + description: Pattern specifies an overlay-style pattern + used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions for Kubernetes + Pod Security admission by specifying exclusions for Pod + Security Standards controls. + properties: + exclude: + description: Exclude specifies the Pod Security Standard + controls to be excluded. + items: + description: PodSecurityStandard specifies the Pod + Security Standard controls to be excluded. + properties: + controlName: + description: 'ControlName specifies the name of + the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. Wildcards (''*'' and + ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security Standard + level to be applied to workloads. Allowed values are + privileged, baseline, and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod Security Standard + versions that Kubernetes supports. Allowed values + are v1.19, v1.20, v1.21, v1.22, v1.23, v1.24, v1.25, + latest. Defaults to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify image signatures + and mutate them to add a digest + items: + description: ImageVerification validates that images that + match the specified pattern are signed with the supplied + public key. Once the image is verified it is mutated to + include the SHA digest retrieved during the registration. + properties: + attestations: + description: Attestations are optional checks for signed + in-toto Statements used to verify the image. See https://github.com/in-toto/attestation. + Kyverno fetches signed attestations from the OCI registry + and decodes them into a list of Statement declarations. + items: + description: Attestation are checks for signed in-toto + Statements that are used to verify the image. See + https://github.com/in-toto/attestation. Kyverno fetches + signed attestations from the OCI registry and decodes + them into a list of Statements. + properties: + attestors: + description: Attestors specify the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. If the + count is null, all entries must match (a + logical AND). If the count is 1, at least + one entry must match (a logical OR). If + the count contains a value N, then N must + be less than or equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static key, + attributes for keyless verification, or + a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set + of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is + an optional PEM encoded set of + certificates used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions used + for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked and a root + certificate chain is expected + instead. If an empty object is + provided the public instance of + Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted root + certificates. If not provided, + the system roots are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image + signatures. The keys can be directly + specified or can be a variable + reference to a key specified in + a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors and + the count is applied across the + keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use for + signatures and attestations that match + this rule. If specified Repository + will override other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used to verify attributes + within a Predicate. If no Conditions are specified + the attestation check is satisfied as long there + are predicates that match the predicate type. + items: + description: AnyAllConditions consists of conditions + wrapped denoting a logical criteria to be fulfilled. + AnyConditions get fulfilled when at least one + of its sub-conditions passes. AllConditions + get fulfilled only when all of its sub-conditions + pass. + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of + the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines the type of Predicate + contained within the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required number + of entries that must match. If the count is null, + all entries must match (a logical AND). If the + count is 1, at least one entry must match (a logical + OR). If the count contains a value N, then N must + be less than or equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available attestors. + An attestor can be a static key, attributes for + keyless verification, or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for image + verification. Every specified key-value + pair must exist and match in the verified + payload. The payload may contain other key-value + pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set of match + authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies one or + more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is an optional + PEM encoded set of certificates used + to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not checked. + If an empty object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address of + the transparency log. Defaults to + the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are + certificate-extensions used for keyless + signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not checked + and a root certificate chain is expected + instead. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address of + the transparency log. Defaults to + the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional set + of PEM encoded trusted root certificates. + If not provided, the system roots are + used. + type: string + subject: + description: Subject is the verified identity + used for keyless signing, for example + the email address + type: string + type: object + keys: + description: Keys specifies one or more public + keys + properties: + publicKeys: + description: Keys is a set of X.509 public + keys used to verify image signatures. + The keys can be directly specified or + can be a variable reference to a key + specified in a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified each + key is processed as a separate staticKey + entry (.attestors[*].entries.keys) within + the set of attestors and the count is + applied across the keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not checked. + If an empty object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address of + the transparency log. Defaults to + the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional alternate + OCI repository to use for signatures and + attestations that match this rule. If specified + Repository will override other OCI image + repository locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + imageReferences: + description: 'ImageReferences is a list of matching image + reference patterns. At least one pattern in the list + must match the image for the rule to apply. Each image + reference consists of a registry address (defaults to + docker.io), repository, image, and tag (defaults to + latest). Wildcards (''*'' and ''?'') are allowed. See: + https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + mutateDigest: + default: true + description: MutateDigest enables replacement of image + tags with digests. Defaults to true. + type: boolean + repository: + description: Repository is an optional alternate OCI repository + to use for image signatures and attestations that match + this rule. If specified Repository will override the + default OCI image repository configured for the installation. + The repository can also be overridden per Attestor or + Attestation. + type: string + required: + default: true + description: Required validates that images are verified + i.e. have matched passed a signature or attestation + check. + type: boolean + verifyDigest: + default: true + description: VerifyDigest validates that images have a + digest. + type: boolean + type: object + type: array + type: object + type: array + schemaValidation: + description: SchemaValidation skips validation checks for policies + as well as patched resources. Optional. The default value is set + to "true", it must be set to "false" to disable the validation checks. + type: boolean + validationFailureAction: + default: audit + description: ValidationFailureAction defines if a validation policy + rule violation should block the admission review request (enforce), + or allow (audit) the admission review request and report an error + in a policy report. Optional. Allowed values are audit or enforce. + The default value is "audit". + enum: + - audit + - enforce + type: string + validationFailureActionOverrides: + description: ValidationFailureActionOverrides is a Cluster Policy + attribute that specifies ValidationFailureAction namespace-wise. + It overrides ValidationFailureAction for the specified namespaces. + items: + properties: + action: + description: ValidationFailureAction defines the policy validation + failure action + enum: + - audit + - enforce + type: string + namespaces: + items: + type: string + type: array + type: object + type: array + webhookTimeoutSeconds: + description: WebhookTimeoutSeconds specifies the maximum time in seconds + allowed to apply this policy. After the configured time expires, + the admission request may fail, or may simply ignore the policy + results, based on the failure policy. The default timeout is 10s, + the value must be between 1 and 30 seconds. + format: int32 + type: integer + type: object + status: + description: Status contains policy runtime data. + properties: + autogen: + description: Autogen contains autogen status information + properties: + rules: + description: Rules is a list of Rule instances. It contains auto + generated rules added for pod controllers + items: + description: Rule defines a validation, mutation, or generation + control for matching resources. Each rules contains a match + declaration to select resources, and an optional exclude declaration + to specify which resources to exclude. + properties: + context: + description: Context defines variables and data sources + that can be used during rule execution. + items: + description: ContextEntry adds variables and data sources + to a rule Context. Either a ConfigMap reference or a + APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request to the + Kubernetes API server. The JSON data retrieved is + stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON Match + Expression that can be used to transform the + JSON response returned from the API server. + For example a JMESPath of "items | length(@)" + applied to the API server response to the URLPath + "/apis/apps/v1/deployments" will return the + total count of deployments across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to be used + in the HTTP GET request to the Kubernetes API + server (e.g. "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests to an + OCI/Docker V2 registry to fetch image details. + properties: + jmesPath: + description: JMESPath is an optional JSON Match + Expression that can be used to transform the + ImageData struct returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference to + a container image in the registry. Example: + ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath + context variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take if the + JMESPath expression evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform the + variable. + type: string + value: + description: Value is any arbitrary JSON object + representable in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this policy rule + should not be applied. The exclude criteria can include + resource information (e.g. kind, name, namespace, labels) + and admission review request information like the name + or role. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. Requires + at least one tag to be specified when under MatchResources. + Specifying ResourceDescription directly under match + is being deprecated. Please specify under "any" or + "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation keys + and values support the wildcard characters "*" + (matches zero or many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated in + favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key and + value but does not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the wildcard + characters `*` (matches zero or many characters) + and `?` (matches one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] matches any + key and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role names + for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names like + users, user groups, and service accounts. + items: + description: Subject contains a reference to the object + or user identities a role binding applies to. This + can either hold a direct API object reference, or + a value for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of the + referenced subject. Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as "User" + or "Group", and this value is not empty the + Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + generate: + description: Generation is used to create new resources. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + clone: + description: Clone specifies the source resource used + to populate each generated resource. At most one of + Data or Clone can be specified. If neither are provided, + the generated resource will be created with default + data only. + properties: + name: + description: Name specifies name of the resource. + type: string + namespace: + description: Namespace specifies source resource + namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list of source + resource used to populate each generated resource. + properties: + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source resource + namespace. + type: string + selector: + description: Selector is a label selector. Label + keys and values in `matchLabels`. wildcard characters + are not supported. + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + data: + description: Data provides the resource declaration + used to populate each generated resource. At most + one of Data or Clone must be specified. If neither + are provided, the generated resource will be created + with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + synchronize: + description: Synchronize controls if generated resources + should be kept in-sync with their source resource. + If Synchronize is set to "true" changes to generated + resources will be overwritten with resource data from + Data or the resource specified in the Clone declaration. + Optional. Defaults to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name of the field + within 'path' that will be used to uniquely identify + an image. Note - this field MUST be unique. + type: string + name: + description: Name is the entry the image will be + available under 'images.' in the context. + If this field is not defined, image entries will + appear under 'images.custom'. + type: string + path: + description: Path is the path to the object containing + the image field in a custom resource. It should + be slash-separated. Each slash-separated key must + be a valid YAML key or a wildcard '*'. Wildcard + keys are expanded in case of arrays or objects. + type: string + value: + description: Value is an optional name of the field + within 'path' that points to the image URI. This + is useful when a custom 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping from kinds + to ImageExtractorConfigs. This config is only valid for + verifyImages rules. + type: object + match: + description: MatchResources defines when this policy rule + should be applied. The match criteria can include resource + information (e.g. kind, name, namespace, labels) and admission + review request information like the user name or role. + At least one kind is required. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. Requires + at least one tag to be specified when under MatchResources. + Specifying ResourceDescription directly under match + is being deprecated. Please specify under "any" or + "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation keys + and values support the wildcard characters "*" + (matches zero or many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated in + favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key and + value but does not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the wildcard + characters `*` (matches zero or many characters) + and `?` (matches one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] matches any + key and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role names + for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names like + users, user groups, and service accounts. + items: + description: Subject contains a reference to the object + or user identities a role binding applies to. This + can either hold a direct API object reference, or + a value for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of the + referenced subject. Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as "User" + or "Group", and this value is not empty the + Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + mutate: + description: Mutation is used to modify matching resources. + properties: + foreach: + description: ForEach applies mutation rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + items: + description: ForEach applies mutation rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and + data sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON + data retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the JSON response + returned from the API server. For + example a JMESPath of "items | length(@)" + applied to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path + to be used in the HTTP GET request + to the Kubernetes API server (e.g. + "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format + used by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch + image details. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the ImageData struct + returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be + defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that the variable + may take if the JMESPath expression + evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional + JMESPath Expression that can be used + to transform the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath expression + that results in one or more elements to which + the validation logic is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is a strategic + merge patch used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC + 6902 JSON Patch declarations used to modify + resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of + the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic merge + patch used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC 6902 JSON + Patch declarations used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target resources to + be mutated. + items: + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the rule, It must + be unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine if a policy + rule should be applied by evaluating a set of conditions. + The declaration can contain nested `any` or `all` statements. + A direct list of conditions (without `any` or `all` statements + is supported for backwards compatibility but will be deprecated + in the next major release. See: https://kyverno.io/docs/writing-policies/preconditions/' + x-kubernetes-preserve-unknown-fields: true + validate: + description: Validation is used to validate matching resources. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must be satisfied + for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used to pass or + fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared + under an `any` or `all` statement. A direct list + of conditions (without `any` or `all` statements) + is also supported for backwards compatibility + but will be deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + foreach: + description: ForEach applies validate rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + items: + description: ForEach applies validate rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must + be satisfied for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and + data sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON + data retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the JSON response + returned from the API server. For + example a JMESPath of "items | length(@)" + applied to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path + to be used in the HTTP GET request + to the Kubernetes API server (e.g. + "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format + used by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch + image details. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the ImageData struct + returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be + defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that the variable + may take if the JMESPath expression + evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional + JMESPath Expression that can be used + to transform the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions used to pass + or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared + under an `any` or `all` statement. A direct + list of conditions (without `any` or `all` + statements) is also supported for backwards + compatibility but will be deprecated in + the next major release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies whether to + use the current list element as the scope for + validation. Defaults to "true" if not specified. + When set to "false", "request.object" is used + as the validation scope within the foreach block + to allow referencing other elements in the subtree. + type: boolean + list: + description: List specifies a JMESPath expression + that results in one or more elements to which + the validation logic is applied. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of + the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions for manifest + verification + properties: + annotationDomain: + description: AnnotationDomain is custom domain of + annotation for message and signature. Default + is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. If the + count is null, all entries must match (a + logical AND). If the count is 1, at least + one entry must match (a logical OR). If + the count contains a value N, then N must + be less than or equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static key, + attributes for keyless verification, or + a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set + of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is + an optional PEM encoded set of + certificates used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions used + for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked and a root + certificate chain is expected + instead. If an empty object is + provided the public instance of + Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted root + certificates. If not provided, + the system roots are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image + signatures. The keys can be directly + specified or can be a variable + reference to a key specified in + a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors and + the count is applied across the + keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use for + signatures and attestations that match + this rule. If specified Repository + will override other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored while + comparing manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional alternate + OCI repository to use for resource bundle reference. + The repository can be overridden per Attestor + or Attestation. + type: string + type: object + message: + description: Message specifies a custom message to be + displayed on failure. + type: string + pattern: + description: Pattern specifies an overlay-style pattern + used to check resources. + x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions for Kubernetes + Pod Security admission by specifying exclusions for + Pod Security Standards controls. + properties: + exclude: + description: Exclude specifies the Pod Security + Standard controls to be excluded. + items: + description: PodSecurityStandard specifies the + Pod Security Standard controls to be excluded. + properties: + controlName: + description: 'ControlName specifies the name + of the Pod Security Standard control. See: + https://kubernetes.io/docs/concepts/security/pod-security-standards/' + enum: + - HostProcess + - Host Namespaces + - Privileged Containers + - Capabilities + - HostPath Volumes + - Host Ports + - AppArmor + - SELinux + - /proc Mount Type + - Seccomp + - Sysctls + - Volume Types + - Privilege Escalation + - Running as Non-root + - Running as Non-root user + type: string + images: + description: 'Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. + Wildcards (''*'' and ''?'') are allowed. + See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security Standard + level to be applied to workloads. Allowed values + are privileged, baseline, and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod Security Standard + versions that Kubernetes supports. Allowed values + are v1.19, v1.20, v1.21, v1.22, v1.23, v1.24, + v1.25, latest. Defaults to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify image signatures + and mutate them to add a digest + items: + description: ImageVerification validates that images that + match the specified pattern are signed with the supplied + public key. Once the image is verified it is mutated + to include the SHA digest retrieved during the registration. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are certificate-extensions + used for keyless signing. Deprecated. + type: object + annotations: + additionalProperties: + type: string + description: Annotations are used for image verification. + Every specified key-value pair must exist and match + in the verified payload. The payload may contain + other key-value pairs. Deprecated. Use annotations + per Attestor instead. + type: object + attestations: + description: Attestations are optional checks for + signed in-toto Statements used to verify the image. + See https://github.com/in-toto/attestation. Kyverno + fetches signed attestations from the OCI registry + and decodes them into a list of Statement declarations. + items: + description: Attestation are checks for signed in-toto + Statements that are used to verify the image. + See https://github.com/in-toto/attestation. Kyverno + fetches signed attestations from the OCI registry + and decodes them into a list of Statements. + properties: + attestors: + description: Attestors specify the required + attestors (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. If + the count is null, all entries must + match (a logical AND). If the count + is 1, at least one entry must match + (a logical OR). If the count contains + a value N, then N must be less than + or equal to the size of entries, and + at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static + key, attributes for keyless verification, + or a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used + for image verification. Every + specified key-value pair must + exist and match in the verified + payload. The payload may contain + other key-value pairs. + type: object + attestor: + description: Attestor is a nested + AttestorSet used to specify a + more complex set of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is + an optional PEM encoded public + certificate. + type: string + certChain: + description: CertificateChain + is an optional PEM encoded + set of certificates used to + verify + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of + attribute used to verify a Sigstore + keyless attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions + used for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked and a root + certificate chain is expected + instead. If an empty object + is provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted + root certificates. If not + provided, the system roots + are used. + type: string + subject: + description: Subject is the + verified identity used for + keyless signing, for example + the email address + type: string + type: object + keys: + description: Keys specifies one + or more public keys + properties: + publicKeys: + description: Keys is a set of + X.509 public keys used to + verify image signatures. The + keys can be directly specified + or can be a variable reference + to a key specified in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a + separate staticKey entry (.attestors[*].entries.keys) + within the set of attestors + and the count is applied across + the keys. + type: string + rekor: + description: Rekor provides + configuration for the Rekor + transparency log service. + If the value is nil, Rekor + is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the + address of the transparency + log. Defaults to the public + log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use + for signatures and attestations + that match this rule. If specified + Repository will override other + OCI image repository locations + for this Attestor. + type: string + type: object + type: array + type: object + type: array + conditions: + description: Conditions are used to verify attributes + within a Predicate. If no Conditions are specified + the attestation check is satisfied as long + there are predicates that match the predicate + type. + items: + description: AnyAllConditions consists of + conditions wrapped denoting a logical criteria + to be fulfilled. AnyConditions get fulfilled + when at least one of its sub-conditions + passes. AllConditions get fulfilled only + when all of its sub-conditions pass. + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is + useful for finer control of when an + rule is applied. A condition can reference + object data using JMESPath notation. + Here, all of the conditions need to + pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for conditional + rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is + useful for finer control of when an + rule is applied. A condition can reference + object data using JMESPath notation. + Here, at least one of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for conditional + rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines the type + of Predicate contained within the Statement. + type: string + required: + - predicateType + type: object + type: array + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required number + of entries that must match. If the count is + null, all entries must match (a logical AND). + If the count is 1, at least one entry must + match (a logical OR). If the count contains + a value N, then N must be less than or equal + to the size of entries, and at least N entries + must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static key, + attributes for keyless verification, or a + nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set of + match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies one + or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is an + optional PEM encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions used + for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked and a root certificate chain + is expected instead. If an empty + object is provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted root + certificates. If not provided, the + system roots are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image + signatures. The keys can be directly + specified or can be a variable reference + to a key specified in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors and + the count is applied across the + keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use for + signatures and attestations that match + this rule. If specified Repository will + override other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + image: + description: 'Image is the image name consisting of + the registry address, repository, image, and tag. + Wildcards (''*'' and ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images. + Deprecated. Use ImageReferences instead.' + type: string + imageReferences: + description: 'ImageReferences is a list of matching + image reference patterns. At least one pattern in + the list must match the image for the rule to apply. + Each image reference consists of a registry address + (defaults to docker.io), repository, image, and + tag (defaults to latest). Wildcards (''*'' and ''?'') + are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + issuer: + description: Issuer is the certificate issuer used + for keyless signing. Deprecated. Use KeylessAttestor + instead. + type: string + key: + description: Key is the PEM encoded public key that + the image or attestation is signed with. Deprecated. + Use StaticKeyAttestor instead. + type: string + mutateDigest: + default: true + description: MutateDigest enables replacement of image + tags with digests. Defaults to true. + type: boolean + repository: + description: Repository is an optional alternate OCI + repository to use for image signatures and attestations + that match this rule. If specified Repository will + override the default OCI image repository configured + for the installation. The repository can also be + overridden per Attestor or Attestation. + type: string + required: + default: true + description: Required validates that images are verified + i.e. have matched passed a signature or attestation + check. + type: boolean + roots: + description: Roots is the PEM encoded Root certificate + chain used for keyless signing Deprecated. Use KeylessAttestor + instead. + type: string + subject: + description: Subject is the identity used for keyless + signing, for example an email address Deprecated. + Use KeylessAttestor instead. + type: string + verifyDigest: + default: true + description: VerifyDigest validates that images have + a digest. + type: boolean + type: object + type: array + type: object + type: array + type: object + conditions: + description: Conditions is a list of conditions that apply to the + policy + items: + description: "Condition contains details for one aspect of the current + state of this API Resource. --- This struct is intended for direct + use as an array at the field path .status.conditions. For example, + \n type FooStatus struct{ // Represents the observations of a + foo's current state. // Known .status.conditions.type are: \"Available\", + \"Progressing\", and \"Degraded\" // +patchMergeKey=type // +patchStrategy=merge + // +listType=map // +listMapKey=type Conditions []metav1.Condition + `json:\"conditions,omitempty\" patchStrategy:\"merge\" patchMergeKey:\"type\" + protobuf:\"bytes,1,rep,name=conditions\"` \n // other fields }" + properties: + lastTransitionTime: + description: lastTransitionTime is the last time the condition + transitioned from one status to another. This should be when + the underlying condition changed. If that is not known, then + using the time when the API field changed is acceptable. + format: date-time + type: string + message: + description: message is a human readable message indicating + details about the transition. This may be an empty string. + maxLength: 32768 + type: string + observedGeneration: + description: observedGeneration represents the .metadata.generation + that the condition was set based upon. For instance, if .metadata.generation + is currently 12, but the .status.conditions[x].observedGeneration + is 9, the condition is out of date with respect to the current + state of the instance. + format: int64 + minimum: 0 + type: integer + reason: + description: reason contains a programmatic identifier indicating + the reason for the condition's last transition. Producers + of specific condition types may define expected values and + meanings for this field, and whether the values are considered + a guaranteed API. The value should be a CamelCase string. + This field may not be empty. + maxLength: 1024 + minLength: 1 + pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$ + type: string + status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown + type: string + type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + --- Many .condition.type values are consistent across resources + like Available, but because arbitrary conditions can be useful + (see .node.status.conditions), the ability to deconflict is + important. The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt) + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ + type: string + required: + - lastTransitionTime + - message + - reason + - status + - type + type: object + type: array + ready: + description: Ready indicates if the policy is ready to serve the admission + request. Deprecated in favor of Conditions + type: boolean + required: + - ready + type: object + required: + - spec + type: object + served: true + storage: false + subresources: + status: {} diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.policyreports.wgpolicyk8s.io.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.policyreports.wgpolicyk8s.io.yaml new file mode 100755 index 0000000..6fcc797 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.policyreports.wgpolicyk8s.io.yaml @@ -0,0 +1,369 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + config.kubernetes.io/index: "9" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "9" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: policyreports.wgpolicyk8s.io +spec: + group: wgpolicyk8s.io + names: + kind: PolicyReport + listKind: PolicyReportList + plural: policyreports + shortNames: + - polr + singular: policyreport + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .scope.kind + name: Kind + priority: 1 + type: string + - jsonPath: .scope.name + name: Name + priority: 1 + type: string + - jsonPath: .summary.pass + name: Pass + type: integer + - jsonPath: .summary.fail + name: Fail + type: integer + - jsonPath: .summary.warn + name: Warn + type: integer + - jsonPath: .summary.error + name: Error + type: integer + - jsonPath: .summary.skip + name: Skip + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + name: v1alpha2 + schema: + openAPIV3Schema: + description: PolicyReport is the Schema for the policyreports API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + results: + description: PolicyReportResult provides result details + items: + description: PolicyReportResult provides the result for an individual + policy + properties: + category: + description: Category indicates policy category + type: string + message: + description: Description is a short user friendly message for the + policy rule + type: string + policy: + description: Policy is the name or identifier of the policy + type: string + properties: + additionalProperties: + type: string + description: Properties provides additional information for the + policy rule + type: object + resourceSelector: + description: SubjectSelector is an optional label selector for checked + Kubernetes resources. For example, a policy result may apply to + all pods that match a label. Either a Subject or a SubjectSelector + can be specified. If neither are provided, the result is assumed + to be for the policy report scope. + properties: + matchExpressions: + description: matchExpressions is a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector requirement is a selector that + contains values, a key, and an operator that relates the + key and values. + properties: + key: + description: key is the label key that the selector applies + to. + type: string + operator: + description: operator represents a key's relationship + to a set of values. Valid operators are In, NotIn, Exists + and DoesNotExist. + type: string + values: + description: values is an array of string values. If the + operator is In or NotIn, the values array must be non-empty. + If the operator is Exists or DoesNotExist, the values + array must be empty. This array is replaced during a + strategic merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} pairs. A single + {key,value} in the matchLabels map is equivalent to an element + of matchExpressions, whose key field is "key", the operator + is "In", and the values array contains only "value". The requirements + are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + resources: + description: Subjects is an optional reference to the checked Kubernetes + resources + items: + description: "ObjectReference contains enough information to let + you inspect or modify the referred object. --- New uses of this + type are discouraged because of difficulty describing its usage + when embedded in APIs. 1. Ignored fields. It includes many + fields which are not generally honored. For instance, ResourceVersion + and FieldPath are both very rarely valid in actual usage. 2. + Invalid usage help. It is impossible to add specific help for + individual usage. In most embedded usages, there are particular + restrictions like, \"must refer only to types A and B\" or \"UID + not honored\" or \"name must be restricted\". Those cannot be + well described when embedded. 3. Inconsistent validation. Because + the usages are different, the validation rules are different + by usage, which makes it hard for users to predict what will + happen. 4. The fields are both imprecise and overly precise. + \ Kind is not a precise mapping to a URL. This can produce ambiguity + during interpretation and require a REST mapping. In most cases, + the dependency is on the group,resource tuple and the version + of the actual struct is irrelevant. 5. We cannot easily change + it. Because this type is embedded in many locations, updates + to this type will affect numerous schemas. Don't make new APIs + embed an underspecified API type they do not control. \n Instead + of using this type, create a locally provided and used type + that is well-focused on your reference. For example, ServiceReferences + for admission registration: https://github.com/kubernetes/api/blob/release-1.17/admissionregistration/v1/types.go#L533 + ." + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an object instead + of an entire object, this string should contain a valid + JSON/Go field access statement, such as desiredState.manifest.containers[2]. + For example, if the object reference is to a container within + a pod, this would take on a value like: "spec.containers{name}" + (where "name" refers to the name of the container that triggered + the event) or if no container name is specified "spec.containers[2]" + (container with index 2 in this pod). This syntax is chosen + only to have some well-defined way of referencing a part + of an object. TODO: this design is not final and this field + is subject to change in the future.' + type: string + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to which this reference + is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + type: array + result: + description: Result indicates the outcome of the policy rule execution + enum: + - pass + - fail + - warn + - error + - skip + type: string + rule: + description: Rule is the name or identifier of the rule within the + policy + type: string + scored: + description: Scored indicates if this result is scored + type: boolean + severity: + description: Severity indicates policy check result criticality + enum: + - critical + - high + - low + - medium + - info + type: string + source: + description: Source is an identifier for the policy engine that + manages this report + type: string + timestamp: + description: Timestamp indicates the time the result was found + properties: + nanos: + description: Non-negative fractions of a second at nanosecond + resolution. Negative second values with fractions must still + have non-negative nanos values that count forward in time. + Must be from 0 to 999,999,999 inclusive. This field may be + limited in precision depending on context. + format: int32 + type: integer + seconds: + description: Represents seconds of UTC time since Unix epoch + 1970-01-01T00:00:00Z. Must be from 0001-01-01T00:00:00Z to + 9999-12-31T23:59:59Z inclusive. + format: int64 + type: integer + required: + - nanos + - seconds + type: object + required: + - policy + type: object + type: array + scope: + description: Scope is an optional reference to the report scope (e.g. + a Deployment, Namespace, or Node) + properties: + apiVersion: + description: API version of the referent. + type: string + fieldPath: + description: 'If referring to a piece of an object instead of an entire + object, this string should contain a valid JSON/Go field access + statement, such as desiredState.manifest.containers[2]. For example, + if the object reference is to a container within a pod, this would + take on a value like: "spec.containers{name}" (where "name" refers + to the name of the container that triggered the event) or if no + container name is specified "spec.containers[2]" (container with + index 2 in this pod). This syntax is chosen only to have some well-defined + way of referencing a part of an object. TODO: this design is not + final and this field is subject to change in the future.' + type: string + kind: + description: 'Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + name: + description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' + type: string + namespace: + description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' + type: string + resourceVersion: + description: 'Specific resourceVersion to which this reference is + made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency' + type: string + uid: + description: 'UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids' + type: string + type: object + x-kubernetes-map-type: atomic + scopeSelector: + description: ScopeSelector is an optional selector for multiple scopes + (e.g. Pods). Either one of, or none of, but not both of, Scope or ScopeSelector + should be specified. + properties: + matchExpressions: + description: matchExpressions is a list of label selector requirements. + The requirements are ANDed. + items: + description: A label selector requirement is a selector that contains + values, a key, and an operator that relates the key and values. + properties: + key: + description: key is the label key that the selector applies + to. + type: string + operator: + description: operator represents a key's relationship to a set + of values. Valid operators are In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array of string values. If the operator + is In or NotIn, the values array must be non-empty. If the + operator is Exists or DoesNotExist, the values array must + be empty. This array is replaced during a strategic merge + patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} pairs. A single {key,value} + in the matchLabels map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is "In", and the values array + contains only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + summary: + description: PolicyReportSummary provides a summary of results + properties: + error: + description: Error provides the count of policies that could not be + evaluated + type: integer + fail: + description: Fail provides the count of policies whose requirements + were not met + type: integer + pass: + description: Pass provides the count of policies whose requirements + were met + type: integer + skip: + description: Skip indicates the count of policies that were not selected + for evaluation + type: integer + warn: + description: Warn provides the count of non-scored policies whose + requirements were not met + type: integer + type: object + type: object + served: true + storage: true + subresources: {} diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.updaterequests.kyverno.io.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.updaterequests.kyverno.io.yaml new file mode 100755 index 0000000..b7e9f7d --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/CustomResourceDefinition.updaterequests.kyverno.io.yaml @@ -0,0 +1,394 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + config.kubernetes.io/index: "10" + controller-gen.kubebuilder.io/version: v0.10.0 + internal.config.kubernetes.io/index: "10" + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: v1.8.5 + name: updaterequests.kyverno.io +spec: + group: kyverno.io + names: + categories: + - kyverno + kind: UpdateRequest + listKind: UpdateRequestList + plural: updaterequests + shortNames: + - ur + singular: updaterequest + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .spec.policy + name: Policy + type: string + - jsonPath: .spec.requestType + name: RuleType + type: string + - jsonPath: .spec.resource.kind + name: ResourceKind + type: string + - jsonPath: .spec.resource.name + name: ResourceName + type: string + - jsonPath: .spec.resource.namespace + name: ResourceNamespace + type: string + - jsonPath: .status.state + name: status + type: string + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + name: v1beta1 + schema: + openAPIV3Schema: + description: UpdateRequest is a request to process mutate and generate rules + in background. + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + spec: + description: Spec is the information to identify the update request. + properties: + context: + description: Context ... + properties: + admissionRequestInfo: + description: AdmissionRequestInfoObject stores the admission request + and operation details + properties: + admissionRequest: + description: AdmissionRequest describes the admission.Attributes + for the admission request. + properties: + dryRun: + description: DryRun indicates that modifications will + definitely not be persisted for this request. Defaults + to false. + type: boolean + kind: + description: Kind is the fully-qualified type of object + being submitted (for example, v1.Pod or autoscaling.v1.Scale) + properties: + group: + type: string + kind: + type: string + version: + type: string + required: + - group + - kind + - version + type: object + name: + description: Name is the name of the object as presented + in the request. On a CREATE operation, the client may + omit name and rely on the server to generate the name. If + that is the case, this field will contain an empty string. + type: string + namespace: + description: Namespace is the namespace associated with + the request (if any). + type: string + object: + description: Object is the object from the incoming request. + type: object + x-kubernetes-preserve-unknown-fields: true + oldObject: + description: OldObject is the existing object. Only populated + for DELETE and UPDATE requests. + type: object + x-kubernetes-preserve-unknown-fields: true + operation: + description: Operation is the operation being performed. + This may be different than the operation requested. + e.g. a patch can result in either a CREATE or UPDATE + Operation. + type: string + options: + description: Options is the operation option structure + of the operation being performed. e.g. `meta.k8s.io/v1.DeleteOptions` + or `meta.k8s.io/v1.CreateOptions`. This may be different + than the options the caller provided. e.g. for a patch + request the performed Operation might be a CREATE, in + which case the Options will a `meta.k8s.io/v1.CreateOptions` + even though the caller provided `meta.k8s.io/v1.PatchOptions`. + type: object + x-kubernetes-preserve-unknown-fields: true + requestKind: + description: "RequestKind is the fully-qualified type + of the original API request (for example, v1.Pod or + autoscaling.v1.Scale). If this is specified and differs + from the value in \"kind\", an equivalent match and + conversion was performed. \n For example, if deployments + can be modified via apps/v1 and apps/v1beta1, and a + webhook registered a rule of `apiGroups:[\"apps\"], + apiVersions:[\"v1\"], resources: [\"deployments\"]` + and `matchPolicy: Equivalent`, an API request to apps/v1beta1 + deployments would be converted and sent to the webhook + with `kind: {group:\"apps\", version:\"v1\", kind:\"Deployment\"}` + (matching the rule the webhook registered for), and + `requestKind: {group:\"apps\", version:\"v1beta1\", + kind:\"Deployment\"}` (indicating the kind of the original + API request). \n See documentation for the \"matchPolicy\" + field in the webhook configuration type for more details." + properties: + group: + type: string + kind: + type: string + version: + type: string + required: + - group + - kind + - version + type: object + requestResource: + description: "RequestResource is the fully-qualified resource + of the original API request (for example, v1.pods). + If this is specified and differs from the value in \"resource\", + an equivalent match and conversion was performed. \n + For example, if deployments can be modified via apps/v1 + and apps/v1beta1, and a webhook registered a rule of + `apiGroups:[\"apps\"], apiVersions:[\"v1\"], resources: + [\"deployments\"]` and `matchPolicy: Equivalent`, an + API request to apps/v1beta1 deployments would be converted + and sent to the webhook with `resource: {group:\"apps\", + version:\"v1\", resource:\"deployments\"}` (matching + the resource the webhook registered for), and `requestResource: + {group:\"apps\", version:\"v1beta1\", resource:\"deployments\"}` + (indicating the resource of the original API request). + \n See documentation for the \"matchPolicy\" field in + the webhook configuration type." + properties: + group: + type: string + resource: + type: string + version: + type: string + required: + - group + - resource + - version + type: object + requestSubResource: + description: RequestSubResource is the name of the subresource + of the original API request, if any (for example, "status" + or "scale") If this is specified and differs from the + value in "subResource", an equivalent match and conversion + was performed. See documentation for the "matchPolicy" + field in the webhook configuration type. + type: string + resource: + description: Resource is the fully-qualified resource + being requested (for example, v1.pods) + properties: + group: + type: string + resource: + type: string + version: + type: string + required: + - group + - resource + - version + type: object + subResource: + description: SubResource is the subresource being requested, + if any (for example, "status" or "scale") + type: string + uid: + description: UID is an identifier for the individual request/response. + It allows us to distinguish instances of requests which + are otherwise identical (parallel requests, requests + when earlier requests did not modify etc) The UID is + meant to track the round trip (request/response) between + the KAS and the WebHook, not the user request. It is + suitable for correlating log entries between the webhook + and apiserver, for either auditing or debugging. + type: string + userInfo: + description: UserInfo is information about the requesting + user + properties: + extra: + additionalProperties: + description: ExtraValue masks the value so protobuf + can generate + items: + type: string + type: array + description: Any additional information provided by + the authenticator. + type: object + groups: + description: The names of groups this user is a part + of. + items: + type: string + type: array + uid: + description: A unique value that identifies this user + across time. If this user is deleted and another + user by the same name is added, they will have different + UIDs. + type: string + username: + description: The name that uniquely identifies this + user among all active users. + type: string + type: object + required: + - kind + - operation + - resource + - uid + - userInfo + type: object + operation: + description: Operation is the type of resource operation being + checked for admission control + type: string + type: object + userInfo: + description: RequestInfo contains permission info carried in an + admission request. + properties: + clusterRoles: + description: ClusterRoles is a list of possible clusterRoles + send the request. + items: + type: string + nullable: true + type: array + roles: + description: Roles is a list of possible role send the request. + items: + type: string + nullable: true + type: array + userInfo: + description: UserInfo is the userInfo carried in the admission + request. + properties: + extra: + additionalProperties: + description: ExtraValue masks the value so protobuf + can generate + items: + type: string + type: array + description: Any additional information provided by the + authenticator. + type: object + groups: + description: The names of groups this user is a part of. + items: + type: string + type: array + uid: + description: A unique value that identifies this user + across time. If this user is deleted and another user + by the same name is added, they will have different + UIDs. + type: string + username: + description: The name that uniquely identifies this user + among all active users. + type: string + type: object + type: object + type: object + policy: + description: Specifies the name of the policy. + type: string + requestType: + description: Type represents request type for background processing + enum: + - mutate + - generate + type: string + resource: + description: ResourceSpec is the information to identify the update + request. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + required: + - context + - policy + - resource + type: object + status: + description: Status contains statistics related to update request. + properties: + generatedResources: + description: This will track the resources that are updated by the + generate Policy. Will be used during clean up resources. + items: + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + type: array + handler: + description: Handler represents the instance ID that handles the UR + type: string + message: + description: Specifies request status message. + type: string + state: + description: State represents state of the update request. + type: string + required: + - state + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Deployment.kyverno.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Deployment.kyverno.yaml new file mode 100755 index 0000000..97bb7e0 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Deployment.kyverno.yaml @@ -0,0 +1,172 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno + namespace: kyverno +spec: + replicas: 1 + selector: + matchLabels: + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + strategy: + rollingUpdate: + maxSurge: 1 + maxUnavailable: 40% + type: RollingUpdate + template: + metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + spec: + affinity: + podAntiAffinity: + preferredDuringSchedulingIgnoredDuringExecution: + - podAffinityTerm: + labelSelector: + matchExpressions: + - key: app.kubernetes.io/name + operator: In + values: + - kyverno + topologyKey: kubernetes.io/hostname + weight: 1 + containers: + - args: + - --autogenInternals=true + - --loggingFormat=text + env: + - name: INIT_CONFIG + value: kyverno + - name: METRICS_CONFIG + value: kyverno-metrics + - name: KYVERNO_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: KYVERNO_POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + - name: KYVERNO_SERVICEACCOUNT_NAME + value: kyverno + - name: KYVERNO_SVC + value: kyverno-svc + - name: TUF_ROOT + value: /.sigstore + - name: KYVERNO_DEPLOYMENT + value: kyverno + image: ghcr.io/kyverno/kyverno:v1.8.5 + imagePullPolicy: IfNotPresent + livenessProbe: + failureThreshold: 2 + httpGet: + path: /health/liveness + port: 9443 + scheme: HTTPS + initialDelaySeconds: 15 + periodSeconds: 30 + successThreshold: 1 + timeoutSeconds: 5 + name: kyverno + ports: + - containerPort: 9443 + name: https + protocol: TCP + - containerPort: 8000 + name: metrics-port + protocol: TCP + readinessProbe: + failureThreshold: 6 + httpGet: + path: /health/readiness + port: 9443 + scheme: HTTPS + initialDelaySeconds: 5 + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 5 + resources: + limits: + memory: 384Mi + requests: + cpu: 100m + memory: 128Mi + securityContext: + allowPrivilegeEscalation: false + capabilities: + drop: + - ALL + privileged: false + readOnlyRootFilesystem: true + runAsNonRoot: true + seccompProfile: + type: RuntimeDefault + startupProbe: + failureThreshold: 20 + httpGet: + path: /health/liveness + port: 9443 + scheme: HTTPS + initialDelaySeconds: 2 + periodSeconds: 6 + volumeMounts: + - mountPath: /.sigstore + name: sigstore + dnsPolicy: ClusterFirst + initContainers: + - args: + - --loggingFormat=text + env: + - name: METRICS_CONFIG + value: kyverno-metrics + - name: KYVERNO_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + - name: KYVERNO_POD_NAME + valueFrom: + fieldRef: + fieldPath: metadata.name + - name: KYVERNO_DEPLOYMENT + value: kyverno + image: ghcr.io/kyverno/kyvernopre:v1.8.5 + imagePullPolicy: IfNotPresent + name: kyverno-pre + resources: + limits: + cpu: 100m + memory: 256Mi + requests: + cpu: 10m + memory: 64Mi + securityContext: + allowPrivilegeEscalation: false + capabilities: + drop: + - ALL + privileged: false + readOnlyRootFilesystem: true + runAsNonRoot: true + seccompProfile: + type: RuntimeDefault + serviceAccountName: kyverno + volumes: + - emptyDir: {} + name: sigstore diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Namespace.kyverno.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Namespace.kyverno.yaml new file mode 100755 index 0000000..f305dd7 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Namespace.kyverno.yaml @@ -0,0 +1,13 @@ +apiVersion: v1 +kind: Namespace +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Role.kyverno:leaderelection.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Role.kyverno:leaderelection.yaml new file mode 100755 index 0000000..3e547a6 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Role.kyverno:leaderelection.yaml @@ -0,0 +1,35 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:leaderelection + namespace: kyverno +rules: +- apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - create + - delete + - get + - patch + - update +- apiGroups: + - apps + resources: + - deployments + verbs: + - get + - list + - patch + - update + - watch diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/RoleBinding.kyverno:leaderelection.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/RoleBinding.kyverno:leaderelection.yaml new file mode 100755 index 0000000..660f141 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/RoleBinding.kyverno:leaderelection.yaml @@ -0,0 +1,22 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno:leaderelection + namespace: kyverno +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: kyverno:leaderelection +subjects: +- kind: ServiceAccount + name: kyverno + namespace: kyverno diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Service.kyverno-svc-metrics.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Service.kyverno-svc-metrics.yaml new file mode 100755 index 0000000..945a979 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Service.kyverno-svc-metrics.yaml @@ -0,0 +1,25 @@ +apiVersion: v1 +kind: Service +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno-svc-metrics + namespace: kyverno +spec: + ports: + - name: metrics-port + port: 8000 + protocol: TCP + targetPort: 8000 + selector: + app: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + type: ClusterIP diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Service.kyverno-svc.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Service.kyverno-svc.yaml new file mode 100755 index 0000000..9146c62 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/Service.kyverno-svc.yaml @@ -0,0 +1,25 @@ +apiVersion: v1 +kind: Service +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno-svc + namespace: kyverno +spec: + ports: + - name: https + port: 443 + protocol: TCP + targetPort: https + selector: + app: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + type: ClusterIP diff --git a/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ServiceAccount.kyverno.yaml b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ServiceAccount.kyverno.yaml new file mode 100755 index 0000000..e81f8c0 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-install-kyverno-from-manifests/policy-install-kyverno-from-manifests/ServiceAccount.kyverno.yaml @@ -0,0 +1,14 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + labels: + app: kyverno + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: 2.6.5 + helm.sh/chart: kyverno-2.6.5 + name: kyverno + namespace: kyverno diff --git a/pkg/testdata/ocm/policies/policy-kyverno-require-labels/check-kyverno-reports/require-lables.yaml b/pkg/testdata/ocm/policies/policy-kyverno-require-labels/check-kyverno-reports/require-lables.yaml new file mode 100644 index 0000000..760e3e1 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-kyverno-require-labels/check-kyverno-reports/require-lables.yaml @@ -0,0 +1,5 @@ +apiVersion: wgpolicyk8s.io/v1alpha2 +kind: PolicyReport +results: + - policy: require-labels + result: fail \ No newline at end of file diff --git a/pkg/testdata/ocm/policies/policy-kyverno-require-labels/kustomization.yaml b/pkg/testdata/ocm/policies/policy-kyverno-require-labels/kustomization.yaml new file mode 100755 index 0000000..0573618 --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-kyverno-require-labels/kustomization.yaml @@ -0,0 +1,2 @@ +generators: +- ./policy-generator.yaml diff --git a/pkg/testdata/ocm/policies/policy-kyverno-require-labels/policy-generator.yaml b/pkg/testdata/ocm/policies/policy-kyverno-require-labels/policy-generator.yaml new file mode 100755 index 0000000..145a0ce --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-kyverno-require-labels/policy-generator.yaml @@ -0,0 +1,23 @@ +apiVersion: policy.open-cluster-management.io/v1 +kind: PolicyGenerator +metadata: + name: policy-generator +policyDefaults: + consolidateManifests: true + orderManifests: false + namespace: namespace + informKyvernoPolicies: false +policies: + - consolidateManifests: false + orderManifests: false + remediationAction: enforce + severity: low + complianceType: musthave + name: policy-kyverno-require-labels + manifests: + - path: ./policy-kyverno-require-labels + - path: ./check-kyverno-reports + complianceType: mustnothave + severity: low + remediationAction: inform + informKyvernoPolicies: false \ No newline at end of file diff --git a/pkg/testdata/ocm/policies/policy-kyverno-require-labels/policy-kyverno-require-labels/ClusterPolicy.require-labels.0.yaml b/pkg/testdata/ocm/policies/policy-kyverno-require-labels/policy-kyverno-require-labels/ClusterPolicy.require-labels.0.yaml new file mode 100755 index 0000000..c63dcbd --- /dev/null +++ b/pkg/testdata/ocm/policies/policy-kyverno-require-labels/policy-kyverno-require-labels/ClusterPolicy.require-labels.0.yaml @@ -0,0 +1,18 @@ +apiVersion: kyverno.io/v1 +kind: ClusterPolicy +metadata: + name: require-labels +spec: + rules: + - match: + resources: + kinds: + - Pod + name: check-for-labels + validate: + message: label `app.kubernetes.io/name` is required + pattern: + metadata: + labels: + app.kubernetes.io/name: ?* + validationFailureAction: audit From fa24c874b58fce4b2f4dab4568bbb83998501ffd Mon Sep 17 00:00:00 2001 From: Takumi Yanagawa Date: Wed, 6 Dec 2023 15:19:24 +0900 Subject: [PATCH 11/13] Move oscal2posture to subcommand 'tools' Signed-off-by: Takumi Yanagawa --- README.md | 2 +- cmd/c2pcli/subcommands/kyverno.go | 3 -- cmd/c2pcli/subcommands/ocm.go | 5 ++-- cmd/kyverno/tools/cmd/cmd.go | 3 ++ cmd/ocm/tools/cmd/cmd.go | 50 +++++++++++++++++++++++++++++++ cmd/ocm/tools/options/options.go | 39 ++++++++++++++++++++++++ docs/ocm/README.md | 8 ++--- 7 files changed, 99 insertions(+), 11 deletions(-) create mode 100644 cmd/ocm/tools/cmd/cmd.go create mode 100644 cmd/ocm/tools/options/options.go diff --git a/README.md b/README.md index 2279c27..5cabb44 100644 --- a/README.md +++ b/README.md @@ -35,7 +35,7 @@ $ tree /tmp/assessment-results #### Reformat in human-friendly format (markdown file) ``` -$ go run cmd/c2pcli/main.go kyverno oscal2posture -c ./pkg/testdata/kyverno/c2p-config.yaml --assessment-results /tmp/assessment-results/assessment-results.json -o /tmp/compliance-report.md +$ go run cmd/c2pcli/main.go kyverno tools oscal2posture -c ./pkg/testdata/kyverno/c2p-config.yaml --assessment-results /tmp/assessment-results/assessment-results.json -o /tmp/compliance-report.md ``` ``` diff --git a/cmd/c2pcli/subcommands/kyverno.go b/cmd/c2pcli/subcommands/kyverno.go index 3b0aa08..4f8761b 100644 --- a/cmd/c2pcli/subcommands/kyverno.go +++ b/cmd/c2pcli/subcommands/kyverno.go @@ -23,8 +23,6 @@ import ( oscal2policycmd "github.com/IBM/compliance-to-policy/cmd/kyverno/oscal2policy/cmd" result2oscalcmd "github.com/IBM/compliance-to-policy/cmd/kyverno/result2oscal/cmd" toolscmd "github.com/IBM/compliance-to-policy/cmd/kyverno/tools/cmd" - oscal2posturecmd "github.com/IBM/compliance-to-policy/cmd/pvpcommon/oscal2posture/cmd" - "github.com/IBM/compliance-to-policy/pkg" ) func NewKyvernoSubCommand() *cobra.Command { @@ -39,7 +37,6 @@ func NewKyvernoSubCommand() *cobra.Command { command.AddCommand(oscal2policycmd.New()) command.AddCommand(result2oscalcmd.New()) - command.AddCommand(oscal2posturecmd.New(pkg.GetLogger("kyverno/oscal2posture"))) command.AddCommand(toolscmd.New()) return command diff --git a/cmd/c2pcli/subcommands/ocm.go b/cmd/c2pcli/subcommands/ocm.go index 9b9659d..d3a7cec 100644 --- a/cmd/c2pcli/subcommands/ocm.go +++ b/cmd/c2pcli/subcommands/ocm.go @@ -22,8 +22,7 @@ import ( "github.com/IBM/compliance-to-policy/cmd/c2pcli/options" oscal2policycmd "github.com/IBM/compliance-to-policy/cmd/ocm/oscal2policy/cmd" result2oscalcmd "github.com/IBM/compliance-to-policy/cmd/ocm/result2oscal/cmd" - oscal2posturecmd "github.com/IBM/compliance-to-policy/cmd/pvpcommon/oscal2posture/cmd" - "github.com/IBM/compliance-to-policy/pkg" + toolscmd "github.com/IBM/compliance-to-policy/cmd/ocm/tools/cmd" ) func NewOcmSubCommand() *cobra.Command { @@ -38,7 +37,7 @@ func NewOcmSubCommand() *cobra.Command { command.AddCommand(oscal2policycmd.New()) command.AddCommand(result2oscalcmd.New()) - command.AddCommand(oscal2posturecmd.New(pkg.GetLogger("ocm/oscal2posture"))) + command.AddCommand(toolscmd.New()) return command } diff --git a/cmd/kyverno/tools/cmd/cmd.go b/cmd/kyverno/tools/cmd/cmd.go index 89adc9d..ab035d4 100644 --- a/cmd/kyverno/tools/cmd/cmd.go +++ b/cmd/kyverno/tools/cmd/cmd.go @@ -21,6 +21,8 @@ import ( "github.com/IBM/compliance-to-policy/cmd/c2pcli/options" kyvernocmd "github.com/IBM/compliance-to-policy/cmd/kyverno/tools/subcommands/kyverno" + oscal2posturecmd "github.com/IBM/compliance-to-policy/cmd/pvpcommon/oscal2posture/cmd" + "github.com/IBM/compliance-to-policy/pkg" ) func New() *cobra.Command { @@ -44,6 +46,7 @@ func New() *cobra.Command { opts.AddFlags(command.Flags()) command.AddCommand(kyvernocmd.New()) + command.AddCommand(oscal2posturecmd.New(pkg.GetLogger("kyverno/oscal2posture"))) return command } diff --git a/cmd/ocm/tools/cmd/cmd.go b/cmd/ocm/tools/cmd/cmd.go new file mode 100644 index 0000000..5b601a5 --- /dev/null +++ b/cmd/ocm/tools/cmd/cmd.go @@ -0,0 +1,50 @@ +/* +Copyright 2023 IBM Corporation + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + +http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package cmd + +import ( + "github.com/spf13/cobra" + + "github.com/IBM/compliance-to-policy/cmd/c2pcli/options" + oscal2posturecmd "github.com/IBM/compliance-to-policy/cmd/pvpcommon/oscal2posture/cmd" + "github.com/IBM/compliance-to-policy/pkg" +) + +func New() *cobra.Command { + opts := options.NewOptions() + + command := &cobra.Command{ + Use: "tools", + Short: "Tools", + RunE: func(cmd *cobra.Command, args []string) error { + if err := opts.Complete(); err != nil { + return err + } + + if err := opts.Validate(); err != nil { + return err + } + return nil + }, + } + + opts.AddFlags(command.Flags()) + + command.AddCommand(oscal2posturecmd.New(pkg.GetLogger("ocm/oscal2posture"))) + + return command +} diff --git a/cmd/ocm/tools/options/options.go b/cmd/ocm/tools/options/options.go new file mode 100644 index 0000000..63ed570 --- /dev/null +++ b/cmd/ocm/tools/options/options.go @@ -0,0 +1,39 @@ +/* +Copyright 2023 IBM Corporation + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + +http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package options + +import ( + "github.com/spf13/pflag" +) + +type Options struct { +} + +func NewOptions() *Options { + return &Options{} +} + +func (o *Options) AddFlags(fs *pflag.FlagSet) { +} + +func (o *Options) Complete() error { + return nil +} + +func (o *Options) Validate() error { + return nil +} diff --git a/docs/ocm/README.md b/docs/ocm/README.md index a48945e..edfbe7a 100644 --- a/docs/ocm/README.md +++ b/docs/ocm/README.md @@ -9,9 +9,9 @@ Usage: c2pcli ocm [command] Available Commands: - oscal2policy Compose deliverable OCM Policies from OSCAL - oscal2posture Generate Compliance Posture from OSCAL artifacts - result2oscal Generate OSCAL Assessment Results from OCM Policy statuses + oscal2policy Compose deliverable OCM Policies from OSCAL + result2oscal Generate OSCAL Assessment Results from OCM Policy statuses + tools Tools Flags: -h, --help help for ocm @@ -84,7 +84,7 @@ Use "c2pcli ocm [command] --help" for more information about a command. ``` 1. Prettify OSCAL Assessment Results in .md format ``` - c2pcli ocm oscal2posture -c ./docs/ocm/c2p-config.yaml --assessment-results /tmp/assessment-results.json -o /tmp/compliance-posture.md + c2pcli ocm tools oscal2posture -c ./docs/ocm/c2p-config.yaml --assessment-results /tmp/assessment-results.json -o /tmp/compliance-posture.md ``` - You can view the compliance posture like [./final-outputs/compliance-posture.md](./final-outputs/compliance-posture.md) From 84d3e4bbb7c44fb158a00dd0b48708cf9cb6dcec Mon Sep 17 00:00:00 2001 From: Takumi Yanagawa Date: Wed, 6 Dec 2023 15:38:07 +0900 Subject: [PATCH 12/13] Separate docs from C2P for OCM and C2P for Kyverno Signed-off-by: Takumi Yanagawa --- README.md | 104 +++++------------------- docs/images/e2e-pm.drawio | 165 ++++++++++++++++++++++++++++++++++++++ docs/images/e2e-pm.png | Bin 0 -> 99922 bytes docs/kyverno/README.md | 112 ++++++++++++++++++++++++++ docs/ocm/README.md | 10 ++- 5 files changed, 305 insertions(+), 86 deletions(-) create mode 100644 docs/images/e2e-pm.drawio create mode 100644 docs/images/e2e-pm.png create mode 100644 docs/kyverno/README.md diff --git a/README.md b/README.md index 5cabb44..f830bc0 100644 --- a/README.md +++ b/README.md @@ -1,98 +1,34 @@ # compliance-to-policy Compliance-to-Policy (C2P) provides the framework to bridge Compliance administration and Policy administration by [OSCAL](https://pages.nist.gov/OSCAL/). OSCAL (Open Security Controls Assessment Language) is a standardized framework developed by NIST for expressing and automating the assessment and management of security controls in machine-readable format (xml, json, yaml) -## Continuous Compliance by C2P +![C2P Overview](/docs/images/e2e-pm.png) -https://github.com/IBM/compliance-to-policy/assets/113283236/4b0b5357-4025-46c8-8d88-1f4c00538795 - -## Usage of C2P commands - -### C2P for Kyverno -Prepare Kyverno Policy Resources -- You can use [policy-resources for test](/pkg/testdata/kyverno/policy-resources) -- For bring your own policies, please see [Bring your own Kyverno Policy Resources](#bring-your-own-kyverno-policy-resources) - -#### Convert OSCAL to Kyverno Policy -``` -$ go run cmd/c2pcli/main.go kyverno oscal2policy -c ./pkg/testdata/kyverno/c2p-config.yaml -o /tmp/kyverno-policies -2023-10-31T07:23:56.291+0900 INFO kyverno/c2pcr kyverno/configparser.go:53 Component-definition is loaded from ./pkg/testdata/kyverno/component-definition.json - -$ tree /tmp/kyverno-policies -/tmp/kyverno-policies -└── allowed-base-images - ├── 02-setup-cm.yaml - └── allowed-base-images.yaml -``` - -#### Convert Policy Report to OSCAL Assessment Results +## Usage of C2P CLI ``` -$ go run cmd/c2pcli/main.go kyverno result2oscal -c ./pkg/testdata/kyverno/c2p-config.yaml -o /tmp/assessment-results +$ c2pcli -h +C2P CLI -$ tree /tmp/assessment-results -/tmp/assessment-results -└── assessment-results.json -``` +Usage: + c2pcli [flags] + c2pcli [command] -#### Reformat in human-friendly format (markdown file) -``` -$ go run cmd/c2pcli/main.go kyverno tools oscal2posture -c ./pkg/testdata/kyverno/c2p-config.yaml --assessment-results /tmp/assessment-results/assessment-results.json -o /tmp/compliance-report.md -``` +Available Commands: + completion Generate the autocompletion script for the specified shell + help Help about any command + kyverno C2P CLI Kyverno plugin + ocm C2P CLI OCM plugin + version Display version -``` -$ head -n 15 /tmp/compliance-report.md -## Catalog +Flags: + -h, --help help for c2pcli -## Component: Kubernetes -#### Result of control: cm-8.3_smt.a - -Rule ID: allowed-base-images -
Details - - - Subject UUID: 0b1adf1c-f6e2-46af-889e-39255e669655 - - Title: ApiVersion: v1, Kind: Pod, Namespace: argocd, Name: argocd-application-controller-0 - - Result: fail - - Reason: - ``` - validation failure: This container image's base is not in the approved list or is not specified. Only pre-approved base images may be used. Please contact the platform team for assistance. - ``` +Use "c2pcli [command] --help" for more information about a command. ``` -### Bring your own Kyverno Policy Resources -- You can download Kyverno Policies (https://github.com/kyverno/policies) as Policy Resources and modify them - 1. Run `kyverno tools load-policy-resources` command - ``` - $ go run cmd/c2pcli/main.go kyverno tools load-policy-resources --src https://github.com/kyverno/policies --dest /tmp/policies - ``` - ``` - $ tree /tmp/policies - /tmp/policies - ├── add-apparmor-annotations - │ └── add-apparmor-annotations.yaml - ├── add-capabilities - │ └── add-capabilities.yaml - ├── add-castai-removal-disabled - │ └── add-castai-removal-disabled.yaml - ├── add-certificates-volume - │ └── add-certificates-volume.yaml - ├── add-default-resources - ... - ``` - - You can check result.json about what resources are downloaded. - ``` - $ cat /tmp/policies/result.json - - ``` - - There are some policies that depend on context. Please add the context resources manually. result.json contains list of the policies that have context field - ``` - $ jq -r .summary.resourcesHavingContext /tmp/policies/result.json - [ - "allowed-podpriorities", - "allowed-base-images", - "advanced-restrict-image-registries", - ... - "require-linkerd-server" - ] - ``` +C2P is targeting a plugin architecture to cover not only OCM Policy Framework but also other types of PVPs. +Please go to the docs for each usage. +- [C2P for OCM](/docs/ocm/README.md) +- [C2P for Kyverno](/docs/kyverno/README.md) ## Build at local ``` diff --git a/docs/images/e2e-pm.drawio b/docs/images/e2e-pm.drawio new file mode 100644 index 0000000..0adb5b5 --- /dev/null +++ b/docs/images/e2e-pm.drawio @@ -0,0 +1,165 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/docs/images/e2e-pm.png b/docs/images/e2e-pm.png new file mode 100644 index 0000000000000000000000000000000000000000..5a96786c33beade6b540b66735e27e41e31407e1 GIT binary patch literal 99922 zcmeFZ1z42bw>~_yQi9abiXuo4jkE};NT{STzyL!?cejMJK{wd6K{pc8pa?46NJ|Ui zw?`R7Up>Ei&wJkQ{0|ow%slhN-fOMB*1hhv_S{fWk|)Ba!G}N~MCZ<)xdee=!66V# zwgb4}$RPWXTi_pt-6i?ckeoKUX$VAK(_U87-on|))Eo(6=9BsMikVLqyf!pN7~3K& zn0a|j4Vn4QF!S;Xsb5qyGFCM)5aGS7dQQaA+D1?p90q4tA}o;K&QU=aBROHHqhD`g z;Vf^9ur^V&GDMn#^9-H8odx3+Qd4#_mFt$ZM?(1E6c~A!~o4W4aAGUj) zv4g20(r))|->$T`vNE?fwf^y-ft95t(!ljW@Kf)JIURrT7!A~a1rXj zWdnryACGF78rqxeo(mHc`8F8T>1UCq#wNRu7UmWD_JIWgee&*1>`V}bR!-lp|9a@F z;B2j|z?HIJbs~c_M+pxtmv7g}{pQoX@!KLTcc1-VU$8r1M})bRnBwlIg2KD9*)5#>1d+1Rdh9Q2W#`bbLylfRvS_<8?I0rCAtKtO29D$?MuJi;Dn zhD2H;ZU26f68tMA#s6zb0n3#GVv<9c8~ptin*h&WC?Q_KKUfIT5JdCc0B2=uZ(?O^ zWr;AC{eER6dtN&$2U`Q=?o~epczJZ> z|9bC#6!ZCa&2b;-`PWS3H|qXsB>#o7{|&tw3iI#?@$G4EAAFD&;Nbxg9j)VaR_3M# zC@d;%Xklt;3KkDAVJk~;KnASZ|1{YAv__2(hC+y6LP33gK>;3qFfb!4OMA4ZLcwcu zgg(+-#mdg~>!|q77xm6r}J-f+PAnt(q)ZuO9%sd z6fFM>avC)JMvFv*4~??-3FTLK9GxluMA0kkf*=xF0Y47;tx^_5PK=d*~l7$i1cetCai4 zr2J1+bsE)KW{Az^X+`wg|tt0RYzy+w-S~&s^@_(~O zfT8IRw1?*Vl`{Uj43r-@+Mj&wzl6#EDr}8T4|%u%Fb9#~dx|K?C%pUqd#;Dd7*XOx z;dIoQKWBQsb>x3FD(6S1=xE3OEd~5Twgs|M1PU*sPqRiPabLsaud_PApLjQZp>Mg@ z9-;kH7WjwrcgOXe&HXllUq21dpj;xm(Ph_)!2`K?1VFBY{@Ddb=n4FJ*$4lxkf@+J z3NBcK%)=P<0{s7az|IJ5rumvfLJ*TCE1z-k1#(-kLEUj!U z5Fq;p_uxUL343QD5q9>R2s?1aA5Sz#+Jh{H6Fknq)YACd=RDTmM#6*6AvkxT3F;~O z2s@;?=~u=9jCFTV=+Wd z0#$24<&NJ>pNCaNT?K_4zfo{1vMP2b(R%*P^ughMCh?Qo`+Go4l!@(Q8~DJF99V>Z zM#3og6ZRAk`bE%(p=pBsNC<}ZCg|1s?_`Ype}tcVhRu2gX=iE+ieJ1um+b-N3>5jd z)Xs0?#y_973!o$UuA_wgG9lXo1^d;2Ms5Fz76gD?QKH=kzAho{9DsNH-z#z9T`Ki^ zX!<^8uL1@;#7u1Nk;obKy9GfQI&S_)j`)wvfQrmHW?mUo3{;i@NmM>`=+&52a<) z?S68J|5j=FYt8#>MI7)XD6jeTfEJ1h;SvBbVE4dxrsN-2#Q`<kkMXcc%QS}1Bm;*C3;PwW%=)9fuN}Vb^iOjrK&B`&K?v`|0B8lw0QJ+ zkbFo%AkH7lM9iSO0V&KQj9LhPf+S%gKlM(a*}VOdL|fpWF3DZ^vQLuAmt~|c0Cd1A z1OCbZ?i@%3$W>0}4ASWDno|Gsi1EJxE;s|n2<(6l&2OMX(qCF568d9`xTi>IJ3FME z-7fR>Em8kJMgAUI{M^jM&;M8ESZL6>Z$&DAPE%V;&|~($xunhaqZi~u*Oc~oL3HTY z?*#u0@Qv<)*(dTnQt>BF5%@)Uq$Lt`8lhSZej9`TcPF`g=$`0(y7?v7h*sEt66?`a z@~@Qh|1jgrhnDR>(!rmxKty(XF8Ar+zcBv427vy&^908CD=)p*&$i!Z{3&}+U}%{3 zn*TBL?vvx+dv_H~@K;pYFXKDf1plM>{>KdTZ@<5am*=k) z(I1;rzKIC9#J~LxD_;J;R#tz^gTKlOuvLHGJyyKJf31xESUdfHF~tO1+kX)Y(71Yk zDEL$S+-~jkH*oPEZ*BX{z9l}ve?-XtGvM*(;Qa6GTteg9AFCRCU-!oR9@_pEXZ{R6 z|0$%1-bJ(@DWZ|ge|uY|z;2qfi{SXt6gfIP{-$hT;rvq{<=QkDUxtB$t+~r-TZDlb zYH#j8D$sqe=AoSF&l?HNkw&O{pj&|d;Wk3sZ(nY*cL91A;ohbtL(n#9u)9kUv?`;% z_T*2|4*!qMF#_l+)_&~>>^ipn+Cisd|AKaa&zw{j8z+DY^a=UdzN-RGV7jfw8{KkuQ%u3A}#XSFCAxoLVoQD z1=2KM7XRpzTrC3Rqhd1I^h->)I(*k$zO=6=*?q7tb(&8aA1HR3*m7fth<9sq8(3dX zE>2q5v>-NQI)eGr@4;h3$IT6iIDS6P1i8W0kNwlhOp#KUhv5gWXQs(YVW0WoH(g=f z`#{i-zsDoJ&uCx{Uo#;k!T8}fa;i)Gk0UvLq%%sYh~~;qcg8+mVt?qTI|oT&9z1K$ zOp+5o`Qx2QFu<^}{%_d(1^$21{?CmBa&W8!djI-oUHc!+9{c<`sr1Y{kXNfKdOX5{ zot8>xS94@?Sx(h3 z)3dbX!X>7Iu0Hm|CBlrb@sF9rP#EBFVE$q8JUjwc1Y4tAeQ{`?9#5}ZZyw^govp2Y z^67Ss!3vM*O`3TE=}?zs;{7%NUiX4WWq#}yy zJ6?RSW$fi`(uhEIx*OcDRn`^8i*=t}+IN}{FH>sZ6fb7nNbQBTmoHzYO|d;Hu2C4s zxrO=KW&iSviU#*%?)@YeM#D)b?z-a1ykxt%RD=j9F=ne4&tMKly9`xJOc9Y2c1`5u z5GCpH6Bh+Dd$8=^T3;BysLi7BvRr#$gYO2SgoUYiBp%?vGRv-233t_7>ODSKN z>h*BF8$K>4H3XM9t4B{W9!NFSNw&MlV{)IyuVHyP$%Z+}I)u__!55PQ*ZKHHqwdW7Y8z{a_i|{pXIiAe`vaStQ2usWKV@)Vyo}a-gv{k^ zM+P$YmL&duvy`KrBNukOq$$MxV~(iH zM?+e;<_C7R7kRG_2%u*iBt=7Z0Jqf+B;HWRA|#zEl{$!PO>o3~NTv z;`H;g%i;3&&#xgJbt)OWD9QEOZ6MbCveQ6YbO%z2$_;nw43Tlo^mywz+Be{n?M`o&p6YdQKo&2^;RaBV z4{;e-pYV2p)cc=q8};lQ7ZyG&)n6ty*;Y%;_neOp)&->-7T#!q&LRnQ#^R^M`EWne zA%4=!Jl>;yGndc8jR;*!(r4Tn zs_!T!ENUL{w!=uI!yg{fBWb{L?tv!4RlHwPQ*XGvI>CP*kB25uk0b?CxC^Qx^~Q#- zZ$a23DQ5D*Ti5pN*n2FCK`M=Dkr&KvPo1Bc3o-k6|9E+EdRUe|jSZ|vdT-HFL;^w7 zL>CZNeNKzyI}YV{D%O7##U33iv`X*oL61k}AHvljZGa!C(kK$pP-ud9N8{%KY2nA+ zjEj3%YD9D)ifyAGN*AB9(1PDULm01t!EwkxF{e7U7)L4)T*J@aOoykp^jK}9*wKRh zz;c*$!jjU*gc) zM!-#oo#&etLk_2=)+;(DJ1R&A5hEBXS7|H`Gke*@`|9MCY5(P1PWEPOdOT%dY|<3N z>bIsIA1Kvap#i>khr!H$Z@TA>3=wb}V&GGDq;eAb)47I2-!+VoDFDMZ+jPoZ41hHf zV_RRs?yO7UY;JeT2|se5vSWt)Kx!4Vj}BjC#nZx|I&~VN*Ag%A@Nx#O5vDT}x$S&w zo1jR&p0KwO#1q53NbgK1#epFu10ErgDh56yVFfsBMbNuYTUp}}1PfypcSs&Wq#u+c znr>rV?vfA^gzaZ^3+8;ROi!N21h>NuI^VBQBgis#7(ln`_)~t-4oVt@mi?5i2|~G^ zAF@>VNYU<;#Al2oDDlmPc>RJPWvtTbuBkVsL?LLyw=E7N4(pBG?I%H+fJ}dv4PoPCa~2;KcBjE zG)(oaR;vseNFI5MJwgI+Nz=FNItfft0Lt%2kB2utF7hCdqD$}P2CQWgAA9lU=+KxH z#7@Yf#;soOxWY>}-!QYgnm}jJ`_N8b>DsR47|6z*v|yb_4iiZK)6OT^38+Mg>v^dx zw&q~Wmy|Rd3tal4+s{44KdEL18(@^xBytHY%qmRyW$T1VI`xqr!_X$y+fqzWiE`2Q zfe>@CR-M*$MzosH^|==?$!dg9-j|lfkT~R@CoelqcA_(CcJR%ZF1L`7kke3=&&q+A zHqEmc4l{4Ina*uJNxF9|?dhINW;=$#t!+K?!Qb<6{mZ7Br{M-6idndM^)?+`-0g7; z#mZF4__#1!@44IK!p;VP^c^-$H}eGqlg) zd5ah&;$@OjS`P@A=^N)N$H0VBl3{Dp__#zNjy!iGeQ&s2lce!m+T3(zg}$JLC^<|v zG949Lz>2PX5Tvg|;~lUPM6otq<7+}ULJ9{ajv$Pe!!Nziv!#^I4tL_(ahb&Rs~&K1 zap91;!e-WABESy4WbLmObFw?{loncZQrK+dJ`=5q<)MVH`w(~>vAlI}p=LILjFygC zl?(|LpPCS`;8sdP8bJ|;@u=_!0i}(}*$g!mZ#G@e>1|@@1Ej*N`o?7AgzHDmM!)h( z^W=DA^ZGJN`ki=z=FOPoXB6xz{Rs<417nkz1h~1l0!MPVlfq-B&Ohj9+tgNoU+~l6 z8n=sb$FjfwJ-Ksj?ZRc77ncH|B|2RGl=nyG zuPN<$35sAT^=Q-jYk}0%&e353?5{`IruBg(jn-ys)`-oatmgchsb3=lMOo zg5c5=vAKW&~R-+5vWH<9?%&w9t~XCKiwwul zZ}S<4Kb6=%b0bGTEsF&2vV~$e#Wi7*jw6duh~M!dwigv{f@rJNXoQW3_+QP*Y7VEm=f$S~67}q0US&K`ESgkUNxz<_p zjFYvBFD>$^+r?MF_Zo{38v&2&J90r3%5OlAXQlSYxA0AFgV&B-7)AnAGCE~JjFK=u z5Tmpp^-HW?M;U&qYxiT}%!kV%d=IiXmL(gi{dUY`ODeaQLma-SWd{o>@K$DVyn1V6 zeU^1ho264N5uVlCK*PliCCquK_4NL#`{&gj-4MA@Xg;Ht&I6^S+-Ppy0r~M^_BF-S z?i=60nv@I4Vmu+1F#9nq-L1(yN6u&pW)3i|25iiYqHAjA>zk8p@gHNow6yuyo1fXy ziIL!oYz0P42InXXnpa^7T&n`+s#s*?#h7!}F7-(EB^*T%Ah?6$0Ss&04o`n!aa|-o zq9-Gbg!mxt#iX#vu8O?qi5NrD5Je0@fqMDb{_%sQdL6R|^!!JM4jU}$ zUz`j)-PY$!jpsMv2$?y3bdq?1ZefQ_-!sJJv&p({6x)!U?dw(91YM=@m)hktv)ON8 zl7j~~dyXh;l!?XF=7kxx%sICQQhgGL{Rb>&mObn^-$vP;}Xq6IDv_et{*A5F~wggewHnfR*Ex$m&#=w>FEUaV}eh4!2EqfpMl9K}3#D z7&BxZ#JH`#O($Er3%$<{iXsiYhn>F2iAsVH$^+#WD(NeAi#3`4? zZ2jAVPKOQ$NE}_edzzT6#EM3H*PF8OW28JVOC8lqw#q*N;=)kC%Zu9OhYt*;`C_u; z<6nF8;$WsmhN$=ZFbw|}kEI}kT?U4PCm=->QgbQ?2Qmbv%NVi`6AdvkrgF#Rd%()wyn2-`d z_2fxbp|R`{Z#R7W4%{k5aw@gQM@mzxf?s66!5BIYDaX*p8X8k+e0hipUO(i~P~GvN z`)0nU_!E5mMO^=>$7;?1>%s=1EkMaQLubODBd}=HGXsotoDn=Gu}r+)?Y`lDBK4Zw zul>UPCi_=Ex`fwc^LZE44;e*2VtERHjK_|=x;=KTwoe?f-gs$NGLqANAgKTO# z+)oIgGQss;pkp4EV^|(x)lXC!5q$b!K`Mk{lykIh>glL>7w{RMVl*%1?T+WOFB= zMV`U*S`Iu!tv>Z40Ct0gUOOkbu&ljU#|Uk58*tl?+MZ;sVpMxP#Mn?B2V8<#e%m2j zMLY;M)KBpFwc*=pnbt>oDDg!qH@Rb@kgQkMUjmFxL>9CX?mt;!k*u4wmCL_uHqb{$ zb6_a5<-+XTLjH+Pwd#sR-|C@W71q}xq`u7&O&V_(**)K?@q}IpM~8VpFuuU&CgeWQ zneH!=o(g$&`e?&JGWg0njwObYa?FGE-U!E)cjm;)__(cXkQo0-7>?hB8zihYx|Ak$ z{l&zp^J%}+M})|2iEU+ZWHHLkSFU%4kXdTrV#Y3Tn-A;C)1}WS^pN>~=*|y4-A>_8 zNIN^;TAS3YI<ZIF!KC`COTGte2crNIREV=FsQ#Or*lop8Bvi3TN|IGe(Czxo5ks zk|YR-5?8Ff$l%@%*OB2Cv$tU#Ge1BkX{caDBd(y_opq!C{so&i^`|Oj@NO@SMnJKK z4hv=79%%6NJUW##O=b|8kg~wzW&X5|M)J*Ps+sNd2`a+)Q;?lSG0%a!$4d@x_}`jM zJ6ZJZxmi!~aiU0tQyKyE6-)KBqo>m%W0uvr((IG>uGzK z{0t8_3&^1ZA+dFf;3nC4&Dk!!$9UF*MJ^eais&E1a3`#CtrE0+CL-@Z-{9J^ zgFG;@GTnB%XY24edyh7f`j!i?`-@1`p%mmpQutvl7wDR->(0&u$=F*&y&CVQu{?TH zsPKBOR{Oj2!50EH{cq%miyzYA?~F>aAO`FQL8fXomp5ksj7gh^-^!BM5NdqH`?GP2 zwP$GJ^0T?tgec@EQQ~)BQ*bXZ@=bek?>A)69h7>am$lx)_{e77ti_bE4(xGWO#$8g*Njnpa1HVlZ0qj8WG98e&{obQAT}WNKbu zy0Phi1+xH*gCI%O(oSNIN&3qKGk|WV#%D!{uS|}M2y!w@=d3yG1~}w27Hl12FKV(NjH6BAawF$ zgfVt>dGSLZHPZ>Igjz@eIw;^xv1-M=Hq##*Eg&;YPf5BejtgRkh++8x zzJ7A=5s1ZW?~6zY(pS&g`Hu_ebl!5#xfpLS1qTp_h?jS9J(Rkwt1C1r$S$L`ef1JC zfj^y~?|}JX_>ErwvGBN80BPn+ZZG;-T+>cIVWr{H)${y&DspM;sm1P(T|FzKMg>QyN-?ajD+U)6o1Pwi9%cIl(bd#vm>HZFeP0abELw}o;iiyJv3 za}!9&Jf@UY^q?oMb?$pu>BDwvIcV}LwK8gRky9*C!irllF&d?Jv5tQzo1LAdNK*+y z+`fF+fhdd}tpk;`gRySn~lnqRqaBCvrts{UM;FOKuz*v3=;y4D{OB#A~2;q8o6X;dI{^4lMe-_C8xa zG-Y{Pp1}nhkI_A^UnSh;%jfm?c3fqPr~6!IvWIFtGu5-L$D=g#0d3;EvpH!qeJ>{6 zZGFCIp<*k~aqh~>OwS>B=@Y0>mQbeEV8zDH)`HE*4VHIHKsdJaV< z=u#2f@hy(mm(N1Wx>7!x50vN$sd=&I-aS_cq2;=H`_9z)J#^@pC^2nu#}y$4B-H6U|X ze94kBRJPn!yE&N>0jf8{$!_!2j9%M5R+XPA7b?Fh5*WEMEE94%ODqCXbIQ$SnW0$tSF~X z@iptZdk!k$F3jLOgaMu?+H2P?evF}E^J1^ZVl`e7I5Ou_*k>C;;n;clMDsGP!o+jt zl3V9WLvxus)#{}L68DfI8|lN2bhEclkS3k!I7Th8K0P{aL=RFtUHj5QMo<;R4 zFciNAsEYyvkM({h_2d0u&1;r9=dVU~zIUj?z#A$Y^nAL!QbTaEBAs4dxsOWM-G?Q` z{V*QAJ;{B=gn+Cp4)a3#W_nc}P~aFXw|f1sv!*jcej(W6_?d<9&QyHEGv$! z+umI6e0cF#0^XbZinMfYv-waSJ?|tMyUb`V_%(3^Ief*i(+pG_x!pUtOJXxu=SvrS zaXL+C0nsHi=x!ixyInjvt)BzN%eoDv1cvE#<&aLUPPrgKMHi34x*c;#mmA*YPt9l3 z*~_iCTG7j(DNgFVfRcsgwZ?obx!DaX1p$SvP!TUZ=crJ zatY2#uq=5Qo#3@lzHZ)0IAL54R=S{9NbyyHYp<(bDNE89PJQ~kK4`HN8X>vUi=Uk) z6F5?h$M~%0exp7H@lITFu}K4rDilXTm@$B>%Pl4)C1RpAAqH3LT?(k|4P1@w(v<@s z)WgnnkM3&2zVu1t0l#^TELB5#uRaF8Ybt~5)KNk@;SL?&;XraFPi3l1GG3O@kzjvL zP0M5)Ax*7F-ypfpGo%gpK`ZvKh0JrePh1p->w0~DPNC2PcS_2>cGe&qT5gqG8Oz0Iia*V-o${m{>Z^W8ceW^sx8gjBGqsuG6ylah=G3m^zcr)tBv^O_pAOpv`s^|vbIqlHVf9yn`%?`?p; zqR_p{(BmatTN7QgyI3wY@vA+GJnbBR6$%hSyhZF84OgpJBksM(CWLV#r|9Bzl`3G> zqdthLu51I#KAW7gQc=wBwhR4PjWJJtPQ2V^ZokQY44h^}dqVlYz72Wpt0(}4p0Ha_ z-v1DLvQ#EMcGoA}Ru}-z(b=}N8A3@@y%B*rfeI|*U^4^D20=eYJRa78} zt}i^1f_yh}cx4{>e7_B#`y-{|f^#w#QhcKWXRijldZj`UR~7TrtEN#x1X%#s_+MQR zlA|-p2;V(9$XGIJ>Tx4&*7IHN`YVI23E*7`X;T=GcX3*e|94m|g?;NR(CCdkhez25 zRgZT@9ZZ$*7Jzu-sHC>;L6xtaBr)D+Vl4e_k3|xvo3VKx^SJJb!9!d{0{McO+WP@- zNN^A)iCJ`@%6Pur6PJgiifml&3f2BQuquNwjGwE#r7H?Q)58K`fDA!QFoz5vaEwr! zI@LpvISiH5IpQHBNDRc}fF3m@m`kvGe2G_26v9!sjORUW19@AwO1DEl-upNw=4Ms~ zJ(=f+ws{>JtDPGL#KVEFaq_SrZ_N5NeU}}A_kzth6DZ6SuZiAMPvAbp9mj-#}}-4rHO5|p!!L5LGMERj`-F?0%&f)z`YO6t8St8(W- zW{1MrLkLJ!9fUP}O5pB#g!WYoy@mq+oGB*00IN&(7hiYqIZ$}h_DkkM7EgN9 z^^;a9&cgz+Vu$Bn9<)4Qg125m4*%T05X`U< z8&2=&oS-ers_F5ygu4VG=*J|@CbwWjvSfo3GFUVi7F@90 zm-6cNsvrA9*84P&-XYORLMO3Gp=BCKOzEgwV3*q(nKwa=`uPa$yTz(Qx^PZT#RIRg z^B%Yj$}PXB#~ml3YVTa6=nIFET-%Vos=PVfxBY0Q6E2%zpV8q$PXVwjjr;p--|#Z$)AXrnSvGQF>9by9=oc=LvDiSZsFPAcc5ZafcjSavAw601}^2`g2nfNgB$ zo2&7WUHqdbB1s{x+M-7$mZq6XYV1nN{Fi)^5tf8EXGX7b`a^1oPBKkVUvx$w{N*JU zVRv~LI_na-D47wgBmR*1VwV1efb~xHZW>4}R&ChPAo2dd@+004v@zBg01dnn?qZBN zoE~y0)vMSAP6%6}C2--{jyx1MItslS7$n7XkjLs~rDSe#T0u*Up(ugtR07t}I@#4L zFYpJ$D2QjXef+O$wnpg);PX&6rY$+eAl`0^M}M>7JD2Uo>K*uQCN#TRJ_$bS?Y33h z)hp271-G|Z$gwZi;~-ut$W_4_+)kdh%+a;)#CqCGHH2oF7w=&x&Ebi(}OVWu8`6R%<*&H>!(7tczW)*1SWUe z;E>k3Os}%BxyMY_Zc?!|8`R# zINnx?j3G`#`1XAS5a@hE8S6wzKFtvsp_7pTfoj}_#1uGWb%(@NR}zw^T*=;V*p@Yx z-QFrl(hnXEY*8C-pT;rpKNoPdQ{lO|cQK>_*ZO%viu@tE!7e+UP1qT#5ZA@Ds5I3? zZgF!C<1cL9SGAYmJ_QO2=PqNq=hsqUyOWYwu3#=BNy_VG{TF!8fMvqdV3b~ku;hxF zTpC|sxGD+I!ZgucQ?N{qqcA~Dhx&jId&X3-Q{i+sLQ}g;(S4L&h(3H&hN136`Q_xB zIOU#MS(F10W_UG7TpB(iZjO(Zv-!0=9dVxAsL!zec)pge=epI%$vm-U+(km~`ihkN zse}G8gG??Z8zQpHw=H*qox~=+4na2OUk!6*ZP<+|Kz4HSiTno3`eZ7`pp?hlW4LeX z`(wSzY>v6G!o?R6GWxWLq}+r~H$8J?(CkVYSkFrU2v9`CgopcqA=5>&Egfx{N!JM8 zyh@0}(X_GHaCjjL`ZDs-*?MeGb+ggQ9rt{bQC`Uq~x^7E(GjORB-If2WJh%$|)DWpX!N8js({P4h5Sb95Ib79HG)Fh(v*wA{ z`!G>IB1#4%S$S_uu7lxR0T|?b=G^&+mmrO9kT8t~R!tEBp}oOZw!l{y%%UqtM>r(A zK1tY)T#D5kF3qp;nWoPnN-aNxh^GC}d@UpEP9xoU?uKU3(77XJOmq|x73yEftWMBt zJw4BAhdIqrqA!4tJV0be*_+FLCFn?q*&;Nc1-2cqd4?B-%g$0_xW==_v*w5y3~~wL ztz#=^E%v8_=WtF46OP}DT@IBrc2F z^_P73r`AGf@btV2A5(o%HW@br{$w$8)c zjb(7k4m~@*zu)&XX4HB6^0jwn!pkjuHXy$q4WPBG0-Q_!WU|}HJG0z6X*~MtM`Z$r zdJQ7#Kmx8Y_Br2n{QT=2_!FPT#%VagX4slef)i{c!Ce z$!7*BZu7-OfFPM`Z-`*Dnyi6|D1mnCIXWe=r89ki^65p!zYaRNkI|OyP1Hh4h9AvU!lkGX!qr{r~`HcfRtIztpDAi#&g}ohF zVb=MhB`7vW+pblhXe5|@ak2K0)%|HuhB^_Olw={U7Xx>UqqtfdKvWAv>n*xaMt1vz zVhv|upD!o~reAq}t!QH;q_e={D!U=H0&1~+)vBE0Hj8ro>qjd-kOn$C!gtS1{Qz4v z^xmrSx&DneB@Sj=y6f}(7r!%0;`7Cm3|Uv6;aonn= zC!|s}&uI?UD=eAJwN_w$s4=2=$Jsl^9#6^lJMOY%maVbRy9<*$zV$!y3!`zNNq$&Cykd z5bXZL8R_g_Wbq>ihsvlOKWk@&Ko(Cwa}gIr8r@9qscpYK73_DH_@p2}()!0<9gI3& z7D?NmE=$l73&WE9yh672)|jz$-Rw=4bRaSP;+v~hX-2K_f_;%X4+yx5Kyxs6#YT;5 z1k_d7;vN4CJU!+{axQ4e83ue(J|@e%4L;+xXOkT85^{2;(uE4qik(kpZVWi@0lnbA zIs@8V1f1rzXXZ-Q2i)?Vm-OAl%Hb=jfF`j*QGB4^3Gs#Q05*^HkQDnAYoiIdruKV4 zVO_tiEb%s2Am>Is-E+XGk%OhAb7_7PxXdMfd}id@z=tuxFNV;gjD(ukk|n>qBBFLb zASDlRCwYfe^=e+GF3xhEiup@EVm#q(qrEcZ0oKsw%f!+ZQ?YIB&KOX$f1&+bnD=raEwJ5gc2iNgX=vf^u@NC zrv`7JK(xoax+7B4@gfCWL_*xtythSLBUqteSdW-X=rb}UzX-; zlc(qG>)vsB=o|(~7jv5Wbo(RnWUc@r-WR!APmN4oKfFmHM2>q%d?k`XgPgr(4lL19 z^Ts1}B>snGASVlG_)WYeJU*owwgAuA69yGms%MC5Mw66N=vLR9GL6(Y>M!t)mt^q&x4La`E64=YiHfUvEU=PkC%HhAQ$X3D6Mg* z-S94j=6T@YP)CeA5#!J-t8Ml#-%LnolAGUdOD}T8lX8M=Q%wqMoN-AH;Z6#`YP4a` z<1KW!?*^|h*GDjgD@bdq%4)b4vz8FsH7p5^J3^BBVH{C0$PxSO=LVKSEROGZOTdWa5p zz=1BYcJdHgo`n$K@R87AZ@Rz&L@loSa;wlA1$iGzu9Bjh21f4f$vQGPxjNv><6CK) z8yofRk6E9S-}rL&k?_J&t=O--h`~n_Vf$*9G-YdIC{_6 zQ$Ijb3wQ7!GW`Y{SHfl8V`pEGm{u$fZxVXke<)J@dFLY_p|e;^Sl_V@us)o(kv;B4 z`LT}NOYRUwIdZ)|UxK@kQ``RH*hQ(%+YRQ1a>Of`i%IWq`Egf4JvSb2F^aoxSKK4H z+ne#QA5>3YRyfsL}<>b-sRf5=%kPA1VuNCG&4t zN`LSHR5=DXo@s9QrCe66J64kHwc{eH5zIgFpd6^JfKZ~`i7@O!z`e|=^SB8nJ$m!l zjG-HjsJf*J?BE3_nILLGc^GNti0MUOVArBcWnI)u)0>qo;%G6&v8y_Braro2cFDZx zkerb2B(}yO3c+29C)X!Gqv$RIPoC1Z7!+HtJ1mn?P9hyZS}|53=2}DK6#BfvBt26E zB6oPv4qq+DznsK$CDDc}k=Fk>4z#vtuCfx6Lu9pZv{Mb{71!jZ26DY}EK`@y=UGZ( zXI{{8PUyp8Lh1yPJxdnZ6PSW(X0DSd~(m3?uJ)myV697$;jri>o^|ONmGe2h9E=I`3TYr`E}4S69>sJlsMece#5vNC8pEb8 z+ha29-y)w86P_OO<((jLX|hw8b!Xl3M((D1k|1E*XJU@SjR3LDB^q^UIjbX`U8k!h zGu?YBSl@Z_q7>(qXN?m`i%RihiwZ^@lS-sxs9x$OR3QmeSNhu?xH?esb64b_9^tOs z)?e-{cpv`dI7>SqU>dGy0CMy!Bc{2Cv=yPhPmG;FeXGVt_2FFSrrzr&BJdSqn8uwi z>t|vlA2cg7Yum#bla6}K_4^UqT)ncWON*OE#axn%y_oa%f+-1;VTLJ*-XCkbR1?U%Zlau-|{XHOzemh4K*?UECY3ZyVp}9 z2A#zC=dNU}x&S>@$B$Ar=|PWXQsMTK$ha@>h`}J;kJYPfs0M;* zxg-gkv}u*4U%qHt95!YdUZNT(T>juyCn7v2EZ1UXR{42JXiYqz#5v^o&fw80>yM;G zSu*dLw0Nb<-}%sYeC(*-u&;qbw;L6p!rLNcJ5#N~(@?p)CwhRkn@fGQ71P;$XhqE4 zaL}GY6-(cb&_>mDowLu!7PG^w(Y?xhJwPpggQVK4b3-uh&;bsM7M-h}22Ty5Be)4q za6ZfJPsEG1)uBR+8hGev%~NDw#%3eKP$w}A;I4Es$!AM;O=nLeC6LRTB3_O+(Q($} zSEll6(hc7jdaT) zgNq@~Z>SzAQ`H{Pg4Q-$A$<-_1m_pwhUwpCI2E7_sMG7PtebL&-adfHee#J?x9==< z=y+M4XE>cAJl=a`?VSOY*n0f~&Cd%o?9Qz2w-D=MYxtJM3)E$+8`&m#>+{YVapxLM zT~t(kZik92(GXB_%f2FW8+rZat!D8DU3YOOQqSa1!UdUa72Q|gTQ%?0R5Uosw9c6g zrSsY4*{*syf3BU59_L$Ml@7ce_W}C0Mz*IkrR~Mm<;wbd^zVkM0?OdGzZCJxDJEUEfD&(;>ZJwJL%GYqC4^`E!~ z+pL@jOOo7tSF4CB5Bjso!*%gFd zuF@O!)#k48qMdn`rRh+SMv0=MZ4ygfMH?KaM15jTcv$8ZkF87E80MX1DB8RhyX77Hum-<$uMS|A4>~%>$ zM#|5@WD%C(ZIg6?ezXfAPjl!(;f{}Q#K`6E;CFaU)BBx4_X6}fy9?TJB}4njh}IBy zuf4pGo@v;}wyAX(9<_~o_QgkbzbSnZaapQXvWv4Gd<2k8|0N6`1}=%?*9-54ueva; zoiPBtK6i03)QJt3b#`>s9kF{OLI(?rhh?JG?Hww|5uqN_GK4cd)a6_gThC9wfA(^V z1=4tG^oo1o5EXyF7x#9tzCiTn;;!JBhJ})*0Bm0VNV%JG5!7J=3^e6p9^9g2Jr3en zZqM}VKG!VDhD)2dy-0I*YstQPg9~4jyKM1IGX2GcAcZ;MIb{jV1y9~rJDa6W^20Ir zyhb(@@H4b#7RpO0LY`?bP6v`jT&r*ycpJ!nX2AUZAxx{#3hL*My~Mzbo+cfW%y^gq ziC>+-dOxO|4KKt9EGRWv?(K0BCv(#I|HyjFs3^m(Z5R=xyFoxiLSjgf?ht8^5@u*Y zI)-j3VF*zvK{`|#q=piZP#UDWhwiTT5Pp_u~HWW)u(Ay)Ba2 z>)9MAQNxRF%88(Wk{i!8-x7}&LE~6EPs^4x#Wl}B5DFM{A5kbU-9j)fe(1O~zxChD zw%)N(CGd|>w!nH_N~=H>HpNLa7y8GPLy4LaQ(FnfvPbtXGh{#n;Y`!>@O7Zg{A zbFVoQuT~==H$6OD=cjQQjbw}(x0Lr8yeRMcenq5~+Q+R|t}c92zb@KKJ-M3ymc2RU zjTm$qA0FKtDd=9;``vixBKhE0vLCl*^FdsD*S(~ia~XmyF9n=7uid(r?8q~}r4_Rd z#CP%7B{#~P*z5_&&Y>X}k^kFO^(0=Cl42q{`Rqc$SMHAT=pglPy|m!NdUtJ>9SON@ zU7s;`)4B=i-)l>P@^!er^h3+E@$Hac8eMzptAZKQQVvF_1lY#Gkck3-LkswM zan_4t^0ISfI54RvateGH1&RnRb`I(X>(84}$m1WenMz>yBO=4Uk^8j_lLsurx8_TY z=S?K^fdhngk@0ZdY;1f$p`Y^h0*kh~ZpfzvB79A~9Gi?5PS}@r$c#)Ieh@d?@|we_ zhX=_%OTFj?N8I1OprKqZ54im!BYd(KBCRp*fkl-sU6Lxm_XFkQ`;vjddk5O^96}|+ zZ8&U&xW1Zl-3pwhIH6U-AS%NzkdVUQ{_>1#g#L@^;L6I|i?uF4#nsHi=Im&Z#4YUZ zcl`D&3&(4mBR=MDRefTX(1du9DJEP|!$ez_Y$ zemCZh9EjV2{JMB$KM{2vk;BuJLS!$3Zq9g7BGzu6?#pKDC`kKTV@BQ%-We^2vN~1s z?_~X7HBY$`wkCAYAg&1KJ!^vLP-nf_?Dh+Bie1hC62hL|Ud+@sg-U>}26xuBs-%~` znpW;r#^7KI9*Qbi&}e#ln2q}5v$=0%AL$VlmAE!-df4Ctga4o~Tub*5OsD<37+WSA z^)3pQp{3DGuLI|sL%^8&hpSLagD0XrbQUijb$VY^#W6=ge1b(!Xl>m(!e{=`v~@O` zVZJwkd#5uuqs-G^of!JNjD!`;-=y+jDlFses#c~Kv9Si29`>hGyFRNRnq{;bEv{h@ zk17-u;~U5sfO+rY!8as&R!jNhhw$2$t&4cOG^Lsq{;nScs>}QquTXMqCQYh#3Q=h0 zl3QBx9p4N%JlXq}ZMVSFoO8Mzw{*VXU;KRk`mMdCnV;;+{pr&Pqcs6E}-Myqd*#6MpCtKJ=kz>D~{B885 zm1C1WHv3SOm%VuB;FO|bQN!O8%Je(zM#djzkDed{KX*flOJ60uHw*Q{`+d+U7_eXd zk+RbLJWv1MT3E};cdNP<)3Vbtvo_nc<+5*vgNpwjABMSmm4hp%`Pb6^yRnDNBAm~9 z@bXqz$moniGUH)(EUr-da4BVzzWIxXoNL}00`}WuR)I??V^XumlhfVn9Dj#bK%=qd z(wl8@H{sS`p-sFzrF1UN%mNm}jzk$|cmA;JTyn8hC#Euyn(j-;TX{N74Wm|uO9*}w zJCQ^d61YDMu+ta69eu^AisCkxiDkIYST)N^xlDb9QqjBO{=!dt>@laUYH>bS2%;oJ zNIz!fkY?y~_FpMis&grIAf*c2U-Hm5Ri$H~4VIJ^{#-K6tbJH*roTGt-JmOycE^Yc zD;-{C<=%eIw$K;BI_b`xu`g)5t$Cm8t%jB&XCeQkGAZ;XDi`J?waTOIr}d$H=Dy1F z0F2Cnsrr60sOl%vh0?>BjLHo*39V>Vvk*8gF>Zk}S_iV(lU%iENVR44IWGB4+BUrn zIk`Pei?^4@yQ#J~o>VGy;fKF?Yj8PyFOOX?@f2t?h^R>$rqy;$DNxOn>=1I)^0k12CrYqJ22&v^an)6 z`_<}~T&Z8%a_ew3mxiGNY_ zv=RcP;&3wBvC^8l58+8f6i*ulfVbSbxppe1ARuStk%E&EI*oSubhFPJ@TcpNq$nxg z8*EncO-*h8pg`M(qK$ zDOmcSiNnTU)|(F7O>D4EH8~n`Z5#ZWhXS>1wvHzLoP+Il{I}hk!|k}AZirP@2i(Q; z$}p}=n{UIeU6B(~fs*@<7({QLhYuNkl&6wg7{827r#)dcwInoIJur-53LvUwa#3~3 zOwN9hX)w=c|Gr~S7D=}*W4`haR&ti9X=)-?9cKDEh)UqE5I!UNeDhpDj(J{0H=bwY z6Qn`O$7ZzXtv{Z08Hag?h>~9xm?#TlCIvG&t=5Xqo@n!RY0n#>G70ylSPv!^sKRQHW`|+ zvt^J?WQV{6cd#&@#97c0R)2dh$a53j8SS>FEc1esYH*}V$LQf0a*Lr_2^#plV{oY9%wSGWH7j}S%QBF|s@2fDlLZ7G7^NKYz+|?3a zO8N7NjhTT+|ID;Wvu!bI-fK0_;%=Dhkt4bl6S4uJCCGJamvHPAmLzX|GpM0*BVF|) zW!&u)8U>|^(YS`Sa7Vs$g zV|~fpfg6KAGvym6Ds;>7MJsoZthztFzC&Uzd-V6?$B0C(%51l!NuyR83zswBk!FL7 z&bjKil)xsgjh6f#ch8wW;ZGA4j z9J@4wwT}kaeNJ2&706#icP!B9DNcJOBwvrcA(Cnm%zvK=W(%%FIy1*jF|Ahx_GzzD z#t!4QJ=lqFvF1tjgOh%>rP@TBLvtq?*W9Tj zn82=sTHX7S_%=txabZsXaI&-_8p>rmD4FvGriOlxGV3|u%Ggt*Y!>exW?freUe<&s z{4-u)ane`5w;>LoTYe_Z#Oy*fq(N>!kLO+TqV-s3YxVFl zMlQaKk^sulU{!anC7!N}eQM54u5T>psQ_l1$!!)o{NStZgG+LVCrI{J$x8|@ZE4(5 zf;{;#j@sb>T;!jQ7co(-%A7Yld$gvq`w=8Mm~ssRQn)N&rpHTs>8-a~-?i%LT2BTo zqYRwSBzjiHr~c|hAjo&-v2{8YVlhf>6BU{BZP719=?>Lr2&Yy2Le*ZdHj`60O6E%n zEe|L^@@@sQ7%cb>-ye8(kSU(RNT+S1(Br%RR&K&a2PuQ|AxXt$V(n zr-;7_X0AT^ZK7QBo@n-EBhaHnlvI^6lfp5d5xOGmyf7bLi9mb&%^AqtJ{iz|5YfhO zvp7p<8yDvzdpZ=}Sy>w#Wx6UX-X%ng_OL^{*P!d*IDDfk5s z875A9EE_g+B&6TsHy`^zvVJ@NF1ZA`tT9zP-Clz0Ahh%U-X!?)~iS711hSq@;etY8LK*=P4N}j zVWh$D;b}$T;9;aab}KX=W}hW#Pchk7gouAxy4@e+*lJR7sIP`sU?3no#=Kt&5M}JV zDEjQv2u!ZYd!{?Oxsp))_#Cvozjc+bA9bgcx~B}gRSgvjQ@^ESUrxr-9T#+%0)J)Q zqKg^N*GrM;Bh^jUfTGV7`-fyi$E`1n)8`ZQMkgF&_1%6y*y~ECT~kDY8GDiS z$AmULF!r*=t^^GM7Z{wN;E^rqje!;ZU|7)$`B@DcK;c?9xG)5$Mv#y;F`u3EfvONZ;f(hv{v784P3c zFUsu{XKyY)U_AWMFtoogRzRK27MafO6S(+H56|)iW81NKaHpGLaQFP$!B@}^H~UJpL9zN>L;P1;+&O%hcBya zsJG^PBWa;hrNqCA?_R&cG&L`*ZFp=W;D0)t;uW|tR{K+qZfckF3k5m#wDakw@yeY( z)Nt5#O7;{9y_4+h*15qgeNJtZwLOQQ?bwvdDFM~g=5Mj)MJQ(N9`e$Gs6y_`7DA}_ zi(yvhMubD0Fu7BlnM?gg!?Pqs6#uL@sAa$+}kz#O=h*G|lxa^+^-Anenrw z(Cfx3gZ=RRCiueTZJ4DoZy}kh#M%e*?2NW83P>KgFpz^{x>aNsvwivr}2`y9t%e z(uCW2)Yknw=rU{8QEZ_>^3<@U;~7x{@)Lpo(droJ4^(UI$DE2=rLrF;7ed4*((Aux zqOqCy&=E>xN{%{=2R&z7Gvsqui6b0$;<<6FZNCF&38gN5{!KSM0JwN9Ma9uFJ=~Rt zvmwCimTAg9#jla|UjgG7x+lyti$EsYgTAvx=x{ASfi_}HY^7qVX7ON%U5_hnj^jPb zyz7y#72hit6*6QOHHyW&Yv%XaQ{72s8p@ZYbP|36oWpB{chmE*HJ!0P@{fdqswm4{Y*q`OjwsQsyp|_gH;6V%720|Me!XP$ z-np;w5=izRHqi=ihzL5MWkeVf_HdKR*CcTk4_(B~Fv>k29gtXEe_LM>pKN6tWNN{; zt5qD*X0O%3XgOBwLdxms|3J($mAYrJmi977gpD!y_QuFMm5HeC#@rbnS279`zBw~?tG(rOme|n8TtWD2fKF_wOa1voU6t)D z22ayr%67!@3gUErC?JRT95FF^Ut#cgyCLIwgcQTHmy@84f7n;X&aAzIQNNwHN){1s zRC(S}=%it#ik&uYsZQliIKkxJM9B($IEn6=*hSPifaXXPG-8Y>2Bwtgv*wcxjX>x1 zyKxINCUtpOF)31O1v4f})u-wNr^nIv(cOL>=kxkug1r9v^IZOz5BP)a9l?WNTzRv8 z5(UvuljaoV%JH?adKc-rg-+q5D9;2j&(YL_hmb@1m1pje|MeTJr|ndlxt8esJ+z6U+?r+w4l(a#t{LwdpgT74L{!T z#?p9wQcK3O3h2NgL<% zbIhA_(A}_EYZUKyf1hMI1?BZYJ%ukD{jlGmv9M$+y6>X-RinT2N#v~@Di!l=uhLMj zYfw%hj%cmYb+s~?_QJ7nPxkf-l|{SvtCD(r(|Fp?%2zex8Ih9vhIQB@OuTkt%&|02 zrEI`}q_;Ilcd{+UC0x@kF5_<3A6t9OG3q)#x>2*^*uJq<6K+vYJK}6mFPVDoHf=M8 zL&Os;)K@y3F5SpH!9%@QOJ4K2L0;dlIZ)J=6Mf||^54Tc^SLmUfEygS@Je;{!9;LS z`cCAM>3r3R32&0kdbG3b=Q|I+kxRtgGo5lwB$Mdlw*E^RP~_Fd8VEY}Ced+F7x^rC z7X=cIE~?6!};tDb&U6%2ot>I{gYeeY*9^8Usp-<`I}M#zS~ z`;FIDUnFM~{m|=NFMIP7jayMcjCrJD+`yg@Qjr3hZXMGJfi|H-FJoGLb($w}O}Pe- z7jygVTRxm-JPfrUlIjY_7`jxvv>wIaL|!rE{7{=Ra++-YgTFIw4jYVj)}T@t{Si1e z-cThv5nou+=kG*LD4b>eZ}UuHY=kNU=^e1(iQ7KSRB#fWq2lK`oR|X^kW^GVlk|^U z|1)F18Av_~d-Vi;dWtczgD^-X9FTf3$V~Wr7!VHvSNxEEjAKZi(xUhQU-011j~8lrZk`^zYv^A zc2;qxS7#LJB0|{VmtQ^3>GghUYHAvIJ?`CI=lG5~5LZ@+gamZp29a~%b6aZR;+EF! z#Ni!E_fr8O-^>kTX*43CFGtn{bD4=JPjkOMeU?eox|1fvgZGVS{gWw_KfXT zW+Tj_v!f~1;Df`XKjh4A{_UDbMt-$*h`Svvkz1;k_*HR+R}iguo#v>g8L+=7F<#=M zTXf@DOyQ01o4W>?bZ?b_)?1p8yQJNx-HM#K9h+F4@itzpPpy6k_Ee3{MVrJGsN_7Y zC_bSLduc1c6#%*8E|v$)DILO~Ohv3wvnTK1W!w<+Numavub}%7zP)sk>eaFR=a=&@ zlbLY;o+Wc;iEy?GZ-z#Lbd+dEG5YWPP_EV%H(}OG=`#g==9&Y7cJthW{K(o6*N_&| z-G&D7aKpsEuWKB8al^@t$zlI18EvP4f_CK8s`GwJz%p7>poP?Tbjz<=4gOP-`RQ3u0s~CPgeL*BQ{U-Y5Qs#BwUxl_oi3q zws4H4U?GOcdVF&r)w5fdeu)y=kjVC$hIRZVmsy&JR$-KW3>E~Y5A59B<)T_UE=Stj zLprn9Z+sWJlftt{&DIpahXhF46`s%C%;V{O2#-5l4{iB2Y;FhHpHVZ4{fOd#@X_-O z=J`G%!5ET(4_?a0%axMHNKkDcVdc7L?;Ims15PT9$eCZOQ{lbg_4{zk_b`40bAq`4 z@VNW~Ry(7FeL8CKjB7xK=b>8zyDGbDs{)uh;Uw{;aOlzQq#y3i^DD7*oTwfH|CPy2 zWD^poaVSt@A41xgL9*FOUG)02$~?&-Z~vWkl~0nLC^4V;qw0vI=p9ePK^Y6kNUp{k zM;4@k+FpmF^^|SkX`H`=x!1x6C6j7z?NTY9%3i3g?>^e{i73@I=wbo*km<6h2{pOz z6-_Q92&5?tH1p8Nz1ELhY@ik6K4% z1DK5#MNM5%VHxVRcm$_2_u1fmn4N3l=)u2M&s}0}%0+Hy9E{9+=F_X4J5D0tQQgDs zhvUTOQTK?97FKCE3ABG|zrQ}|oYUJXCzpzu{T<0%(wU{UN#*@jO225<_69mx6Dizx z?{e2l;!WODEuKM&x!sJ|$tdaX8O2vQ?M5#`7QznTy3=BO^kBu~4R6RPd5tmy9+X!& zoqm|6sq=#@<%DTcw|=WDvK8;GrXZhqJSHT0PGSFd15f`rR!G=01MHARgjp!q7)~z# zB-;IR$f85M!b^S(6OHoznP6~@=65-KC{L0s9$Bq&d3Yi!N`bvm3e*=)w^5wPMLLQT zrZ@Ygfu>1cZ4-WEIW>$S;L~%3H|>*En`NDjVot~V&32;`uDkd%2uu7C3!6pBV~;Q+ zGmpYHYGfDb$w;B@#40=-4f498$ESgP{G~+$AswyTP5n-f<5MHLv2y!!Trmy3XVGJ= zYbHZ3QOI<8{f7FiB|k9D4;T9^68wq;+CyuJ+4^Dx?`bs5HH`4yo;zI_X*<4z9{$ti zW>zlemV=!o|AjEWW5ctH;sFECleaaGnec2hRnP0S`Hep;Rs6&j`z`=majsz;dx>^h zdv5tK3B7-=fb(Mk0zJ0Q#K?9#@tkt<9>J%>mmjBAR$X22OQ3q{cZ)nYejg#6AVooe zvZBaeh2sCt0-TkUub>g;AOUkOc_s*tz&YARQCrpv~~a2 zXr^*S!5^>A4be7gM<~g>-%c4LpFrN8_I`J*Bdrs2iRK=pz{(Yrl+WgD>IJjPai3y2 z7{H?!_lE|Ia`}t&mA#*K+Jk-;=;rN& z7~UR7_w(pEbkd<%Dcqr2t&cfwpZ}rBAnPsQFQRu8bICtDvgCpB$>bpHu6%U#cf6m8 z-=3MA*6*fTTevKWT{n!iv!oq%9M106cn7RS>Qjs)i@Mu>2|~*+Y@b0bY=8##*AE{) z7!JNX?tK1gwk8A}9qK_m5|&Sn;@{=PK=uqP`xxd2NhewPC_5cyZmRCBbums)a-ET) zJ{CmbV#B>h-7=#>epA^B+x}y}X22fBOT=R`o~I#3xdzLX<=~)0S0gzGtkTtoy7@6N zkX*wmKAl9+t@4AaTgUN8q9zRF@^@0y!L+q>n90TE<(zT~f8N1=h$EBU^rwG~DJ@V* z+Ii*WC5(uB;q67`{Qv`Ly!>d(GF&>zyA>CnQt;`hLiJuSr2FXO?5Yfv9RB(?ze9OT zk~G!c(Yj8<%|#(*AeZ-Sx>R5Zl1;UXANR!W(+9 ztD5aG^JtZweghaZ*Q1E7wA7-^ulLxdrQ~^&<+k*NO`2+V)qLllHJZo0Z?tL*dSVZM zBzQgd-xLhmLc775FF#S_N4xFd4T!%VWoF>>LSMnkY|pstf8i<$hXo5G*u9d#Rl znsl_u)QhgHyaF?ez+ea+CVYPZoFV-OAa7A+o^EntRD~*!oez(kwDi08ml_h;4!`r_ znM2M8`FBp%f`@Cp=U)|lh4&}rWNrf94$X}9fa`>+m7Dt|jlQSZ+IcU9{myuQ=$FQ( z2w49p6a-`o_hZlJLx>iqQF{w*@lTXVE&qIE={vVbmCxjqrO^n6$f9>Q>|*{Z2>j@= z*Kig}_4qKIM^9w=8fM=Rff#7lqx+?|y}NaYCQXkvcR!QyCnPBD-txUYH$SN$LNAjR zJwI=w(ebSNK*7bhz)8YC!V;f88n8-%tscRGgXYJA zaCs!KfA&n&RQdOLIK>FH8Fh$Fk9NnaW!VAB;AGItx!Vc&4CysWdHiVW-*=sjXF{!% z5}M$&S^(n(ukVR{XlUrSF+ih%c=i49&T@AGCzW0)ECy^A$jj=h9tK|Rcb);p2tNC9 z-e<9H;$C}bfHhiw6HtoCPJCunqg74jmGPb&2g9-*i;jQg^ow6VyIXFMl$0z*DQJvs zPt}0^8G@=fKp|K7Y$#u?5Vko}|NP9b+O*}}-+KL8XR~LgKi>|2;4zWpdi@i7eYgN? zo6E4`381#f7xx59Aviitzs`M+P+8({|1kkJHCxHRz`y|n^(VD`h9AmU8le!Fy#2;^ zt#%eP-i-B%YR`AnDg(o9?fgd#HYsWmklEYguP3zrC7x*bgY(^_{sh~bySvR#o;=Bo zkqGMkr}+s?GmYQ!D-g`YsJ{6DT!^(45zwTsrT?!cm7e*K)&9h09yxx-Ep^4Rr{-rd zv*Pc03I|N78o?bubPES^l|Q|hAfguybzS*u21MYszZmuoF;nlEqnRapHg|hd&`OBI zdwp>%w>eroSmR_88WxsiKT&~ei_LJ9+b$%P1rZk)=jV#MZ3?`V49BO*&MY)2H$Ow= z#O;Bd0rT~tyjrjQ$6yaEU-p6T$yVe80$Njm_ttvuG7vI|Q!~R!CKcltVzwqKImK`s z0b#3LBq<^H?(`%Fe((Cf$QCaMBmg-r>XPx&n)RcHPU6&;&E`Ni5dShlda~mFx%2S*1*YN?~{RM-L- zF$Xzc$@x+U1Ra*Zp-aB!qUQ4x+X_RzM20=9hSPIrx;Efi^ycbNhCDnFR~cO zl=<7{zT8D}OlyX)13s5g0YRxtoWyM;L?NpDVd?T;&_KJpcJ7O;2EQ2EXWFLv4PGu7 z4<2w3J){eU0KypD$+L*bG8Y2d8uNDC)PQ7h5+p}^CbooOVbxe6+W5B>*Fi-4!xBog zZ@D|`{9hMYgJ@VES$~?>BP1lm#-{!g@prHo@Z`8ACEb^&Lb(QYsT<2?c8l+0{=Y%5 zebko){lsn|G#%gQ;$$fdvg%5LR86fcq}tH@-AZ-zh_A=->TLh-@NdQO%ud^>YKOm5 z!?i9J6tXpMdTB8w@%JqXbqf>GADft%eC9EMc}FCZQO;crW+Bq~DYphBpcw2WogLW> z7`(0cau_+!!}&?~0?rn&jw$cioFA-k;D1OLtp;pK>fQ^~7d9J%!)xZ_^I#>Zu$2zS z**-CgMW}`a}EX`(Cz~O8d8<2@-1z|KV zW0OeUb?`<=Cw&cdkADlqBZmE7s>OFaDu+w+avUG4fob~@48?!!TK881I*9j{SRK_a z;(sBCOU|AtdqvHmL~VY#RoPEY{8h|TJ#1{>Ulu1TB#_OE`Y%D*4|2=`zn*Z#GgSwm}NNmG*Aq@u(5*2};Y{N};h;NTvJsXjp@TJf4B?#>`?w zPEXU4S+$%bsupYY10bN0R^FwjJC)z1Kb-}ObeNv@`2z}>S6~xQ7i{}wMYYRT+fR_@ z`D96t1vXQB%YMrggA##O{UnyvW3@EH4<|WU_O{Vk#^lBNHC2>fLNUbKyIyf!lRzMF z22uiJ;9rHT?@_5G@ygK=4)kQ9L*L-8q0p74K3XV5n_oT3ShqdL^%Hrinrd4Uqn zQaN>P$1=KLrKf?};3{aOi)-z*dR(2kB;5X%CGVMeoF-^DiVs|}R{EoWK1&oV_MymQ zJmmqh4${M(6>|h3ba2f&(%q*AkQn7Wip6A4R?725COfqogWDkVv!V4K9HH@bx)}LR zP3MXeqE>&&by4qFrjE;AK$R$wrtcXWO&Sgn9s=TJauI|aY%vz#UY)#ye`lf#F=kQa zGE`X~XDh*K?6-G}cN>Fk)qf?Q?GK=^<&|uVeOdhrH1}se40{a+ z6qc~rLm7SYs1=p4Cu^KCDpJitdnU4n|B$ue8SYqq{uAy^ zMJ0!0*c67z)GDZv^qrOKd4@{;5<&z9xd#OSM{FWTDNZ()E1hI2iehV_- z&UTgf?s2t;0$$GL^7p;cSBBSOV2$f>d`wL*4~+n=27`p`n#)qTV;`3>4uQg)NJDu` zV=9QJYi$2-ip}ZcB=K_q(O~@f(d?eA$}4wrc#0ia8>S)TYdfnd-C;7S(HxRg6|)d@ z1hMK#)}rWmKTEyZi5tmfYc>gDSe`5yPS8Fy^9nV{O!2a7PiFWTs@R;5AY9Ouz>SV6 zzO0k@rLT}i5X5(5X{(OlI;+NAU^3)-L*qj+S+`d$9z2C%1S>_rylb&vGyAps@xg4B z9XS5xrBb@F_(xig;ipxLCBEE= z;>rIKMPm@C6^=!bv~a^_GMcvtkgQjKvz{xz2Y&qs3NQQ#Qhk#zVB1@cSE5S3XgK!- z1C?!U+rF&KZp?&sT<_jF+!@D*)Ww58l%PzRJ#OC$knw6ZbQ2`pKma_L+2qehcEiR8 z)m*U92qK2e%jKsA55-CQ8Ke|b7nogay7l7+j@v_BaBE)^U1P^FO1^Ry^4Rui(C1ie zRnm6~E%9gxQIps^5i+D`O!+>OVX@mD{lz4+o1MjqK?hV!_Pz|@$8cN@CenUvfb0z@ ztY&oZK@4M9$IS{u%H#8a->hOO1w%qI=rn>$iZlG9@|X(tUcbYj9xHjKeVHp4_jLI4 zYv0kLjt*}(zTH$gQ%8d)QkFs2J<})3iTGmy*Az`*xXk%`va9fs?k~zK9=hLdv%c89 z(d2oek?``~S200Z{i*quKEdN(T+eG!#+ltIaqrhkxCgAJCQ77#sq_sz#A8> zY8B*9%QpPj1H|Fj!#*BuGkeZwlw6@5{ukLcD;#{X`l)8juWk&E^zuFE@spp=araFR zrk5m1W2#ZZL`WuJ_Z55L3p{EV$mvBF4>4vSCoz8JES17g>Xp-v4x=g0FT%oLxBJ3X zw?V=2iWcg#GNo@;7N3poZp&}nu)j_J4sz4Y^unyU3hFAgKb!n7|9m_2dJJD@3dLu$ zyjQI%aEvYZ91jh$_IVK*i7E+oj(&akSB(2FSJIi?vMt%} zH5AAr*@xAJ3$r6Z@v4)loMaMjxX2sg5YRRTC7y5u@(c@ z@J1L$Equ2jC(7;Wc#Qz#xl>d}vx`cn~w6H7P)6xXm~tkWGc?E=EH{d&2Vj^QMP z#%0*IzH9Wl;!DF?%<-a7(Ul2X2{`qS8v8IZ-&0fjRK0H_`P@VKft&~FB`RzE7OI<+ zwf@)0F9=NG2Y&pFIAr@xZeva*Xi!=&OuP9o!=UaJYixMkP32ZBB`$oz!**0U3Faqf zvI~vs_NhlY;JQ>j51_Jb2xzGSYZO7RvfG-z)>GgFdVKAq#bCz~-c`xc?Of zjob2j*NhG+&z(nC7w(oP$GTR_$0xf|r~5vOPrM{1{b~9$B-)Nul0I;GyPjEgnf4t( zhC6jLyU81j2d7vDR`}zJlxQ9Uqj7nS3q?k#oZ8kgIcxC(lVPBvp}#|3O3n>x!3zXK zE+yI1aiJ%=z5Z`JSy0)wjrS71Z`;m7f+45g`7?jC!M{=O#zkp2n@nH9c>d=Jz~+Sd zgH+_k61j~M!$U)Vy3;+I`K1{Qc`p2fP8Hxe8sh&eF)>1i`WP@Z8uvP9W;<|-x&PG3 zERo6ZI0K zni9>RVC6K$6o}PQj5hy6mpAScRW$gf*kjmz4CG=$S1lnrwBzkML;wd~*R5=5T~H{a zPn?NsTl*T8B%S2mpA;Qs1gf2>bYd0hzaN{b4XsWG)q^4RyDur7@qo%c^ioBK5|U3T zBm#Ym4=MXZ1FBD)|H7g`pmdXYS%2o$j1@|$js8D!bhtYSq4(D7Ky)e;Znrn+(4D|= zmu+CF4Tlu}h4>8Q-N7N-;OFo@k%5-K0a;)yppZX_>fo$Wx2rd z7$In8w~YdLgQaKgc{F!9Ji&h{13DBOj07M5q~4ve>kd@x-$7a{CykiM=^N~&Y2YHg z*Zxa(Dw!&o-PLT0ic@#BeKGE9A=uqJOgGg?CrvSCNhjS?vLQm@&YaK($=A|*;MB+k zKKu1DrIi8q>}ky=tz_IiaZeTm5GOjI%;RLBDl3{* zH&M&%URN^JzyEvKD!oBbmdcD1KJ|PLuju|GCcmqLZ&E|XI>A#}YYApqM$gf_2%EoH zEi5Gs5?g>k@JTDPTj*MN(iruzJKkYzGQs*ocRchE4nV|1pI`+a=Wt<&4h?W(lXZ43 z+s6Bg5BZMPFLcyV>E%EM?tdYrnUu-w))avT@&`l4q?nDk?#xeuIg=B;wj}%2oY^Wj zN29S`F!OL{Yv=P%z4PEKr%1rr=V#;%93QNxOi_KNG1k6EnN5arZOkD7KLpAP6#z7w zFt+{)DNbf7?0ycT_?dH4O` zM92Dd?lOnoPvqc-TY0K3c-E&;7FK{@?o!)_l`sp8wepn3FFU5N)fgS&&LByEFqxcZ zH4C@@^B`avxnQExQJty{uYK6+0}3J>Bb|iD5H*-|K+~vDR{*qYB^|Ov;a>b7?IJSD z-1I={hC1HDT5)?nO&0rvIYO}-8my~o?$l<9QUi!EvY^}JTHNXZkdgSGq>{83-zQGK z*u7j!*8_hd(cf!a2o6T)FC|Kp-;Lr5JvAz+Tm1XX52{8e$$%A93uy3EtkM7eKzPK^ zvmMhMyL3lWTdwG6Gk0p+cjcmTDVry4f^B|dnDzWlScXY3UJ#yRRSkwqW5T>-x7 zZ~+dtB%`3`(ZI@6wx^fQcEA>!A9Fd_api&ws;OKSKwNDmC0X$xJyx(ruAPrOk2cE(fKXw9qQQzPlc#3X% zYxgVojj$#kgj4TP5D72yy=dFm`#TH-7B(^hPjeU2*2YHkC{V6dWF)=~+IP-F(gWCR zpT0P-`Q;d3?P+csz(t~VK;dwE<8NH=K>&C+6e=wLL{Io}Rf>BbU?lOFbbxiLkms{r zZ6$Vff0uz9b|p2B(B}l-IMK;7U^RRG9}xZde_rf69-JnpK5t;8$=?_A4tdska0g6+ z={^}78+Jl~!QEc(29DRdFoTLG?xBclCcq%swI1Kd3IKv61%T4Cs;5y~Su|fA;C*>! z7Y^WUr6$;SZI(MK6#)2l0CE|VdpYLqQCWb5b|Y@~j&$bjaQ=7iC`xYH94|n4zyp%S za2kO(@=g79lsvF#bWGgePtU-E$^ptF_;%=ty5>~51=a&1hG@V}MCTUtpcjPH4BK?e*S+9z_HfIWUoip|Srso9EWA;qkcRp>BPjmsff?TDsX^3!~oz!3&mX0!ax58|&& zOqyej>s+%ywX`A8=d!=30NI*b776I?DETHFc zxw-OQ?)z%gxVp5Iv${Q$hsUas{xFA|UKIW-o>{5P@7$G~2HY+%z+l!p&B_NVF6wOoQh~KJBust@Q?s0f z@ZtMzT;TDu5X5(c*V7H&Acxv%2b4j@l>4Wr`m@Es_pufMk-ryU_Sgq}z*%5D3pee| z)916O=T3B-#mc<=&t=nxZM zky4-2^4hY_^W*HIL({JXOuKi0&1>}|%aKXlX^&}*fyEo39%F#_RtUywG(K`(kI58p zTUEux0e8Os0vf#sg#NUYyp4E04CG9tqV5~H^SJ=XHmI<~0T}bQ8@ox{(W39JweU<{ z|55;S<2qw&hn4`4o70PFz+v*Ia&I62jls>qSfERw1W;OD%P!(vl_YhU$8zLqbaIcu z?GAF7_87!BNdw<%LUG961){w1u(36>5JxDI>^pAxDoL5h!vV*4)b}Fy{v1;aoden~ z&Tq`7^pbuC#~KM72^C3biq0(4B)O=Vde7bTp|EQlV~poJahX2@Zvz@Gcj{mIw$6Qi zs#9h+2BA1n)_n4-Lx{0z3Lq~-??0? zYG}B+^*@msS9@S6c0!9}VX0Tg<$K!XvJGc*PC zJrn^@`(D^_p*2jam_kkV;37<#SeQAG%d|JJG(H0tq>;*8TIf49-UufafiWf#oI@Mt?K*lcW_}CKPvAQN!rt6J_!zBp29Fz`(D~ zz$k>?4p^{DZq(732Fkx-(KR|6v-!kQO1K{JuBVHkGjCg4oH59;;y^J9z_HD%{bqR=U z%+q!OuRh0C{6b`Ym?8$U=&JomoBTa3X>w=%yI^{}d{cS3kfU_=R1jaJ!ZKXri{MUk zmY0Vq9^8R(fQG1gm62kYlqX2|@Uu8{9D_uGKiSeG_;w`f4Qfh=u2xt&lk=pYJyDhx zBOkPeemKkME!DekCZdz9lCGo4m*U@hzYvbWa+5WNm}PiJ(_#VY&T&9i$EisA7h5!6 zvqe3WR(2L}spp8l9CSmfvSsVXz(n+kS>N)@c{bQMrhh(+Xu79rhHxy!o**Kq9 z>~-~h6-!t{#I#EZ6CHLXQ+3KRiTd&V{FD{jBSb?FOWSJ(8l zTp(`5fqP##y_(2ie*_F^@U9TpWsWa>%^eD2Xx)o+Pq%EdURu;_g^1AZEFxAeB1`w0 zsLZQXcx3I*aKVdx7}N1-vpR!Pqz{1weTI-O$B0wAe(IpdJeY;H!M=z^&{F>Urlt?{eEgGG9u>d1d4$ea#3O`S{1PgS9{cu>XR97S3d%jUC)rh8VR{P2 zm2YC+J@q+E=2WPsff?kzq|jxGmzL`%JykWeq)_siL#^caJ2f6B;(lEohc)_q_u~mS zK9KMkI+CTu*U07m85g9e$^2qNa=#a(*5h=GvyfKWl7Dr{(vE}ewWPh5Y? zTIR8Z+VRz;O?2o%_bYN@O!<2}`k}4RgT(wWbtmu_yGtPYEh7%lf^hOg|x=S=6pT zU?l827#iT%C1QF%%epFb4f<{6iJz?}ynPam&V|_;^?Lq1wqHMmr|9wg^DNX?u?+b9 z)*^sh!Wjfu-7J3}=CiU~akCdrJvonS2Md4umzy&mj*h>3_wKWGG;fC(66K#m75l60 zgG%_`dJF{-j?$n?hk$j={EN%W?+{&-_V$Fz%B zS(fT>HMvazYWOz3U2NPuHI6~R)&>{3xPDM;l2yS3oCGoEqTZeKHQp1dh5q>WRA_GMCHIJx|YNfvFJ7*6%29^&>Dwa>@x z+JYB)E-E4G6Y1@?#%xL)W$-pGjBRTIm6f9uX*bAB*~r%r#}qg{1+e~qjFi=;O9ne} zF$}yuQwG>_f!vbyG}(U|hkR{bvu2pZH?WH;M3Hk$$Hx#Wq8<;BK3a!@=wbMo#XOY< z2~d;$uh9*=j<~3m(qm!&(%3Q2nl>_D`W%o0`n$&xs@c^zC?T5eYa(BmJv69#h!`u9 zt08HjmdfP0@U$Vi6+L!dmHl?$M>4cXC*{3hj-M)Y|9LEZ#|^Vmj`VP2;El|Po`cK5 zmdKVt1@-BzcV;Fcy=+J!O5QOIZM;}PKt7@bwZxeOu`(&|Ndr)VYF65~S|+E*{x&95 zUEHzM@HO}g3}SW|z*{Lkqgm3%J-fW*!NI|KE0+Uk9NgEz4H!L&rmlkXE_i^g;_$p(C&)gev6ax7_nul}b z`^k-rm*_@*1W)T0=DcX~Gk9j_^F+|a*eBz;%i)QMEn&%Zcd*3SDvA#iI%otc=`!!Z zE3eK?5z7-@uA2!=a7E!jJkI38A4Qt24FB~-dYI;5nL2I2- z`Zmw|KHoXVztmxd*>Uf^_FBK|+JqX=V~S@l(lpqOOTAdBLwk(fk5Zk>fl4(5L`0k_6W8Ih9cFKg>St=&J=eAAM z`gT5)=~yFwyScOP=gvV2aWSsq>CI}RP~(CDh0daI zk_?&D?bqIlX!E3$U419}U7Av)nrbQA-XgC0iBnc4ZWWnJ%g7?qpo4f{`dzsuvyU_e z=M-;p$?-j9EF(P;4xTiYwj&^_`I@x)0Ty3(YMAuv8&-CzILxzky*7GO;SR9*n8-bD zf$w_#cPnQ|Mmy4xeUd#2{|IK;d!@CTGPG6y1z6iiVw%Ga*lKhoCZA(auVhxt$jRhozkvTjCwj?jqv!`Gqw;r%Ie|ZmMSp%! z%$1@KoJM>9B>5S)3k)!sB>WGB#{Me2w%GGkkWFQF*cOOP9X_1O`@qKH(;zBW#& z-iap!*~x?-Z6qMObLGXGd#m4Iwg0-GCKz&Mjg=IJHiVvQMdiZy(&QENs_&?p+JVdd z+x1<|Dum;8<~`%Jy*eE!@-0Hx@jWf^U-~PgS5*^YmCR7x5Q^`lqR<;0R zu|;Jjq}2r-E#2BnFz|olBJkmOP^#}KXV4nr?q`tXJ<~}=$f3Ok@xrk)S_@vFpxKQX z7A0=_^GWQUn?a)5?8RzM`YG+=)g#D7xwMcv&$T z=I#E;ue-`;pNUcq;keE>ttOfqQO)#hR8jOy3|IaMlD6sNA+Ee8;K?~^bxyd0kzLAz~pY`@}%%#DE~g6b5fE z3C*s42l;@WhOuI}`5bE6z8nX!H57pyLC(?7^)q)xAx3dWegwIgfx(b8BP2e=dD0MK zO0}LB`*6gPX7sC7N2+p8IY2*NY4ze`(Q6{&&^`?9PR^7ZP;h;t0%YU6oUOr$6ayT1 z^9Oiu&`c(kV^wp-R%8vx;j^n(KRN~F8P5qf)Kgr)M}*UXix8664`%SB@E{9bdqjap zkQ9g>hACg*6vQ7=L*6X~dDe*h@*6^uA!W#pHqB^g zGFfwFNt?~aAIL5h4Ez-R3#iA`Oi3+wzMlrDe5JNx!5~jWjBpldHex*he%-hVo9hanJu zp7QwVL}njSw&y{IhB}03R!nVVmWLE^-vC3zJOBQR5i#{*uhQd#9yEwM>j)mNXNUmzBXn!;-*@Xt+PXBWBv7}ij+OxfqS1qV*)u+;+^MeR!a{K-gy5h zj6^do4MgvN7n{Lrdq87!CBm#7=XFppqvPNFIzN=}$9#{HkTaQ0>JYHDWBZiPv_gc+ z;7$HnseGh``H%sEII%J{Tm&1FMCeGsPrlE}XRcPz8iH;ZxCsSGxk2jqqDS2W!q)U9 zUb0CJl0C4t{ZvC0>%r0#5QqM_OFebA`bNk_Z|eEKx7~eQ-LwnE|NKD zwv|wdj(4)ZU&i#7_;OHy^5+dYtGKu!R9Woh42xM^*fvphH~7|#FrOPCx?E*lX8iMq z2ZvXRUl*xGKuU^V?Vnc@NXZX;a&{1gKZ1UozM-0sAvmcPo3s};Iu7Axi@){9fAU`E zSO#2kg?W%-ZLf}pRLP6>RNW_nMlLf4Q}+@V_#j&FaePp_NLDXWDL1@2l{{9~z`^;) zVZ>vYTq^ZbLeo#Jd5%+aiKe*zd0I+%Xi2d?9_KVa*1M;DzSbCVU{fD$+ShoNN@#N2 zN5V>oZBm5`mynNIzj=>!7uM>*vb!WtsfD9<9Oug`2i-4fL?s?=&ih`>^ZPd1aDF?# z?7bDA+DDCi`f}y3Afrol0CLwi37+2SvXaigBoxw-!JTZJ!StXDwDj+5OQ*QG+-PA< zTsliL7|EzDMsD$@xOvr#ETk72VrS<68lr*}vk0l`qma@@$~?FTVzvXuuWam83B&*? z5>jMcPB5ap6@+YhaGON$6Cm65M$Xo}E8gg_0MWENFIHvgJ?pFZCbi53Bh`^T8x*H> z5QmFZs{e9s;MXPi*!-WMGU`W|Ej!|H5!aVlE^STgOBMRut4Ww-!bxti5Mw^7#mt{> zUg`^eC@%ZP{RpM^_j1)mXZ-6->akq=(M-^cPem0xGJYV(DM1;?^?0lq6!cnnk$KS< z`nb&BDOsUBT~V$29uNnJhLTT`_C0;ib&tw(%-*v!4*;L6#$=Zc8&r`%Bl9A%M7!?6 z0WVSsae#I|rF7th@=d{P4nA;%J*eBE&8x`XY+N&9h92xLj`OKgx%8y%_bZIgV?)v# z-1M*GiHUA`)aoMAW5%|Dzxq^BO%2x$yDEs7`7rOB%$s-x@pScZm-VL;k36N+7Ga>+ z{)UvNMeP}gSUt^{E{zqTZd+-KfBgNmi0hu@KXHZ8jQ1uSCOV{Kg7_7Yn{K-+-&>E! zxXd21By)s5vhnXx&&xZnG2jPbGP=@3Mg@oUmQ4_sn2s#Q{heKEBLn!dj&CEmTe;55 z+@tkzQZCO!E#H70zNlZr(JQ&eOzS3c*FJL%8?MlzV}cKo>~-NA!CW5L!p=|#V=#n>7M4K4J&PrY)zdQpUQ zsM@!9-tBXfwp{%cS%1T{bFth(}s;Yt59FM6O+htc$V>2vPu=d)u&dUX}SHTU?-EVjNlPyZa> zpARYzxQQ%dr)!t~!E4jg&sw2`;oEAOjg~$)P^6N8mi|I9$dR44g(4kXZL3 z&vm@4)(25)s+1Q06lLSrI%MprdRda5sRm~@-^$$L?@e@AxinDn$$c@uG4dz-QI55v zRXfO^L})FFhWNFmL&ODw24xzo&mef);M*=>8|fjpX?*v)oi}_pLkayaG;JRj$n6~AZj{RT7n{WbV@6vET%`cnTYgA z*RhWKk<3%Xu5L~<7|Jt_8V?eAl}V28)5OX$${d_bswZ%n$zZ}m3RI6IbzB}qAsTJN zq~YMYc#f;;E@b{bM1@-9euqJG6b8MFZt2rdB;xi7rWCrUTX*6KC85}B{DITm_h_vy zr5D)hF7Fj{|K}jscsMyhccN4K3O18%BozIdn1z{1wBCYs`FV!cUiAKw$XlXYR)bg2 z*;cq{JfD*JiL-ap*q_CF>e!qO=Xohmu(U{}3TD+s{{h8CH~cUUvs%OxS(v&#DgB_y z@lUtk&Hag{0RgwmAorV#HCC(xxL__MNuF#k4L#!^yr>iR!q9G z#Ng`5YYo0zpCRp{jKijDpFfK238@o1)lE4b0kL;SD%XS_p&I+vop>Q#i4Ebl^HGT) z4uYH3+9p=6qUoO#RhG=3D^i&j?nBIKTeklg0^EuN>##hZN zH)wrV`vIrT6$w0LV2#BuTClmgS?royc3qg3jwm|&QL zR_^cva;t~vL^Z;F8b|MxZ1bSuw3-oUZ<(byNtMUPF|@{Xd`GE!Z~}fbQ-0+ef8dg7 zuT${=8y-SLl8QpM(Ar~Sj$ zo>_7@n6{r>CY7L<_ZnoLN+z1#2aiOe|D)5zznp%Sm{oP|@BPc~J@Ffu>(`B;dpY^h zsvdjatW>i4%N^I9z@E!Yzc2bKC>0!AYZ#i9hd1&o*|eVC?G#4Op&o%8VbhpR`yue~ z&fbh4ya^JY2v`JOmx{r`QzO?ppsGy^Ys!EU*IaiCvh0_82BDQq*2S{0j(1jw=ruU` zVcKej<9=|X`r@>+rp|4)jHW%5uktd0>sP#&5m@*7%h(OM-6lRKyq?_UcSM=~zWGxV zT*dA8o~y(~kr*btUSCulLOMC+c0I!$lf_M`Ea;%+&g=VTY4HbB8lzz17AqO6>r$r+ z)_${n`OM6jRrR1!?l6PZN!i!pq#7RXE?-=@d6||bgX3Hp3Ob2fZ|Cvm?S9ESK zmJiI}J_iT1PGLV4Qew!pRta1dmM+hj%je+6JuPQ@|xVA((7k+UJntu!cgKKF27il zo%lQJQS)D~IK)91sybL8t4j>=QMIOk=F&lo>3Ro5@%}-c=MisH6u=dGeMEhr2eVZb z+t3x^r&Yn{knYFxWXlBKe571nBegZ!us-U3Lmu^CDl8TKhrnq~_=E;`a@8~6VTHvv zoeutw_|UQvmrP1Iy%hxgE*>%tmA$bM)4k>opmMgSiRV| z_y@`z9HZIdnHwhw9B_o@>gwv%soJ+*pR0l=l&&^+wTO%3->=(1H~kyaG_9;dk$|MD zk3Kiu8!>4|!>y?fhM6Iw^^VPU@E(Kv*GQ!fKTaSkVa|=RL1tHpi&mg;tI@@0jm5ho)wyIy+D*ajvX0Z1f%gMLAv9=d z`JtPFvt`7M8KlDh`F)FZF?RkI^S5{;8&6!VFy6e% zluT7^d-K~gh+}YPkGLF^YWlg`ellPi0dbj=#VF>`%%2pq@c&nn^9aO1taoJ`89q*c z|82y-_g8HjNh7WL8|FMU%;ojza`FFt=!`Ax-$+Sy z4_#k+VMbUOg1XiQ2j}1m4p3E0xa)-82bti!b?6|Z2dxeU$+Bx=AR6JQg13dmkZ)&U z2skgtfI3*2*f}Ac!U`zS={4FD`(OQ4Jn;q>R41?ye@fqM2GyFUVq#Q}7#SVs5Q+dzigP(+V4Yqv{EuFQjFu>Xsew!O z>t7xjjdWQeE=|z$yrGA6PR+98bgsJwA7SR-5;h!Xj~VV89jjcMr!v6ON&|IeXLU{d zLJ1_!A$NBmbqAsA`{DuzVElild(nWkV74`vt_OvMOlBLoW}qJ|6$bj2$HGqI+2SPz zjVz#oPf8CC4TmT6N{Mo4rYg~ZIlu?9yWS{bw(e~j0FQ}}eSKYV{9i6_42=WEZWd;I z)bdpUt^x&|($L8C0geOO<1R6dCRXl29n7b>ulZkK^4HpfDPC@QbSiBOin1I)kwyUS zZQw?@StPtL9sEFDqF>KIBk3R07x~CyEK4{|)Pn;+4uN+!VU2W{ba?ac%WF&NvidGD0$BNITvD1&6kA z3%CaAPVe^3MNysX?7_o_!Hcafpo~q<1W=2qY{wvu&q|y)gSk?HU`bars#18By5u#{9iU`t z`sD8VDp2o#;`i?uMuBY%x$k$;f^e z8;w|AE4y`P|_J}qFg%do^H|q_XYjVs)qm`KhHQtGKFBjMSWopGZn*ObvfT}blq3b< zB@5GftX4PDCLAMUARXdYuFrVIA0)f$t~VG$3pZQZ zGbZE)KI7gy0g8WKebbzZGdOl!4mAL4V$#Tk`1<*2>(NT$09Zu*3$b)eo*$dJblgK( zOy|XxAO_V8rnzqkbXb6xcn{bHIbmeL&4pr695ZB_dJV>DDYQOUYmpotm8*EaKzEo3 zk@k3CktghNhCt6W5JA2Lyv0!Ja0+`gpp=-Lvw1-Rm{%*6-{RF1@JEUm`6hV=@FU9g zHsd!`5Kh|^22jU#*XhH!<}SHDsMyFbqOgQW7HEl2naBS=lEiad2!u z8Cj&uS?Ey;7_o1xKv&D?ib6_%nFdxV(?O5kq|wRiT>@?;LEOiEvD1%oqzkZGsVr|2 z7{>!H8h!o1x|p!8nv>Cz`x@X!--g}R`mpbasvq@$sbNCOFR*Brg#aL{%&1oK<{TZ| ztS7*l(Q)@6*W=^TKUg=(J+LZwphiO(PWmj&Q}&odKLNu_F9rpjArJh?mU7P5wr z>@;!raR~{fkxGIwOLY{c(ahUSBBHztCrw5fu)9IZ;Dkqhzms`xW_5I*ng3?Or|=VBMgm4 zF}j~AZMc7p;@>B|ksnVzfxL?DBg$^_s2I%pkp5^=MG3l!7ij{H23MdU&7BfByT2V( z>P_3Bv+*ri^TJ5vew{b1xN-Zwa@XhRK>0W-N|(tL4tP|%*HM`{1+LroBjo)zBdjhu zU|C238;UC??lq>($M(coP*CEDyGu4INT+sA?jb1w5sL>|zD|4~;ok~>8>y|vhL)iz|=Ebpr?%R{kevPC* z0v5D_9wPPsKw8!;=0}~C=IZ;qBKdL^5U9(Ok8>$@rh-cunW}%bx?t&68*5)!Pel8q zSp^1t!a(2>X%^QRKvS8CANygw5?S8iO%BQr?1z!z!Ee9J?(bAL_i`9IB;me^L6hht zOvd)RdRkUQ{sX{KT2rq#fgeIff%~EY7_HBZ6+~@l(3_i^Otmbbgn?-}7J~-Von?bJ z1ivN2(L9c6#SS)ygAh|?{1In$#}pN(9_!qN1n*5-Ku8d#%<{+}FK}3!UVSSb0|HWvla_@c~kiwyZG7bj<;Kla6KI(cP zC>})pHY*3F4|73?9(MpyuM+j$OAV_61Qi<|DE6`r(t{~%o(>=)fnWb=5w_eQmipM})T?HKzftx&K$nXetn3CkaA^{rA)Wk+yk9H@K zYXxkj45)W;FeZGA^=PFdd@rU4rON}5Hera<0zp?d0z6uuwUQ?PR$U%|MX@>tfZEVz zSvNt{$R@!R0D~x*w0Q|;sDRqH%*uD2i>tY``kMM4J3jH zk;G7=i&fIOZc6$ilz5mEoS@y;l-CmkhQ}7>)uR9?R@Udt*3BJ`Citn{#DUykVWf4B zKpWEr%OPyZov69DDi84BV@nYgPHAX)hO=m#x3$dQ0k&PUeo!080PrTgA00H2Q@$MCxlj8WR3 zAb{V2^42IiIKfd<=t>twRi*y?GfEJg;6s3quYiiR`Ku=Ue=0y{2JPi9u$*6l9mz={ zdLUdoSt98_i@0_-2?{~&jhD9&2UzSX#$Q=qWt*$ejhEk>R8H!UgM&n}!?MH>a{QUN z4VBcL%4*tm?EA#u(**oKZC`lXj`1TJ-F$;n8Y>DssXf)N$~wdmFL(c5~#%< zx3KDi{rAP^Rj($pf5W4;Uf|Ky(b{~38FS_e2LDtO)CzxW?FP5;{^t!i*)=$sAREyW zz78!Wzk7rDf8PKMP{?ck>tG_lYKq!=2o6@`z2yuKP={sf?&sEc*BjOiKnte8%5oHW z7v!taje!O? zc3Z^%S&`SZ7}EsA9{(A$yFq~duPey5V?EHHa1f&EF2vgHft;pV#3|hQ)Cy=MdP(^` zq(_@(NA@_c!IRf5f>~(U?uPK{Wdd4$A*+=HABxdGqWLoFdV-d=wW5uHP! zT#`=Ypt8ho_)*?}*Dz_s{e$}=O%(G(u<@446Ox1{$85%P)^|>JJue;(WeX=IEJV0~ zXd+yR9Y>zYRLC{5CO_~QY-Ib9snVIyC6BqX7*^O<=12cSW8U1Y02gJ`GIK@B3BkWW zzMW#GBIpl$CY@uM)>|0A)x_s>+a1?CD(0>XQnXpgRilX&vo||v9TaeR4ST0sNn@4m zvFwlIH{U2duEU-e%466*miLG@?8im_0Oy3+km9++q-Vog$`^E<^o(yfx2i6MXa`Gr;eDFACzR3^U) zVd92ztdAt7%Rz_1x?N|)OHK=x+x$R9R#QILM#lr%hYTu#9pP~+YsuxP#Rlw641ze# z-mf^M7N8V!mt6iel!cvBp%)sM*iWcenm;^N%PcUB2ke-6h4t@F z=Z^!~IRDd-a%Rwwy99ixW^vz-8ZILIE6B0ur{yN{S?6WB>WTH5{R2XJfi49 z&3C&IlU9m00_s=09uAXajVwCdagrtx4N1$T8G9m6axJkJTRjMLtA1)|G_3A^vUi?! zT9iu9zey8zVB#rMCkSJBC*G3+h}WSUR??J;p9e5kLIW4=(l9`?tzE|Meso+Q@O{4l zmR!>!h*8Ji&%rg9Ku@ew1gXdorNoNM=`PWCIT+p;W=iCI4EQLyBZM2WMfZWg-eT;> zuSu-cb7`H@wez2&8Ic?Il9e>haZ;&+k895yz-HnzX5h~9pDxzF3l{E6v;V`F+I|{Z z>v6Hg^y)Ls*zI9?aLq!%ZDl)u2&1_z83rd*h8EZeSWqNinVPPcU3i&+tDXzig&Ft8>=t99iUOnA6CCI|oV5<4fThti~ z-@)Ks=HHVqvL&-cnLA_r*t!lA;&5DS-!@M>OzrQL(kJ#zh80ZTh*`@Hmr#U-OTJxJ z9f&mEcS1a=rMWk%B}-lhh9_r7ZSG95*zU*YCk{)njcC&7>CO-Xj!ytuk(9Z6rocKp z^~(BP9hi}75)e)U2`J>oYg67Qr7{Z5sWfl`DL-Vo9`4se z*q{6E&=-1EYY@f7`;&2dAChdqR0b<$J**kZr4OX5y=-CBl*RKe?p`2j? z;d)EyxRnXhKjh%lS|j!GKxT|Q(=S9pAc&*+D#6{R07wBZj{8oT?t)8nX-o;I2324H zpD>wj5|PyR7?)kXU9=TH$Vnw7M}Zu4U-QX*t}2H_%)<*ThQ*(r-zabtu4di-M?a;~ zk?ZpTHEpJ6oY(H9L6?hmSK^&EY|3BC&12!T(>tpw>%teO%@i~n6vVO!0W}N$y(PhK zLVj+WqP0@@I^;r9&kP&;3#HMuJoD_L@epK9gS7#l#Ay1Jtwc^|uYHhyznCzUy)8^jBO4X|A1eVt>4`_$YnDF&B6T_joJroZ>+n4>;!S9>B<1}Bw056<8E zHaWfj_7`TqK#_z+5Q7FE&yiH@`uj*bt;jAK8?jawM;qw?0*Y(Bp(nd{3$d{%`L;Re zmDaf+p|4cd#rx<79DyeMl&{cR&~y0%IdN-1_y8faf{klSp;rL->``WtMCDV(@;BqW#6u4Fjk{!uU#qYJ%KZ6ban*`I zA&WVU5Rh1CTDh2AR2#-jzHkEB8*IL&NpE}vAf9U0^#-Xg!u?ZS`f~XQIZrzp{P@@2)fI1} zWS9;Q05P!BaZV2==)}AaF*<+L<*VLGvlRYa6TH-tm=DBG;(EPJS}mnJq;4~j>!XgL zQ$eO5^UG+C^V_3AjsAMkX8E8hPLDn5g6s}$|JmB`+F7PW~KJldJega|S-zOXP zt(DVJyi3<(z0tyXX6eNWa@VS+E zr&Us6YArQ*dcMBNUU6>E`+|ri!g;nLhW~SPKMhYRbM;}Dbu3vJzhN_T%Vh6in$L#G z=WL!x8i6pFf^+dS4l95v4!UjzviI@JoxFu|@SjvPp#Hbo_pU@|G^+{{{zf3z0?R@4 z4FsUOy_3w35}sKM2<1gzBVz9>gs$}?uilHK9ehRGSVFkIdEE3^sAPHlW|))}mNFvP zsQB}JsS_K@e&-}LD~w}fD6^737;P5jaMdT@ zVwW%dpu_k|B!m3ddww!jn5kf(DuvwNwKY=6x7X_=PuJdCnnNBn`l~|0buPGpe<5X1 zRHfICcTl1GPl&pSD#xuM?S%}Kkg>ssmV;UBDHWVBvOGwKA!pF_Kci}B0fZ_ITL`ns zRTN+@FoFx3(pQC^@;rbM`(EH-Sw$+&pSd|6YI6D;CgQ11sytAiL3`A7?1Rt&0$2g` z^VdxICr(o@LJ1k3cQ;Jj_E3DrB`;i#UN%R7tbziU-E2+J&X`e20(^Mnf-_Gbb#?iLZXpY6?SHL{cF;KmA#lEMWUAByKyGq6)0E}OQ zY6!pU?Y+4Q>_q*{^D8`yee!%?*Wq;AC;6a9mxj^n%ZIxX#x2PE?(w-B$rO`dQWXQ~ zeT~tF-&~DwpFCi@L$=x*^%Zgh?H)GMli3Y96>%2cu$mWy)Qrr)@er@4su6Li2Q3qJ z6HCoyU>_*sq}qZsig2dc(DFw4?03u|3`!SHhMTihI-^c^Jo29}s=rNSHi2M=Wt>?2 zIU;<3%Ful0Xk}G)5x1+d2X+GU|E=geu^(`i2l;ys;*y`ND%^2(Q zuTZs|g<)WpM$#)^hFV{Y4&l^r2~;ZysTwZEDaCPLb?h(JHlm04E$ZV=@4NPUupD-N zf%OqVO%EROd}3N5!vuNdtgy%VMUiM)E5VzfF!3ahSv+u_;#^KQB7Of@uM+Zr&;#w` zOb^C|3Sl7`NsF;hb=RpxSH@mHXMrk%Sm6oXu_FNboEb5?$tX9I36UufGPD&FVUCyG zOT=8*%wk-uJ;T3wMiY=$zlyQR$zOboWQ*&3x5-EMIkolftahgndD+bX;s%Gr@q&8< z(@$7&A+JRrRp`Bq&pmFsC$Y#Su7<(8X+#)ujPnKrQcwC-d^dw@Cwi0dyH#!i3~|(b ztGvcg+y$vI@m4UnK2&VxhO6QYN1z$xsks|qAe}0toY@8c^5^E)_hJ_eqpFbd)juM( z>ko`MOthbIJFRmyPDFyL&92~yBUNbcO(>Ow#@&$9w7Pc%La zVNPtVIx6prHf{x6tgTbGFb=|%Z1W{PPDk9=?CMV{kmuCLcT^=gh-ZMcbf7U{@)>b7 z#IJdyxz;ja?vI-X-6xq^3GJP9xYPQ$<5}GU+LHt0yFAy~Z>z1l#$kYe{ALs}d;Rqv z9^m5MSu+0vF}6idpg-#SM>U@b;)_WkE8*NnY_a~1OD$g zK^)R(qiR4n!Tx;XbI9lL<?4zh@!~&P^r~VJ%~O^Ff7556c6l=-k}5n)C**-~KYR zWYbowto8jz^u5{`kJiTjRd(swaB~0A)^UiN*6T%a>R?$$|A>didX;XXm}WjH?D7|D z{an{m&&b5Q$_{O{nO@4AJbS|Ni3hs~rYMzn$Mx5LJezmJM6{ox#GThc(>#h#=O-xV zL%)VpdChkiuw6?$ziewI##^uBY;*rSJAOJJGQtXL3I0#>LS4+dm;&>gQQ$mcp8!NA zYyT<@&+X4>?$RtW0?s{@UO0WW-Q#Ut3V+I`3u4r>SaS|_LiZM^cUyQDnx6!W&NF3k za(4b4D#r+-TwO(R*)q9PuX$+RHm2pWYHq*#R^Wa+qC~HhMfNjCBo-XHm_2_ZOA>;s zpwtWH51!iyg87vbI9thy+;CI;(@IGKY=-M&U)!|rMx8lW&2X^)fv&IwHW}!jdqBj{ zkv}XSUa$Rn0XcnL&4|uL){R!l=KB_+3H^mu^9aKEd{cg?_^1w}J?C^@-!Xd|QUz(j zT5*J|Lw;c$U_<;x)~HQ-p;!4Gk~mV3z$uDj`M$O1k1!YS5^$GPATWPSt4bTdFT5K5 zpsxv}2Uy~wkZ#@!*5^dbRqbkuf>r&LN=c<%l0G*^p_kk$H8OwA=QDnK-Vf5o8PhNiYi@zCRGPTyK)Xb2qqkN!t|pKJNl5zxug8J!8NA@_ zLuqHWqtF^-99b32T(Q8o{L$g)gbRMYFL7r9*XX(Vr{T*S{&g)Cq3nlA;}8(JbJec; zKs+ES_cZk1cQ(ww9$=!czpE62HQ66+{M>>0o@z!uiLFL~$irtZBBl+`JMf<7mCOHx z>a{tF0yQRD7u64>^P=1djWoM<(9>EOU5E8F$&|4!IU*E{f*1cNrMho%h0yc(7x%xo zt!k~6vC;=r!d|aJrDw{B0s&H2e)xBU+v41!!+zgl`H-09>MgjY@H-h8FmXbT$K41GaNDc_JYIy8g&+NCK)ca}9Qn66sexzE?K^E};A^xbf=U`6|5AmmGir z(G5RV@3mY616;~KP$x~&__i`NF{6`km58~ zvTSp{f@rOO$))Z@Kd#HAgNkxA`jaL6F}&hM`sCb=J_ge#5f7RmYLU_!=}n7^LZyOs zeT)W=daM4+%K0)hnlBwbPfHvrUCAY$KExL`=1j{=O?^Bic>le~t*%C|KWsp}-V>2k z)IM9aON=Z+*9GRCHSacF(5q(f&7gZQxH|r*!<3emK0ld_5YxB&-)wU>(g!c_HRSjg zB<%h}hbXiX{J`v*O>T#eT~O3szHU^kSzv{s*gYwDWy`%@B4Cw@edsskb)q33CioET z7AdCFZWNx)!61#42+p*lE2)e%!%I2L*vAg1^Etr3>zIHs^=yg$>eK+mVqE9)9y0Dm zEP}^t*5{6vU(=x2j~MtCm|O-4A=OJQL2Tr_!MF9X%YT-;s^7IF+W)k@_1mYZy7kgb z{v1H3|NAjwMBqC(?YTj&@ZK2V5X4CAb3=w9Blk2g zAV+nssL5VZVJw$n6y~J{jAY{ox`0+Ti1deH*x&4E2e1aQ>O2WW`xVhcAg zOo;)&#VP<1<~n=?fon!2a4?|*9;&trP3$7>za#E|lQd;uBOhD}DrBIKa1V}-db5OG zYTWn!j1vPoT!7&hPA;ID3e@GRD#fsk_t$Dt#`UZwEi!lrN z63t=VJoaA}fcW{%xD5}bz~KJ7CXZ&1v$3OJO7EIQMUTdQFZ*w@9;w4!C*=SAY1{8> z1dhDkd#zj9^R@-CGS`sVPaeyqykkPL;QtYSTGsJL`KDChG>VsyHlO_t-9Z{32ci9% zUVI!=-4Uz0FD_+vsl2ZIs{e}NWZmR!cI-+*7>{%tA(!t5=E}{H$$i1K>A2V&fwWI> z1f|T&Yl5M2tc6n1zr*M^p7ffTb?EgU+>&S1**-(|zZ#D4T(%`&b^BS8i0~YqU(n<+|Z0H{U7lhzAFxQ*DaTJ0^0qJ-r%Li^R?*LiAv8ymRkFf(_R*FaX4*ZP9&A` zKM4;5`GpxK(>Mp*-HLE$swO-RQ8ELvlY{6^L~O>93r{0C1>&#;pCe!Dan7(VQbq1l zP@752Ps%%xU%C>uzwy7KdQG0wL2oye2BEh@cVnF0Z=Z0DGkgV=)m6sNq#R|LHEDX4 zS$M}zg8}CW$3gbSWL96R0Uj;*1-Tmbbw~b_7`|`>r7$l?-=d4`@MZs+zQk-s` z!JWdvrUv|UYymBDeXI##x#=1eSg=KD%+v)i>orRNQ{*?eCl*lU+-SYJ)-8rLS!hkR z*Je7zfqsXH4J;e&%f3gW+{n;p6?1PP>(-f$B&M&>xwfcNU1BqFB(1>WiE5%IgP2 zmke`lc$DO1%^O*oYgD*xFa#F=!Ek=yy_Kf#xIEj?G594^#UENofYZq+^?r^smp%IW zi@ig!dNW!wvni@fh4b;J$C$YA3-V}uJ0;Mp#Eu7N-L0D$%CDP4EYy;C4$`tu}CcB1qxN#Ze~FDaSxO zJnQFkB`kNFg?rc?m}cb{f@$`Wv;9D(X6Ub%`Sw#C(7wROP6;{w|Lkg3PIhOVaSz;v z+V|=*!>ZJ1{LYqOdO^iZrYQTU-<`JiU}OlM2NT*_`BI8fq`^iWOK$U)NvblzQFwxj z8k#EH@)7+#`3tuo`~nL7D5cd94IPC+#Td=x(TWMVYAQuWsNs+3b36DBP-Xp`NR*=eg%w;p9yf^ zfL%kzy{D?FoM~&mMa=x<=_YH3Ga0v~rLan1+1y)8G2h+F=HLZ-B~c@V!BOFoY2Gg| zJt!+u3j8KKqJ`9NTHui>eut==gt_v$CZ`N4HYB2jRq0Svp4ziAZ?Y<_Oc-}~IExs7 zA5$a17re`hiB%d){4iR-ONqFNFk6T1G8*m-Or4R?|m z;>GE-cQ$SjxzV7uUQmi=?x(!niK%MsafwX(o$TKaS0~kAz9Pp~cpZBN?2Uq=9$Lm( zJe}`GeZz3!*%*!mV7YS)t6Td}@pPL;iT61LGj{kwFa1d*CB>|LD24iDU1IjfV@K&- zTsSd7s=6&B<~${$>LvJea>Tq{&p>BPSk>!>@5>HHdS2YF+EwY}T&`aD4RN4_r{u#g zd=jN*&j}Gi0cJ|$FAU^fRkx7Ns7&C!5mX9DZip_#eg?>9g8{EOSJ+APl5<+HjB2hufe5=dl*&e5zpHjC$*IZNPv)ZX; z-DLO0LBk+xR^%9x|M)b#$Vs!rCMPzNy}ml97A-E@yTZHbL{W7qDJS$>bYA&g>+^

-#D(PGoOTk7}|;~idKz<=1D4>um5`gjGAtnLy7T)`S79UQ=wIg`>t@7ZDu7w z1!Z!Q%HC&{EOxOd<2lXATl$V?cDaSLiE2-A>_V#epIw`Tl%~?vz@Kajo&Ji>2pJ7%|Ij%n~b$UTfBY_)0WgJw>b$+8UHT5-xN2-s7 zd>UiVv_ayZ_+xX7ymC!sXy)qjMDReXUddPtvcFN{!^z*JQ^K1X!0s=|w`6KhE+n4D z+}?H+Mn3B>kk0WdAsz}v+rx*;ItOU&2&7lSThknW@U2Z~#!Y+|x7HeOOf5sm$m&i{ zx*bN|EkM@-yKQ;pqxTwu|Ij1l^KpzWB39At6N7hGt`h$Z5WHDmcrnTT_g3jCexlim z+PPmyWnN%ICRZJ}^BKk=G38jQyu0K5JZ893}DqaqgF;HhGW{ zQhxijs1Exm^Mm5ZmYV~t>*6*xn|phh46(z6D0iv=6LVna)8}$G;;CdO6I$1Vi34vX zo5A<)$qmM?bbZMWbR~^$Zu*LM5)*%iLWtkOqx)Of)UbX-11Zj)ZnTNWfXGC45ynDXTJkqzUF?Szjx%JKH2 zg5T%t*SC3_G~dY)2fj=y^T#3di_;gpRl(!*UHpA)q{9e9)!XJ2jMBBdAkzEM5lUu3 z598u3*3m5ZPYB}q+UVEv%h}goIQ0AU1aVsi{(GF_ibm6y$Pm@FG3%P=gJ9pFQG84i z6Au1;xGsU}e^ODyD)vz&gih)hoZ$gcac2-yfO)=O;K=}2?R)~lN8H%vY* zrC;lPp7vH2>ROxpuZymbkicErHv%0_Kl(%s=S+^xXiNDYhr#qDvay9eJ0<#sH=PXW zSBaq}6qwB~g4BXI?qTZo<~0*ceiz@uK9GMaa&e`mYu?P1gYPFT>)fUdhDk|$)|$QY z^py?j1(J`JbM4#Z?|Aw{RA~cxdLNy~GX5#ty z$*CxFx~y&&drG+uYtF1047Ytpnj9hGfZYAQ)F;mMse{X})N&*4F)eI{G0{GLHNFS- zv|Cn;B$SNZyz#mCxV?pU4#$)29Bw77!L|IMI9dWnp2ui*tVKJRi=Looj*8csO5T68 zHG1SBzt%xhnj}#*1N*KTq!wHy*QXxdS)F%#X4?cI8WD+ULrALXjq)}-QNy&4M&-;Ae`>l1(I)7NK@i)J__P+MDuY2#g z@$M~3aewbeb2Qq9SFFf&APm>--rpya+oJHhFS+J;bWQW z+4(LcBQ?V^td~vB|BuxX&H% zVJ2z_dhyeJ%5Z2~$i{+n47Z5XhOIBNhRMCn`<8(69QsjbMGP>;V|U>B#Z&@a{Ef)L zBIBIfMHZ@dK{+2;f8GIx~tI1hwui<;qrYUG<| z<%hWx%mMCwgglWqOadb>uvP`z-Zc*%3{;#V>EWW}T3D+~*^s^P7;03-ew$%Gx( z8M)E67^1BHHo{n1G%gfVxOweuLL#t_#R({7;}!re1po+kK>uoTx<~)`63Url`rGoF zVgVn0Eh+NZq+Dbi-wd3`G?qM@!jWc3izd45MS!TWgw&DsbAmW>ieKeERoCf*F`Harm0F{%TS54QBQQLXjH?wP0d2!%iIg+lB@NUvr?;O8;!yhlmz_r) z2VFzXxoIlNZT=vmTTs_|amniSq4+9a5Cb!>y@<1hVAXezqg1vq5dpU`qxxC~7IV63 ziq|zv*i@g1r~92$hz#Yk%|`k%0_Q9+1S*nY#0Pkgf`-Y0IQ%nC)13BOq7{4FQTsUG znhwu?VbOD}TRb5IjoP%O;LDKj$+`l^G(|I$*5e4`c)v*$%nOAaqm&t>dC*^Yh2U{C z2ioSW9j(6K$$m%xW>p72&XehdxDJoB&Ak1lAt8+pPq!hp^n17)zM(`2A$lZ-Q z3hq)9dv`v(M8U;OH4*c6L{Lg?hV^4AEQYXG#~f!=f1MseyiT*m^Y;I5DF%j&TxRW} z$9Wbi{Dl|!%#S|hYO~$PmL=1<8`D0gZL*+X9lJ`@e4KImvu&u`6j!F2^Nd<**~5I{4H>!x>P zbkpiRNxR1=iAt2lspN};4YJBpBvMTPj^?#nAXr$e+E4tQqjoE+$oPiaT6;yutyu`w zu_1#<$IZ)W9kb$##*ipxUteo7Jy%wn<=>y}Q^DEJhiy@q;rCbtFj$GNVla8tbdPD5 z+aAU>R=64I<5C$}FBIRbokC2Q@{T2pFEHqu`ilCk;OLfD<(2CU%qJfNWw-0GVyO@t zN`zB#;6V!N_`rp-Qt?5S8tA^#U0qIojS8#vN|$wt<(s`_NfSA0ZQLLfbL223T>V-$ zscm3$rP(a+)a584jU z5*ROfy`QvBE5F%31cRR{gr_bFYg4gY)A<3fB|naPB15_R14&%0wuU#&jglTwjwUTb zM)jfW@L(|n`}O6$&5G=z8SZSQI|0{82Yb*0Tl`+6{BJ!7B=`x>#i_MOkbxVJ*3o<`S zm#kU?8HzEVwGzRG)R^lF7nH#(V~@E*m#>v~Q=98@;8t zac$s8&v-PH6l@>2JN3)BtQ)~EysY~htD~&@X^ahTBo(0tslnr z8}pCI{qpIT)uG)eBUv%Gb~ek^w*+Op#}01q`GZKp~n%d+YiQJUMg=5GU@p@+F#24Da2Ne+a1wVK9A6iJ~93{2J}_ zHV2$E=_E~G99YixrS+Rw&B{P=!%waa+g*d8JtDIFVjSix;`46y?D_zzcaI7&7F(5F z4Z%{~+Q>Ws)v{V#Ie-JDx(fm0rnElq(=Rje0qiK~r*XiKxXl1oDNCfZ!B8** zg=5k)HQBR~F|&CkQ#JkcTgZ-h`&6IR0?!`)CmjvXAk!<8If?{^Ot+(q+TFYjI*P}~{?Kh582KDVGXxE5bCRc6nw*Rqt1rElH&`L%!50;-G`#2V9KG9W@Z{{z(gYySInI8uJGT*dec}#V#?)`(z&_6gES|y0 zEk$Q#m$#N<_R9|8pADLI@~LB$n(xaZR-9PlR%#!9yEb90AEY$P83T$UZrmg;tVYe- zP0aW3wV~<^8#O?qnaZaRkB-w!mXYRwnf}Xd`v7KIX05m~RPr2r^DhS+NSk1K1kyxn zS&^Qrptv<81#t7C@K`rxKR`bRdy>B6Q7X3qB(eI1V-qO)=tq`jg0+XGk!TCXgOkAEUTgJ12F45~^DZAut0!e!u_q5$8sEHwP3|W@X)| zOXEpb^mYkn?$J*lLz+-#3^fGz4o96T`x!9Ahx52_5iSPtGXy-Go!4SLFWG`zJe)3z z;(Gf=+>69b)$>2M%U(hs!Exw{^@=`{KIZWzEjkSo-uo`UWh!D;Cc(7KvdB7pVKdk? z7Bp8G3G)}ckQAo!^V!|DB#hGMOCPg`$rC6LD@+1X2hQ28BC^<$XAPOzMf-PqL{R)+ zDcpP7Ur`qgf-PIj?lmRZG6qgKgTh;QQec5=^Qp1NXUQ-XuuKpokPM?3@@OSyd<@R} z#U45GN?wNX+Znaz*4qTwGM{-K9hm4nkVDy|$RZqYBhBUL1%~4TqlGs&d<9aazWmM- z{CyriL=4|s84>Jw^$J`gb?V3$%1_~`)d4mDS55tdS%wMQd#PZIx`zduu9IUe-8M9K zwV<*-4j3sh=aoVW#kUX4gA9kp#?BBmPfp)Gn!4|ECoJeOeu=`wwOIQY7%-q=g9i9z zqhlJBXb)a@bi13AQ>C3aPBaYO1>v5$2(xQ-&rK8@cLaHYKlH$KQde2$z2hJsx&}5% zNPr+F>_jn09obNJe;QaH8?~qoPQO_GBDQ7h{-mRZSR43J%wi*VTKpg2ScmKRm+10Zg(6-G6AjO9s7+l9CX^}7tGL7Gh z$vi>EGkk6JDnjb?)R}mhXFLM13FYBGcqBE%7RI#EvKL?c5@z;n zLaYjPx$-G+FJY9g-~;IEG7GIW;2LekW{~JbDb&Mkqik!vqQnV;pWvp^S>m*D_3Y2#G|J7wcFQe#yi>&@fwzBF6iy z+e8{Bdy{`Ym9keVQ+R3k)M$hl|zVROXm~68A2_y=HAVm z?4p`s8Pr(5Wj*+?Lvp-mGbeXJ*MD$m2nT61hKOPUWN6Mifp;8;BdV(VPkb=2t{aM3 z1#v3=EsHs@k*y|*ruEB?lZ_QqD*qXI^~!|!BLMRr@`^!wDB@^!XtmqM- zNGb&$U>)CEV_;wjlzj=X1HCAYuPgg`F4(yxWs4AAW<`X6a|A+1{1&VX#$5B;8=I@y z`}Kh+S6IHr;3pDnJ^+v3(91k+A2P}b6hkSDm&|}iS-OHpMKQD)V>xT-4Dnf136PO1 z!uL#(^~D2LybXQ2eSK?qEG1|V0HhRwV_`5KOZamO@X`Lz*k-CRfng%sHvug0gpSJ& zuOHmCk)uS&fO-+{!@e`aEAd!I$OLXpoJiYe^hH9A(yN^=9ATH-j*ayPz!3X!obdvH z)Icl_9$dZiCKRK)q=xQy%dJ8dP$f_y5(^dgw?i?LyN=0~0LV$9n>V!sOAOu3#!#xz zGH`cawcP*fZ=+Xnd4nL%8^7YE4Iaix^LIPwYnbGDWT9)t!Jn&OweA%w56Ysd=WF*@ z$JWpwmG5LmJ*V53*z0r{&4=r$w*{$d5i@00Lo%J1B|8ywkv(`8I>K7oh3d&pUTpO9S1b^}lwY~=vt$f%B zI-0xp3}tJy=Xdps);xV!h~KsPW=VzXVVwR$K%r0!f(;!)(uHsRjQ{vIZnaUUO0jKgiH zHh^+RVf91K>R5>Wniw&H%&9XQyjLVdR^Ph_NExfg`{_}7)w_w{{n?F&UQI`*UKOCzJ5gax*ec(LEV2}cp*yS;+@?Y-!1#!J%XG&{Q+k?oCu$l zyjFBb5qH35Xc32jq2nX|6}KAphuXG18I5~K!I!?*Ij~6IG3@&Aa#;V=V-mc0m%Cf zkHplzfK|>hkej~$T3;$cyzVSR&H-m9yu4Fy*fR8R zxo~0N)9%5%*jQ6psnx?BVu_b1ipU446I#)zI=aN5@Sa1V{I^5QW%pl zZdR9C>oPa%v3E`%r=QxK^`CS4{kkDmJ!+^)>(~G=PpTuPu4>Yu$iC^%&k+z&+%;1C z{lt&}u^3pATM%3iJ9zYU^Dd6Oyh)PP@4LL2we>6&;=usPL?VzI0H^0J_kU)`pELm9 z-~DK*wfbuO1;%zLAqkuPa^W)^i0Vu0WHg1jhCA_*#DrylGTSx)Z&9M5APPo=@91hU zN+Kfi)_@*pSXZPZ7xchc1&(+O1UiL)p1Fy49&nSk>bO_6Uf-NQ{$05sOrumu`D!o0 z=nolXKa)oAKFZ@N?rgxKP$G<`xPVb(!4@(FT~z5DN*rk&)EIA5xA(p=1CHNYW=UiR zQa-W7C^d0KquC-u;G!dl%E-h+D+d(TQu>rY0B7n__oM3trY!{n9zC!%}Ly$239x}BmC0{oVG+YM#(|(jRMFPX((o#{o7P- zq(s6{!J_n=`vBHT+ux1X4SZMfaYn(GIk${-0ti}qU8WU4pYXl+s;5F7sCX8RSFhPO(+|qvZPun;jh9po=YlWw zX(FR9aMD{Q`G9Umr+26su342N>I#XtTECz&tM_L{Xqbrf?~dCSW%q%D;?)1215-5* z4$L^m=+r}T{qHELSNa0Rcw=JvT~}B54mlQ0PIKsxxBh}((Q*+QieVw%UBPQD@Y~z* z-|ap53mkq&YKKiJMi#78#vS}5IlmDRDO9T)N(?PE?!5{h%$7rq-J2dL`G!BP$o)tE zu^a#XS4{RA-ss@n<5x^Izl+0~^z&u8YC(3?wk}{fbA`VC-4cFk^#5#N{WL&PP$7(> z)mSr;%MSB5Hf9=+M}S6X`W>L_zLLtwHM&n8>WA`xxKKds2|qs|8WR&fEQ2B75lAQa zCo{INRux1bGAJWS0%z~Y?4l6Tv7xcHU=xcG@a4%~FixW)z%H)R{{s!d?+T=t`&&@- zk)A?DDap>(yC1rH7oUATj#QpdeD`-UR>S4*RlE+xplN;_Kr~GJy9IKR9v%%1elWn~ zzr;W5efVEkm5<;3R?95!k$=zOUrkf2jC>pR^PNG}uyf!n4rRvft$z1GbPpNn z{$UGnUGCkUvmL1d)XmpxJ=F=o^cm@9FW@y0f7u)13__qM3B~|w#k`x%BiiEm-k4;D zBG?K^E!_83p^0U!2$8&s`IM=I@qv6%#tscI02Bo{Xq zMFK~n+%MH9YAuq2k5dwFjY)QI0dJQIx`T~1tCCC}(XT#QOQn!#xH=LAq*aNP<%xUC z!;Af32m$*IU8s$QodH(>HJxI*3US6J(x~b=H(+--ul+B01B|c#&|Yl7iH6hH9l%wF z4e+;k0>fvYmuQURja7OlGYn;&eUGuI zV@Spn^H9T;E8gR%mKzgyI*=x3HvkE zaTio3iVebGR#gFWvj>`Mt>M*}OLx2R?V^B@4qan&@3@?800_&x7_gjH_Bl#thl`Wo zcm{{K?2VaB0Na#b@ILd%gz#nF8c@iM0S&LF>R;~gRY88LuwM-zu_A7|M2S}Dlx>2r z3z@wMo~B75S{8_R;0B5tRqrwajz-=B;Gs&~Hx1(RBB14sIy(4b6Ke(22m`p|+UP`) ziG;Q0dZ9t$lotTsqrJ1`b^byJeUJKS1tu2FJhmpQ2nLT=NyqWzt;)!d(Fz;T{79gj z%UVgG*MNl2!MWzEosGiLkOsAV-H)V^VQtP5AOj<*tzF9Wty+E;<&bKhPv#N^`3w|i z@4<()fLyK=#2ER2n3PqcnhWADfuF+1wE!90B^G-g07CL3aN=3A909F43M^%2Z^e&f9f65o?b5{H4S!Xw zfFk2QBd1`*gaaQHgJ-qpBClhP^lmT)e(V)4BAQ!Fg;xbiLE;^M9Y<6<0wg>JK$>%v9INa?a(XUKEcK@P>pgQSI zh~(5nJrltAufylvp6i?KqOoqQ>AstF!M?l@ZK!%Optm7*wYM!$!m?>JvF`Mc;kx%bEW1?F2zY!@2c$Kq7 zGIR*9w?^&&Ce~p-gz=)de{C;RBOywn={jUsPoj}-YVDBY3RK}xZjQKWPU`ynOIng; z7L!voMmG3_Xq(R2XQ38m8gp#SHp=tJ7_*9_Ra;d^rEgs!r4AlpLdBEc}U|{HI5OEdC?os+$kvAD@53Ns; zgA$XkeCNRCU_#=qf3$4&=f3r7Fi38SF6sv3ort~lP*#@0&>QDqA~crVdHL)p z92qcS04X3ofm-JDZ2Xau{y1TW3>?(J34^76KdWH=d|bzm;J4rX{e8Jj;(JZU zjqdYOo)tA%QP;Vu=n4_+W9Rv8P5rClCj|AiHf~}yyuV{79Z?M#y=49@i`j&)_^gY+y z?7y@8VBos^r9Gq~vvbJkw&$9qS3Y$}aavky-=lE@hw3BXcuNHAawg3d8{Xc)6`@_? zQFn;=WSP2yo=d_!H2cQoE@KDccYR^ku^vk2XX?09bl2;u>Rh=mcA7X%bXRiKech;O zo?>ew!j`h|yVtk)rZ!pgSSKV=GKL!ibxGMpYvr=2S34Xa@RM^L8k6@5X!3Db?w#kItzX{IMg|T8!eu2O$|4X9*{#BNw2C14*ml{KM(#N z2)c2DU6W<7A?b_k@vw=i8ofs?^W}+8KbFA5D_6|a6p00#0+D>2I9dm_p|@g4ot&XECT+2t)c zMH8|3&R_O+Yoyj`%u4ScC6Aq6kR^V&EF4f1Eid&i7ZVD&7?4_?&a1i01u*-!59pnk z(F?%r#LL7nVQ$|;bnb0&!$dk##A1X{oP3q@LXrb(%rI76tdJ2Y*O+Q%v!9ZSCrq`| zrY0OF8-6N<`r(&Z_v{C#js_?xRWlIuKK^m97w8L&^6#j8CclOkEYRL8-9yW$Gkzs? z-}1eQ@8 z(-cYKs*!hq5bl{3@$VwQ0iK>bt!y+k=0$OnBnf1Z)#{QTKb>buv1Om)esS-&a=Arr ztg4ECApJT4Y%O<{iAkCbJr(LB8*??8t!-(mWAu0Ko95!E_|^rIOXGQX{flF_iNo@$ z5BYrpgh|0c)?LG`cwD5J{nf8`zcv01QydOf3@y$n5kFSG=M<|+(}6_CZ1hFcf{b(^ z=B8{*gtr*3J>XkNQin^w(8}85%WJwW3)l~f{XCxE9l|L=C83xa`{?YVr^|&zLzA`( z|2*@5XyN6N5;b=E59c+zo=$#YCL1L*g((maTi@If!iQnZSlwG_OU|pemXExDNvGDx z^;q_agkpZ991e0Q5gRIPn{R>U#W+h7uRH&wRt=Y?LcCE=K5}pq6cv6&i_KL1ZTS4! z;RCU$fV7IaBAR7~@^5|pC3gUG@OsLq^ER9JSg-<+^3so+pSW3-(z;B3Ci2kyE7f}n zHs07K?^OC3Gu9zY++q1DV>@~?#KhA~@~VK;_)yjxKK?Bde?q&6EkO+ClRsK7 z7mD!_SwF(7?c|8RtVQ16@Xc4~>S{mk9DM8a@uJu8TPkF)k70kZC_Y^L6DSOZ3u-$M zF8Bx3icrm{2WzMKPL?LT6vw8+>v7Xt0tk}5*-tdLdYkA9OK=d?)!y+0asjpm!FVk z{ekI_g@0Pr&>`*q@9vd1H-bs2gyqLF6@N>`-_I#Rhk_IhOz63qE;uWT`GjSACNS+h z@t#b1voVi=bZ;@tX-@7l{(hRwlAP%rb0F*apdU27sMX1uf6MG1E)RV%5mlV~hL8Vp zHT>mKC)F$07*^f@{(>({xj~O!+weF;(}MYw*-JZ{KPKPQ{j;-B?MAk`>LKbL)@cy$ zm9YCVcZ8o^upo?YfB#)cf~roNpLc`_mku=j0_RRQJ&7U#~Rb?+%*}wzIw37 z%ffka&81r4ZEJ=!os)~awzl)m)~Aj7Q&2ehmI<*n%zJ+`(Fxe}Q%gs10*!*b=`$xS zaV}_C^zNOP92Pk5h&N_HRyJbRkg!i2 zjv7YztJLNC@=bHCn8JW?SloW=%VS71F%yGLxPhXy%ZKR17?0#+RBkTsyS`yP^gv9& zhpls@<(JwwDzTMJAb-1-T|t!9I`2T|fh6JpQ+qpkGla}ZY&75-sGiPfEFAEN({DZaj#`iX+QXbRr7kFIh+X{PGo>dwq;x5lW?657|D5hynN=6i` z&dzT6E3za-PV1p%C;6x)w8hpF=GCn?Z{bzWXC5Ntp?joYS`qP$uZ{%cOUEGNHoe%i zvg*O02frgE+A>IdIUR11=g;5@zxpTp(~=%z?PZ&uwjc3p_uSmgRk89FwfErOvQBKR z@hXOHHYYabW$yYWr%S1&ckoKY2?Azpm%O{KIwOO4mI#8}TIA2b(2wr>{9v01-z_?_ zNsbT?>2REznJ}`ZXBJ^#5GLO?k?2l*7#K$HVq73J+UlUVsoJ=(diYZER0t8fErCilD7)mU)MmbJu2B|Qfd~du#K{7HVGw>BbgT)!+Q~TzvLu2B%(OtXk zLt{)CP!@}_@pzP3E5BFdP&>uNuS4i$o~bx+|Ca~LzA!F5nJH%7$uqtvU>=p@$kRCGeqvL&VPhh&o+B44{tGtx;w%7D>aP);#Vf609Q8udc!(dk0de64LfQIV&~TaN%* z!q6xQ1_uT`ZwttcKn5~J+2q}aN^do3%!%ud(urA%t@E-(f^M2qLB%js_X*74-=c0z z#65Nw%npkJ#!Mbh9s(m`j4>=T5<=~zXKI(|DT-W0d81W}yd|g*uiii#m@c#3HrJfA zd!@&9N5e{KuDy?W+c1GBA0nV8c>0?VRlfSU55bKpH_Ry3-|<2ll!)jt#*w60U$&89 zpAax-1BzLrNO})l0tC@-TGAJeG$C*XwU|M$>30ag1+U2)PzG&=q$+!1M=tj}D{YPX z712V-1*)lC_=h>>z@i!6ZHu*4kJZk`>q1k<-P-sYB()Q8E*Mg+ZWavkxSS5!N#aXN-0#Y(8OIKcv;D}MrQRmXS z$QoTxAv#Gs%W?EW*?E;7tME{XnH)3rw@g{b!#SEydgQJ9M1_m*UV=!kU5}<{)=|^s zrbX3-P{BH_`M$y0tSBxoHOfx}@8H&g{V0>6PGN;RA!EXIDi8YM*@F2+BFhW>v5Zp2 z6J)iIesE6k@3Xbb6c*9%;11uGmOpVUR+A(yyG}b2p13w5^>Bf0Dj?#AZZh)i>ysBp z<$kn|ZxSLFlzSf8Cr=~aCVy>kV}kj7(R!iDRlM+njwaa3lUL}UWxN~sId~BkJn8p( z(P2z{#R3lN#1niDvo=(SKdfd>eeet%>w7egnTtoB#DAqD#L5%NpT^}kb-5>LoE~*| zP>h&CGBD!0s1&1qudgCFFTk|_RkULOYeN|%}%|6p)A zm|cTl;X!AYRDwn4EmI{Mee-P}hv2a%z8d@L<|&_^eCpj(e3<@8Sbl;}Q-<1p;J7$? zY^`8X(p&;j_&`!3=Z#7S`FAbo=6v;radO(Wn+9G(jCbKET_&vGM_UZQG#)UscWp%2 z@M<>zhrrDYyntKb4z$}7TxfEelq>1O3%h4WDQF*sq;a-xi~swXVzn?~D@T)LLRUSL zuo>#Tb#N^@a~13IcSLK#Y6O%>T)I(}XZMiUM*@C&9iW*XJ$#_>M1)G>O5$T&dJuba7fwqPZzme6HTD`Wx zujwQ_=)RxHGJlf983#a$;Qn6UW~|`eKt+@28uqU1-j-@$<3^>>`N8rxQ_p12YhQ7E zUg8$1jkhO29m60h+^!#*jFoq_!0xul9I&H`N% zer#sFjT{*kSs>|c;1ZKq@rQjj6*a3R6r+_h;V)4&eeIPOiewclzZ_!M$-A)bbs?lr_~Z)gA@7^>jS|gW?F} zHwyDaH4jen@G0dc0ni;FPU`HK0luZKJSJykg;hI8Tar_9Jl;2rIkD9Pk?D zizuH^c5k3DXx-M%WJ<#qEw!vg!o*YO@q zP!Cxb`left&Nt9NXl1gNk!drsmezer>GHaFyp6`h26FP~%|ag=gPi%rFT74St6HqB zMMRxOKj-&1u>D4M>v8%<(~p1D`++{B6dBqFtJ8VfizFX+X$gM>xm05|g-SpD9axmi zkKkE(QCqIyyJDTuHkP8iEgt3jv-}r&y`WnvSaxf~ZPT{I1{q=U2^axxSEecA)ZU}CW~g~~z+N4*L5*rpOA;W88;{GURF2S7#~ zVh&ox;Oj)>v<8!sUQhs;7f&G1UdHE*0H6B- zip9%zQ$Z@IYQ|?RWD5koa8h6v3xVNE|0_kh1fst>nb2 zu)Gi102y?Oi7R8ExzQIKq3=w1>Fx+rWGn}5m$>WFI^SWf#MHdl8E)hvE7?V}??%KM zxZJ;NaiKw((-Id7Q{c^P@9JykFHdhH`Q(%z9mV6tS2Wdq^OB+@CcW}#V9Bv#%U@(A z?EbgFX2zT-oDBM6Y+M+{2siPbyf1P^evVh+b`S=MrJ?_s)G_1tQ5Pw_!@kJql<6Or zYsB9uW=#x7OxL7Qx$x%J5#Y*h9Fbhw3`t>0ryU%j=LY`uf zNXx?)WWP8#5l07GoH3lTPAUG!W)>@2jG{>RC{XJvIfDcg6kApyR!JFiANMJqSLR2; zJrW2}6C?vHzA?TmO09rZLes^i29Pv@4h3RVPa{mGhJSzz8P)h-T{*~3HiI;S5RjX= z`}}Gp4WXyJ0`&Jks=(5a{OaI&y485F3cC7?Tlj9!tC-owYpTyO0@i#esROsy$!Pf) z$U4V?3W;6C_hh>}L^GzQ7>Mcs0rP2o)4Suc_A*G3Qk>#zoV?Ja+8Fl4XIbl(Di+Z% zWT-FY(-l!0EU$q*RSXhk0#&U^7(Z17w^Qzz;AHNFTHM2x3nsp!}-9oy>sB70Ge&smqVzsx)3+J5x5qeMQ&m)kIinJ}(Xp zNOSn&jy6uHx_=T)?_<0`HZ)t9)#O*SHU1#z=asma6+r1vy@kIjO{j8=u3mjGq?CEN z=QR39>I-6uKAFIzP;eu$EIdyPfw*Dvge^*Fs{60I47znEYh{R-r~zzss8ZPz>v>)B zERUm=_oO=Bz}Vpjx(t*=7mS6bE|se{g5!bLX%nWO%u@#p@h6+VBjxbsI>``sEU7jQ zpVtlKIi2nmDP@C@#t~rg+G2~?;D+zq z7Etcuz#R?tDHW(Dqz3-{@d3UZ&10hPAj=InpdG<(8uERYdBQx z>$i<0Rzj4y&7YaTKbh88+)(QNyscnPoz>2LQ2c_{-OSGt*R<_n{541_-M2hOUWISz z^+3NPmY@@fb!+Qx>*o}mgD|^v(M_Gh3HXOe&by=r+CIl`&(`u0Ae8wU1%#f}B)q`b zUJm6`$&K~;i+4~j2n@o+7Ycm#*O?b;_rY6RAz-~gQN$rC_S!)9jgEggICP}73xgnI zNdqBbR1du1NPm?m+8HG7Oaq>)`+~wU{l;d_)mG)gqK?Jop>~YGY;cqynPlKum{1w=aL&S9%X}f~~xaOK(TI z1gwnDh^@#C7ruO0K!=)7YxJhfeV@tC554PGgY_p%%^M)*zia>t?YPFbEx#FgeS^T3 zaPeS;{#QGn7|UXJ?ZsdF>3mM($E-jZI6s9ozjB8XtMeh4m0LWZmX`KowXvVpuf8sZ z%Ss}ju6HSaYP&F`sZKRT(wy*;KQ)A5DyrO;QJryoFKTf~RCS@k@2>DOZE>O}ya2A2 z5qKJd!xNH7;-w;bt(FYAZ3^sOupWD0LKS?n#e*d1^Z2Lo+WrFk=rQe@^v3nYVf)2_+tpvSFLBXIX>ZQg?e7(by z#u0DJJ|;;Xdwdpw zPQq`hn(rHAGV|8n>+>C4w^P6sfl;^`O^-}EnOHE{yzrz&5E1r}crMd`yw5ec`@1Z> z^xe$GeVD>%!woZ=Dr43w7Rm=z1qP)iF`t&n;|!?Jyh?h8jG7V zKS*HqwXfO;YheelH>;igu>y)e;u<91$OIu%OM!m11(a1}TZAzV{bQ2sNk zy|zih6etIyxm%D+{j2cAa*8`7%emPvcmr9uw(uo>81jJZ4J8I20~-_?|Dun}2+`-JoIipSjKCi9!0j40xDcTqE$d?(vUcaP{(r~0_j zb8w+XW`goLpSzABh^zt%ArD$~eR9+-^1ZDI(yz2IO5DAEa*K)9jPF4&Iz=23PVb1* zzo%2tN(0@t{8CKorMCL>*4)F`4n|w;@1}HfF@vuUr7Sl6-x%b?a^L7Rl8h(qERupMVfTssk-*wN|zIJ!sQv~Nj?LMQdL_`QyEt36?3@1JuFpHKTdf)B4U znB!UCGJ=eEYA#t6tr24cH_JvL)N1re;(-xN`9MZ{#g>qWGCZJ-hnVRSV>OT+tpSZ5 zSvefuN>1Spt6kbwHs;DAzSPRoxdab#TN5EcnA2V$a>EJD29=Nrrr$X~5iE^trd#C~ zS-@)ytjHZX$_=Yn588~3AMo4i5Irsv9exxTFB$`%E&Dy(1OzoN2m z#nx;GdI`4GCHv1noO#U@iUied_;;?rp8n4aVX`QOg9t@U;Pz#dP@RINzf*SO5Ebc4C>xej8Jw6p-M0ji) z!2tlCBoj@!5S82n(onQI8~t3UQG|bdd3>!*FOYGui`uj>`J$|!x093pntKvKVQKiu z`vMz%ezc$+m0Rv9NbA4Ft5Mv@8Pp(&FFAqsCLIrdve+L6Q^{Vi3XcNiYo^#F&6joa zHPK#oBFDlyDXB)X9Q91zE2&J~{u?YmB#$c#zP}^dQTtEu4GYRwH>p#nU3=LnnDPAu z)yqF@QFqYDrl}(cWmdSpZ>`*TrB!zOyN>FzaC(NRW4Av!uAt=L^Fs|J1^E(Am7L*f zu`^$rj*7^bi}|$`k@0p^s^1jP*DFVOWs93vF2ov?J)lrSBGSB(={Nj^I#)%U!m^7- zKOOqwUkJYy!R(_l2@o61;ol^ol1}e#Rb+}%P$+j4R-96a;{xJPh$O}jS(v0i4EfQb zM$vt6HCH_fAu|RtuXp>G{*L3H=VUd~>ufO}s;vuiliS)@`9@m4_boD@Hh;4%wB|6_ zGUFwq*ni6wuSSh@vLmuS9~(U*=v~aJN$wF_v?fbbk>w|(XQSqDB;r?>J(Ua z^6=1{!o7fRf;|=W%{VSPO!-EH5GS4VJGAl}5Aczv^gE!HgBj(%06#ZV5~wsPiv@gs zi8rbF;LsQ}*!*48B5Wb{HNso`e_uF)fD8pycDk+6b-!g<9d-aij(FB&TlbO8MJg*w z#G`_8J@}r}RPqIIRPtFeR9<=gNu;MtKknk}`vXeb9It);j*$4Hw+?M_;4(CqPrW5> zXzYmh#A)hd*m|(){bBa~6C~mNeFzV$H8pHYca>Gn+%7=kZ!GY4+OsO@mWA_0?pkf8 zWTc#Ge031`suD^y^>xw12aUDhDakIX4)d{wsWFB$ zmiafXAy&>nH9}p68^yPEkDR9tQxXL~pZ^zc^GN6)BwMNF)grR^bLBhPBgHfn_g9j+ zD$A***sbufHe$)IRm$Zk&sc`?syrZ!c(7A!;{z_SY-Fo&+a0#Hb&?eH?9YJ8L~tCo z+;{zBd;7(*w!~jDx4Cr$n<{Wsac!0TXvX^&rqXjc?k=! zt$G5z?UWf!z5Azt%Y@)QscxzsP5q~BL;%bwx}|+5Kf#w<#MnaztA`7fOi7$R$V^71 z=Z@u+%3z3hba--x@4y5*ZQNww5-wSvJp*gH%}ne*PW|(m#cJBZ0O*8&M7k%2jOW-) zjhmv&+_vk_5q^SP)hF*HtCfa2+r%v7ExQgPr1>*iXPOXdj9X%i-GgbDJvLJ?G3mee zHo%qYrlax7r&d3;U>#4a8+rC4Yen_X7GGcjZr)R|3n2Hr1N>3e+6Z`4@o2A`CQyzK zbS*B7`_WNDiN$bdQBX(dmFQL3fQIp~J-Rl}za<#{9=$ws%J&$~} z9dN*&O9QQFadO+&E@KLo`sSf1=7TeygS~9 z{y;r2f_+AE<(?Zcmt7GPYF*B}$+57GzR)#|duUlxB%=P3|F_-M?^q)%eY z$&Jxk9XA>H>bQ#L$uIYQQn;z5o)z_yCB50+JhAOz;Nr+o=M2kwTDg^Zb=&l>z{j0D zRO{7}r)!49N#Z9Bgjd_&vbGSCApSMEzzhwMlV2mon%-dgSPpuoVOLAt`Aur2 zQ&-Ea@+dIR4^@J@4>bvOI;^3_6q?Ja+ydP#QvXkDUmgzS_x_KND2#}dZR~s2P-KlE z$}*N=EJ>C@$=J7qm~2tmx1=zbD8k6nLJBd%ARzX;wdG2$c`#$GB_w%}6&)FAd>y1Sf=G)j5Q-*jh0FV=VP55SAQNkp7OzSaiU2479 zO7kNbDNIpLzACTLcO7}La7)DW-s9On+1xCM76UgCu=Vf|xtE6v0+~_n)kEbKpsw!Ng@8Bz zc*^g^%?OkWU(&8w6dP{vG=NkxmVQoroq}Gud{V zc{kfqXY=QW-)0W3d}m=|Wr+h=al^iERe$|j0Uq3!A@vD|hCqR1loporU&?l*GX&R4 zh^MfWq=RdN#pi?nW1CPO{9BQxc|qCq+QQ5v`90%7o*nbIO8|&r_<7%7oeXJ4KGGT} zF?}$ksS$8rk`BB8Ttp{*`sP1Y4)p}ub5#KH4g~>Upo2`KImW+kgt7($WMZ+m&-R{q zH{V`|{%Z(bAZ1TENE!Z_1(eF?7|{KfQsJOOj<-`$9pDK!GRaV*?XO?W0YJj#hU#1kCwXVv>XmrT%H z9?1kqp?7v>R&LM;e>*j>;g^h9c5EXkQpy6T({&L2V<4E^D}Rsx@&M_L-V}Y_Qo$q@ zZHRCc!byX)f$#Y0Uh&d-jUYW82t@Zg1sr|2EeDW2Y`EV;T5clMjb!SJcq4wU6t43@ zNvO@KbU*Ods_*7yUe6hiM_WzL{v!nRU}cnj#%*RV$p~bbhccBAcpc;-Q3_p(cfeua z0b;wQ&awnmn7IHz%aJ&2W+crqX9rNXZ*l@aJ_`awQy|h+22oJ6X4(~PKz#8LIKbdr@8gPWn zLRE4AcwGWu@#X-Gp9TsKkYS*xj2qC%fMY$k-}0zB)dx@-xmvaY&Ydhu-KSS)K)SOR zV5PrG&TN5`<(nIX&s0=j0kiLc0Tkde0QAR>+{DV4i{Mc7g0U84&gTKznK|v0l+&71 z`)z@&fYBhoA@^eUOqVqGAv=ioI2aHU|2O)v<3So0Wp~4UVvaY8$|I`Cm^`#6a zgcKSSe%()lNGvLb_DC$o<>P7?8K5!%zd@(iS@2$U&NMt0RGt|@kn_0aUg0Y2xQGhK zASZ7!wq${NL`6^)NxRVor90F<-`2VD@KB&(!F*x73>jqMA8CYbxd99>1z=-~0K{Ke zQ*f-NN1G{T6`b*8a(&v4z9?+l=mG`wmrIr~sK4wO8JQF{%>Up9jpL5*cGIB?lS?PobsxdE!9XG$IEup zC7l9F1=!1j{{Lzv2!#mrKjg5ole3QT9}RL{teZ@tCU`e2K09Gg#VlubN&P3#mJ%qP znE?vnSh0eb9}dVsNNG9ej%kn(c#*N%8>JyL1J#AxxHk{f*9WGYd&n2~Rw5m`+6#K7 z0}6MzF1CV_tbHR_UmZe$g$jp{sK8Q9>8R6XHs`_KN z?WHt4htLTJ(xj#A0DH|%@8>IL7n^r?1O!@dFv*lm0wiGQcK}YO573fw2Gbo_dDa-5 z+JMIwR}Wr{Pdtj6Xr|)Xk&&9bAtPn|+S7-p+yi7f+9yH92G69uK?2u-({T#JfDXDE z@F36y81N@Qb4-~ef@SNxfv-bG`-7BKaHKG(36uV7R-a4utn|c4^2?!w9`L8df98Ih z2YRQr7i!>Abh}WgDC}bn%5-ru&%eHun~WbGvoJS)Xk{Ptu!H^UTMcLyFV;XMgW9L9 zXl`7ReLc|{?f|~0I&wsnQO+GI`+zDEZlBv{^+t&K&~-sVxeb82N==2KAt^M&IJo$6 zXQ03zn?}>Lf#F+DxK_F9EVjB!5xe%xx~9U~~l+6WhqF$6_g z5)~=QB~Zn6%#F>fd+p-IK)WMH#ZLAzUMj!7{A-8~5ET&aV=5nZ`0hQY?twA>Xe|@G z`60KOrWxvK@y<(#uZr-ZXG(Q%lbd0n`#C{@y;?AV7?63sfc=cQ&_DQ|zwE-=(Xky6 zDfbXSv@zs&X+&1?gf}Fxh7Kr^#msO+G+Doo!O=9~D|2y9{-PDvrO|#Fpju2VZfF)c zM5fFtwEU_CDKa#`XV%QO6CEsD(g?xb;8u+sOD$W6AkwU*Ctye7fpAp61$~C4IDs02 zIew2~EBBeX|5pr0BdbP;MqrdN!132j0`qZfzz4vWm~_GMb`i&^!s4YO&>@bdQFwi$ z(P1^(jT=k(c+KiIhVCZwZt10Mdi(W)_a9?zRkLXp{5l><3;;$iXlF)?QDJ$+-76{3 zBU@((HK_myMG2l+ODGf?NL-d&Fnk3VO|ke1et(tChTg5^9aN-=1=Y+%^78i3S@57f zJ6xlI9_;!`ant5|fr2pK0;RWvSQw=ao(zTnuAwji%t_LX(d zWWO#zDlLA9d9uf$XB2sR&8A%wc&zN_+IDW1?`>j!kYC->X!Vfk}{&Zln z*Hoo)Nn$!yt_e>=+<(t-MX_e8#OcM${S?=V0fpK@Mn(O|bNAfdADu|;~ev4`yS)dv0`%x%6_aS6m*XZP92=8Q<70NaJ zfv8V<$x45sP6Kv>H&<2P-k6TzD1mqe{fL|8$D#0jyr2&8JLc^a; z6*nol?gij-DE6gTfm?>H`z`)+r+UVsr(FI7#-(})k@K4;B?rPVf4E+!`cE5WXnnXW zHj?rm!qV^1m;m|Hp9n+~lx0sxa+DZ@9=x_T7mhcK;0BvV98Q=Xes zvPYQ_i^$5(0MFsEfpYJUTw7}4~g{o!u9C6QT{}I|1h&k8k z6Y%(tZT zKws~V2W$-eJA#GCW&c-0DQIFmC*#hGIAaiOM7COQ{P@@--+-K)dbWR@*qowhNIvgZ z(l8{ET@g^T=smFdO+|kQiP`7?-5&ubEed?!)Ma1-J#36rsB|OLlY*LQLp2NXbZPf= z>Y6LU$YAR%**R6l@I_}=YX5xUfQ~TWZC`_r=^V39sje@=NLVbIBF-40{EtsJip|m? zvMsFx)R`aaE(hB+=cpasa27I#3H-ny^o`UCbMDx#WuT_pmxYjcb5-Ay(xSeurxCIP zB`cSFB3&|yWQCEv-?_8LdV#v#AfBU&6NcUoz|>U~w2)JIlMbni?=-{~8N;JTgxxEC zOsGFD+7>pJoK;6CyjfMb+~tNKBFSp0Cg*I*RlL^&N3~LS`eRPiXmYlIry%o3t`iK` zyubWZmD29NOWI;Mo+CTEa9J7uet^J16iKltHJR!h!PfHKRxB;DSMng)lKBx~LL)Mz zS?EwirVoa|c0|K@;(402fJv{E=g4i`t%2?*TTYWB?a7qXbceh2984%Bt z*HQ_0tIg&zXo(_m{l!J^jtV!*&K^QocQ6`BgCp+ynx+fszKLc4lOIsJHMbcCjy%y= z?YFOvi$C;jEGX;q`vuX&@<0cFo&BRDz-;-==~5|6WkTzVg_@E4AeA;LNdpPqlSmKs=9jh z%DB@AQO*w@;k<0@$qiLW%}44u%{U3ynDpjH&Im2CRj9UzJPfJ+P6gf`<3xJZD&tf8 zx{E2GHBm5bf;Z?gma^bcAVJAi>tX8P58E_h`)cISb5s5Txi&Qqx47Tir~9>sswSB} zbw_g63{l+b`#p)^Qi~W;>hJ3KxkGBb^NQTF-pnv?@~re`xIf~Qp3wnng#Aod3H^OiFK6rH?*)~q)QaAHUAG`PD~PZ%LfNtrA~#;sv9_hw zZyI3f+OGMV;8tv;N6q7nf@P9sZO{omrS(=OyYgX<_42@txgUcWSjpPH1w6MppQgcR z!X=*5_hMBWveIsaymPwN~CijY0X*L6wbe!xDmxz0{#AHWJbz;@|aSLB(k z7dXbLHqK654qOS9pc$GZ;oIWX309$_=HxTNT`9Male?Pa8>xB8>tiT7i*b3xhqG){ z%E(ZGR;5(uz}YF`JA;ZtwCt?I^g?!=(t#}lIpXORFTE`bPfmX$GnIr(&1xg+w(g(Y zou10k6E+ZlEoyAaU^IrhA=Ze7 zKJPYd-8Bt_mGZ3ts=m#oI)>Oj9Njt+VcX`j?_gxxrQj!S{vk>lyp@_fLHjv_~5^QOqCZUjl;C-usv!7de z(v>w?z#BsSt0b--Dqy#7(4EwX_>Fdt(6Yd8RV0Slc8I52RVtHZ0Rv{98{Ak<#|(X7r1(n zgWs=xu~&7rYjtid23yo^QJ~Hs?nAX8l#R4R@>4TOFC~KV9i*s%&J_%r+xY z&U9fbBvfue!YhOZ?QUJjJT}qpHZ}2q1uNW=Vkh`(;uaGZLY+$MV!K!!bvO+DsS-Q> zo{npLCyiZ7x9^TMv9gmYn2IkGCjR`=q;}jo!wIU1O7HQ!1LwvjT8*w$nc+s)I0mWD zUQaFRp*PzST`caZR`61PEfKpefy;gMB=XDdr_tOub4PN0k4LcWlti2pW60#4W2A|?{<@k(oLdmDkF$aywq_FLpm4@MHwe#Hejni$mGvV z7>LUk^RS^kCUOodpG-MbW72=o2#d=q4Vde94=^I><&^661}9cT8oc|Ih|*f_c>-e& z=^yI}vvnR0)@N8f!fpn$HK;rr8+`C>E~J_^ym&?nt%3J6%fLAiOctN&T<6x1ej--4@J1j%k?UxQ-mLN!yN8HdCb%{~ z-L6MHnHS;ax*V_`5`IZ%_n@L0S$Ix|y^~bgWa+^3>uaW(ShjU(gzlt#aPLNLOsyE) zskKPA(c&b$W!kqW9=Gp7qIZaH`r6BfuY`PzZ;v&I5K#?{cV;LQlx1Cqz)hPIMChJXvJ;^WOg#gKgcNCpsbuo{h!+0Se zJb7m5m7_5h*S-|Afx=dFEfaS}(tUsu7KB(yHHR%^m?D7^IB1^EY98ZXo7yQJ*_{~v z>DQHLz%WTgw?kfFt_k5l!#xU5jBHi9z_^qy*%lgo#$C;t?;~11!Vp!s!E4Z7EW6zb z=29||CVG0~gqGrzceC2lxVdAs&Ro_N*PUV@duIgYxkatj*XQ2bxbO4qs`;x2qj6)W zAJ4!|@|EZZ&x+2yXBbf;QQZB>b9twhL@l`F7dX(gv70dVrqDGC^AZv}YZZJ?>{eHCB6Gz}+{%Z}&ht?G`k#yFW$3>VA`j!`+G4s$^rMl;|4&TM^5 zJ1zTx68S3faP&RJjvBEz3$+b|kCMK4_UlXf&ELykq^{&uA=F2L^$FTo#7Nj^;70u| z`S&dsx{B7UKF#k&f8{&u(bQKgtvA3+|555!0&79xy{)_v@UFKI7&`r%6_%Hc#>$Al zaNc8cdRBmyrZ)b1djh*o_NKR4^I*#`Yy2Rq=3I1AjfvKR@wmL7S3Fm&2E647@oRw0q+X0E-pVvP!1KBDQO=CKa<+}ht-Mz=kq!3`H4n+HpXJWpQf69l zJy+ypnAjU9HOcX7{xWmI>9}5JFP1ACx2O>7S(xqwt#^XO+KDr%OYQ29v)8msQ*+Y- zI}M^Lg*_D~T|#6~4>z+igw`0Wx~I|%F2D-7GK;^2(B8FB@jYAxJLF=d5l^spzOl37 z%)@oIj<78-@!Uw3E8nYPPfIq<6#=?y*HptXT~$7#QLGxeIS%h7vsHQKoZmXy^v0Ze zF|-UgklN(PR(c;p9UN4)f|Uh7ylPRaRS=`@qIKcj&I`EG{nIl1;I|6k6WN+TX(Huj zZCo@0SMMw&TDhGfQUY^A3sPn+ zy#zlE+=9=_@nuMn*DAJ{*9Y?cZwB~;NKrnuxj~f*UhT^ zmUI_3<}vg9Nk|Q*+1Sk{Y4V#xRF_wl?H9Jaiz-zzPG~|Sf(F$`yW^PCJ9TwR$15oA zio+|OmDsX5-?F)wQ~T>r({2s4sajuoy1LUrTu?82=QQ|U-1p{(AQWHad^sWF6Y0e_ zs)-8QoS-Sz`7;&xh#_L&#_wyiI1=fMzLmAM-Z{VtpWM2-7+ z4G$Fr@2P@-JeC0je9aa=cP!vsHA`c7Eq)8fGw>MwEeN?DgIxcHTxUW0^;dnGob(NW zlxn8|HvJCQJW;UVMYo_uDy^_MvtQq64Yx+RkrZ1i$}j&RvaH^K-&8oPaK6v?)WaFI z^}*hVy=zs$wUQ1u4({oTz(Z|%JDCSoc=9-@FuwwSg=f}L7KuEgw(~O>xxRxGMt21v zle5Uf_Eq?%5_}w=Yk+zcUc*ukvNS>*bCLB{X4lUd6= zy6J`Ul4pzNNt4^MHpqN5lFttL*bI3_5$<`$9GUzWZ-vKi@c8=250!}`DGpYYH+(iV zEZ{r51biw0KgU@%=Yw3|=w0WtMzWOQtsYC*?Uvx1oD5}u5?_3+Et`9wFEPquL9w!= za9U78tSHTvlz=1vz>*8h$A1f*{D|Vi#Pud8`1vH?J&)N;az5v9rZ8$5%#tPYz3}#k zPh$=1$`%11JO!%=ZcdS}Ya8pu&mAtCqu}SJ^_!U~OI5qmW6|TqNi{on@LN0ht#A0P zWc<+f4!VJ_{Gb?^_a!#4?=)cYGh?A?kfTu^HfsuZiMtWNmHp}b(d^K5_1)9nJLy%M z5tDfMUC*`yvNd|TJ@b|n7E21ol9HVm@^jPLctDP%=lH92u>2FS7c1l^dnBJ6Eqx?> zy-Q(jWl-Szmo@GECwBvojTEjo0ag?p{da{;2RMCwdlX<_ZSJ)AcGy}_6!3Gau^D#X z1l1U7&peiZ&-&er+g!m1C;L>baMxlOr>|HSTTqy`S0xFSt3>Hy?37_I9K z1zW|0usLJGq0RjXiOt69FvmO6w}d^`a_~uu;3rzIY}S+9WOUs5zxm<*c5%Qq3sLl$2wH#v9CQPK+M7xfhljI)PCyK)lB z-gH|>UsV$#_V>Gr6N|2~ot!IIF+!d17U1d%%Cw)^)=d{tPgU8h+4=^Ff~i|(VHYj*rJ&I(<97bVFx#}88raF_%;Wy{93^- zi;Jq=bNipMqmR$@arxb0dvqlBg2099BL~8|>;)6|C$F_NU72kkSVzBp%k)UDB%SSH zDx<4&_&MzQFEX#5C38(Tm#J*&Rrm=w#!Pf1qy*+1P31$W_^`Q=RwCftcN#&OznRHh zu1cQjBzzdk12Km9qUo^U?|IXm);;92Eb>Hru^RRk_bCyg=f^Xyb{n0u z;qKw^)6p4OA~$sM;b`Se^m%``Uwv*zYZVP=gUQmk0sRDnfrcc-=Y+(04ODbzVZ0Nq z;BD_|7#cJGlpXym$BKt0-X>N})(?3loSszE>S%;T82_BrL*YYo`Sb0OgQfcfO9s9K zpd*^(3BbipfvtBwNhb6W4>S;chLYr9ZDd#=5@wo}Scj@`DZ+U5N_rHsxQEkbwB6Q8 z?A42tdBi#Q{!5lzcTe;5^N%H_Y9howA0P9(gda7|q0GC;G9~>hIW7<1Beu)*Bt{Y{ z1?7AbGu`_5k`#4zNAZ)_>b`oG-)EsoR$rJds#;j~B@!QD zF4x3HHVwehg=MtOZdUs1A78ncEpof+IVaA%b8rHZp1cKOgG3bJpfcnxCMJ$Y=#?ko zr^<jV44oGCg>5Q&IjBJ#C61P^0g?n1` z>Vmz&PaC7<#1c*!!eP=Sp_fxv=YO5rWHIF33uIgcz|waFRlhf&C38YIKaEc4E&(rBBnLo8`UIVO_AQib0mdjvTHetn~3$tZnS@ zYw(x^xz7CYxOU5v$8mZ~IFHc;bM7ym7X%t_r$nPfy=;1gwe=L`Szwt%D884iO8wod zI4R7j}2gtH7N__qQ5cVcaPs=Da`F^+T3Vk2E`ICGv0mam5_^dIu={IVrKf&Ofi zg-H&Z|1}&K_H7Xg>*`K}Kr#J|+IdE3!Ozy!>`LyEgY}3UAs@t1Ge?IUyZ`bc8g1Rc zwbU5U?f3e+SPoXZH1hpjHKWyK{$i~ZnU`)Kh~M33RRR}|wh3}SI8yF4nrN(R99(#o z9mY+|))dD7)ut^Bk2zpk7~B5psn>YO#{?sL#m2+2ZB?<<+oA5+5vM3WyTWWZ2`TW3 zF!o3yaW5>bO93A4{rQPY59IHxG@>G!Dh5t>QE!sM+y{Lo-uw=k86t;ufdeU5T>dAp zylP52WT6w$v05NAcXU?tcYv7$EqQ`Wx$aQ#1%hteb)vw!`A4SAvqc~VheF<#`UASy z++%3(gL?t-ehDaX7%q#`v3eE aUz>ZpP7?|jNIq2H4?@pGm!R!<<9`6h!rZ3- literal 0 HcmV?d00001 diff --git a/docs/kyverno/README.md b/docs/kyverno/README.md new file mode 100644 index 0000000..068f86b --- /dev/null +++ b/docs/kyverno/README.md @@ -0,0 +1,112 @@ +## C2P for Kyverno + +### Continuous Compliance by C2P + +https://github.com/IBM/compliance-to-policy/assets/113283236/4b0b5357-4025-46c8-8d88-1f4c00538795 + +### Usage of C2P CLI +``` +$ c2pcli ocm -h +C2P CLI Kyverno plugin + +Usage: + c2pcli kyverno [command] + +Available Commands: + oscal2policy Compose deliverable Kyverno policies from OSCAL + result2oscal Generate OSCAL Assessment Results from Kyverno policies and the policy reports + tools Tools + +Flags: + -h, --help help for kyverno + +Use "c2pcli kyverno [command] --help" for more information about a command. +``` + +### Prerequisites + +1. Prepare Kyverno Policy Resources + - You can use [policy-resources for test](/pkg/testdata/kyverno/policy-resources) + - For bring your own policies, please see [Bring your own Kyverno Policy Resources](#bring-your-own-kyverno-policy-resources) + +#### Convert OSCAL to Kyverno Policy +``` +$ c2pcli kyverno oscal2policy -c ./pkg/testdata/kyverno/c2p-config.yaml -o /tmp/kyverno-policies +2023-10-31T07:23:56.291+0900 INFO kyverno/c2pcr kyverno/configparser.go:53 Component-definition is loaded from ./pkg/testdata/kyverno/component-definition.json + +$ tree /tmp/kyverno-policies +/tmp/kyverno-policies +└── allowed-base-images + ├── 02-setup-cm.yaml + └── allowed-base-images.yaml +``` + +#### Convert Policy Report to OSCAL Assessment Results +``` +$ c2pcli kyverno result2oscal -c ./pkg/testdata/kyverno/c2p-config.yaml -o /tmp/assessment-results + +$ tree /tmp/assessment-results +/tmp/assessment-results +└── assessment-results.json +``` + +#### Reformat in human-friendly format (markdown file) +``` +$ c2pcli kyverno tools oscal2posture -c ./pkg/testdata/kyverno/c2p-config.yaml --assessment-results /tmp/assessment-results/assessment-results.json -o /tmp/compliance-report.md +``` + +``` +$ head -n 15 /tmp/compliance-report.md +## Catalog + +## Component: Kubernetes +#### Result of control: cm-8.3_smt.a + +Rule ID: allowed-base-images +

Details + + - Subject UUID: 0b1adf1c-f6e2-46af-889e-39255e669655 + - Title: ApiVersion: v1, Kind: Pod, Namespace: argocd, Name: argocd-application-controller-0 + - Result: fail + - Reason: + ``` + validation failure: This container image's base is not in the approved list or is not specified. Only pre-approved base images may be used. Please contact the platform team for assistance. + ``` +``` + +### Bring your own Kyverno Policy Resources +- You can download Kyverno Policies (https://github.com/kyverno/policies) as Policy Resources and modify them + 1. Run `kyverno tools load-policy-resources` command + ``` + $ c2pcli kyverno tools load-policy-resources --src https://github.com/kyverno/policies --dest /tmp/policies + ``` + ``` + $ tree /tmp/policies + /tmp/policies + ├── add-apparmor-annotations + │ └── add-apparmor-annotations.yaml + ├── add-capabilities + │ └── add-capabilities.yaml + ├── add-castai-removal-disabled + │ └── add-castai-removal-disabled.yaml + ├── add-certificates-volume + │ └── add-certificates-volume.yaml + ├── add-default-resources + ... + ``` + - You can check result.json about what resources are downloaded. + ``` + $ cat /tmp/policies/result.json + + ``` + - There are some policies that depend on context. Please add the context resources manually. result.json contains list of the policies that have context field + ``` + $ jq -r .summary.resourcesHavingContext /tmp/policies/result.json + [ + "allowed-podpriorities", + "allowed-base-images", + "advanced-restrict-image-registries", + ... + "require-linkerd-server" + ] + ``` \ No newline at end of file diff --git a/docs/ocm/README.md b/docs/ocm/README.md index edfbe7a..a3259a6 100644 --- a/docs/ocm/README.md +++ b/docs/ocm/README.md @@ -1,6 +1,6 @@ ## C2P for OCM -### Usage +### Usage of C2P CLI ``` $ c2pcli ocm -h C2P CLI OCM plugin @@ -21,6 +21,9 @@ Use "c2pcli ocm [command] --help" for more information about a command. ### Prerequisites 1. Install [Policy Generator Plugin](https://github.com/open-cluster-management-io/policy-generator-plugin#as-a-kustomize-plugin) +1. Prepare OCM Policy Resources + - You can use [policy-resources for test](/pkg/testdata/ocm/policies) + - You can also use [Policy Collection](https://github.com/open-cluster-management-io/policy-collection). Please see [C2P Decomposer](#c2p-decomposer) ### Manual end-to-end use case @@ -150,7 +153,10 @@ Compose OCM Policy from policy resources from compliance information (for exampl └── policy-sets.yaml ``` -### Setup pipeline +### GitOps automation use case + +https://github.com/IBM/compliance-to-policy/assets/113283236/da3518d0-53de-4bd6-8703-04ce94e9dfba + 1. Create two repositories (one is configuration repository that's used for pipeline from OSCAL to Policy and another is evidence repository that's used for pipeline from OCM statuses to Compliance result) - For example, c2p-for-ocm-pipeline01-config and c2p-for-ocm-pipeline01-evidence 1. Create Github Personal Access Token having following permissions From c3c2bb6f462a055438a9242dfb33364b8320aacd Mon Sep 17 00:00:00 2001 From: Takumi Yanagawa Date: Wed, 6 Dec 2023 15:51:11 +0900 Subject: [PATCH 13/13] Add images for example use case Signed-off-by: Takumi Yanagawa --- docs/ocm/README.md | 162 ++++++++++-------- .../images/manual-end-to-end-use-case.drawio | 76 ++++++++ .../ocm/images/manual-end-to-end-use-case.png | Bin 0 -> 47252 bytes 3 files changed, 169 insertions(+), 69 deletions(-) create mode 100644 docs/ocm/images/manual-end-to-end-use-case.drawio create mode 100644 docs/ocm/images/manual-end-to-end-use-case.png diff --git a/docs/ocm/README.md b/docs/ocm/README.md index a3259a6..e30501a 100644 --- a/docs/ocm/README.md +++ b/docs/ocm/README.md @@ -27,6 +27,19 @@ Use "c2pcli ocm [command] --help" for more information about a command. ### Manual end-to-end use case +#### Outline +1. Create OSCAL Component Definition + - Use example one. In real cases, a user writes OSCAL by Authoring tool like [Trestle](https://ibm.github.io/compliance-trestle/)) +1. Run oscal2policy to generate OCM Policies from OSCAL +1. Deploy generated OCM Policies to OCM Hub +1. Get OCM Policies from OCM Hub +1. Run result2oscal to generate OSCAL Assessment Results from the OCM Policy Results +1. Prettify OSCAL Assessment Results + - Use C2P tools. In real cases, it's responsible of GRC tools. + +![manual-end-to-end-use-case.png](/docs/ocm/images/manual-end-to-end-use-case.png) + +#### Steps 1. Prerequisites 1. OCM is configured to manage two k8s clusters (cluster1 and cluster2) and installed Policy Governance Framework. 1. Namespace `c2p` is created in OCM Hub @@ -48,12 +61,12 @@ Use "c2pcli ocm [command] --help" for more information about a command. └── 2 ManagedClusters selected └── [cluster1 cluster2] ``` -1. Run oscal2policy +1. Run oscal2policy to generate OCM Policies from OSCAL ``` c2pcli ocm oscal2policy -c ./docs/ocm/c2p-config.yaml -o /tmp/ocm-policies ``` - The generated ocm-policies directory looks like [./final-outputs/ocm-policies](./final-outputs/ocm-policies) -1. Deploy generated OCM Policies to OCM Hub +1. Deploy the generated OCM Policies to OCM Hub ``` kubectl create -f /tmp/ocm-policies ``` @@ -76,12 +89,12 @@ Use "c2pcli ocm [command] --help" for more information about a command. ``` 1. Get OCM Policy Results (Policy, PolicySet, PlacementDecision) from OCM Hub ``` - mkdir /tmp/results + mkdir -p /tmp/results kubectl get policies.policy.open-cluster-management.io -A -o yaml > /tmp/results/policies.policy.open-cluster-management.io.yaml kubectl get policysets.policy.open-cluster-management.io -A -o yaml > /tmp/results/policysets.policy.open-cluster-management.io.yaml kubectl get placementdecisions.cluster.open-cluster-management.io -A -o yaml > /tmp/results/placementdecisions.cluster.open-cluster-management.io.yaml ``` -1. Run result2oscal +1. Run result2oscal to generate OSCAL Assessment Results from the OCM Policy Results ``` c2pcli ocm result2oscal -c ./docs/ocm/c2p-config.yaml --results /tmp/results -o /tmp/assessment-results.json ``` @@ -91,71 +104,15 @@ Use "c2pcli ocm [command] --help" for more information about a command. ``` - You can view the compliance posture like [./final-outputs/compliance-posture.md](./final-outputs/compliance-posture.md) -### C2P Decomposer -Decompose OCM poicy collection to kubernetes resources composing each OCM policy (we call it policy resource). +### GitOps automation use case -1. Clone [Policy Collection](https://github.com/open-cluster-management-io/policy-collection) - ``` - git clone --depth 1 https://github.com/open-cluster-management-io/policy-collection.git /tmp/policy-collection - ``` -1. Run C2P Decomposer - ``` - go run ./cmd/decompose/decompose.go --policy-collection-dir=/tmp/policy-collection --out=/tmp/c2p-output - ``` -1. Decomposed policy resources are ouput in `/tmp/c2p-output/decomposed/resources` - ``` - $ tree -L 1 /tmp/c2p-output/decomposed - /tmp/c2p-output/decomposed - ├── _sources - └── resources - ``` - Individual decomposed resource contains k8s manifests and configuration files (policy-generator.yaml and kustomization.yaml) for PolicyGenerator. - ``` - $ tree -L 3 /tmp/c2p-output/decomposed/resources - /tmp/c2p-output/decomposed/resources - ├── add-chrony - │   ├── add-chrony-worker - │   │   └── MachineConfig.50-worker-chrony.0.yaml - │   ├── kustomization.yaml - │   └── policy-generator.yaml - ├── add-tvk-license - │   ├── add-tvk-license - │   │   └── License.triliovault-license.0.yaml - │   ├── kustomization.yaml - ``` -### C2P Composer -Compose OCM Policy from policy resources from compliance information (for example, [compliance.yaml](cmd/compose/compliance.yaml)) +#### Outline -1. Run C2P Composer - ``` - go run cmd/compose-by-c2pcr/main.go --c2pcr ./cmd/compose-by-c2pcr/c2pcr.yaml --out /tmp/c2p-output - ``` -1. Composed OCM policies are output in `/tmp/c2p-output` - ``` - $ tree /tmp/c2p-output - /tmp/c2p-output - ├── add-chrony - │ ├── add-chrony-worker - │ │ └── MachineConfig.50-worker-chrony.0.yaml - │ ├── kustomization.yaml - │ └── policy-generator.yaml - ├── install-odf-lvm-operator - │ ├── kustomization.yaml - │ ├── odf-lvmcluster - │ │ └── LVMCluster.odf-lvmcluster.0.yaml - │ ├── policy-generator.yaml - │ └── policy-odf-lvm-operator - │ ├── Namespace.openshift-storage.0.yaml - │ ├── OperatorGroup.openshift-storage-operatorgroup.0.yaml - │ └── Subscription.lvm-operator.0.yaml - ├── kustomization.yaml - ├── policy-generator.yaml - └── policy-sets.yaml - ``` +https://github.com/IBM/compliance-to-policy/assets/113283236/da3518d0-53de-4bd6-8703-04ce94e9dfba -### GitOps automation use case +#### Steps -https://github.com/IBM/compliance-to-policy/assets/113283236/da3518d0-53de-4bd6-8703-04ce94e9dfba +Setup Github Repos 1. Create two repositories (one is configuration repository that's used for pipeline from OSCAL to Policy and another is evidence repository that's used for pipeline from OCM statuses to Compliance result) - For example, c2p-for-ocm-pipeline01-config and c2p-for-ocm-pipeline01-evidence @@ -183,17 +140,20 @@ https://github.com/IBM/compliance-to-policy/assets/113283236/da3518d0-53de-4bd6- - Name: PAT - Secret: Created Github Personal Access Token -### Run oscal-to-pocliy +Run oscal-to-pocliy + 1. Go to the configuration repository 1. Go to `Actions` tab 1. Run `OSCAL to Policy` 1. This action generates manifests from OSCAL and then generate a PR of changes for a directory `ocm-policy-manifests` containing the generated manifests. 1. Merge the PR -### Integrate with GitOps +Integrate with GitOps + 1. Sync `ocm-policy-manifests` directory with your OCM Hub by OCM GitOps (OCM Channel and Subscription addon) -### Deploy collector to your OCM Hub +Deploy collector to your OCM Hub + 1. Apply RBAC for collector ``` kubectl apply -f https://raw.githubusercontent.com/yana1205/compliance-to-policy/redesign.0622/scripts/collect/rbac.yaml @@ -211,13 +171,77 @@ https://github.com/IBM/compliance-to-policy/assets/113283236/da3518d0-53de-4bd6- kubectl apply -f https://raw.githubusercontent.com/IBM/compliance-to-policy/main/scripts/collect/cronjob.yaml ``` -### Cleanup +Cleanup + ``` kubectl delete -f https://raw.githubusercontent.com/IBM/compliance-to-policy/main/scripts/collect/cronjob.yaml kubectl -n c2p delete secret collect-ocm-status-secret kubectl delete -f https://raw.githubusercontent.com/IBM/compliance-to-policy/main/scripts/collect/rbac.yaml ``` + +### C2P Decomposer +Decompose OCM poicy collection to kubernetes resources composing each OCM policy (we call it policy resource). + +1. Clone [Policy Collection](https://github.com/open-cluster-management-io/policy-collection) + ``` + git clone --depth 1 https://github.com/open-cluster-management-io/policy-collection.git /tmp/policy-collection + ``` +1. Run C2P Decomposer + ``` + go run ./cmd/decompose/decompose.go --policy-collection-dir=/tmp/policy-collection --out=/tmp/c2p-output + ``` +1. Decomposed policy resources are ouput in `/tmp/c2p-output/decomposed/resources` + ``` + $ tree -L 1 /tmp/c2p-output/decomposed + /tmp/c2p-output/decomposed + ├── _sources + └── resources + ``` + Individual decomposed resource contains k8s manifests and configuration files (policy-generator.yaml and kustomization.yaml) for PolicyGenerator. + ``` + $ tree -L 3 /tmp/c2p-output/decomposed/resources + /tmp/c2p-output/decomposed/resources + ├── add-chrony + │   ├── add-chrony-worker + │   │   └── MachineConfig.50-worker-chrony.0.yaml + │   ├── kustomization.yaml + │   └── policy-generator.yaml + ├── add-tvk-license + │   ├── add-tvk-license + │   │   └── License.triliovault-license.0.yaml + │   ├── kustomization.yaml + ``` +### C2P Composer +Compose OCM Policy from policy resources from compliance information (for example, [compliance.yaml](cmd/compose/compliance.yaml)) + +1. Run C2P Composer + ``` + go run cmd/compose-by-c2pcr/main.go --c2pcr ./cmd/compose-by-c2pcr/c2pcr.yaml --out /tmp/c2p-output + ``` +1. Composed OCM policies are output in `/tmp/c2p-output` + ``` + $ tree /tmp/c2p-output + /tmp/c2p-output + ├── add-chrony + │ ├── add-chrony-worker + │ │ └── MachineConfig.50-worker-chrony.0.yaml + │ ├── kustomization.yaml + │ └── policy-generator.yaml + ├── install-odf-lvm-operator + │ ├── kustomization.yaml + │ ├── odf-lvmcluster + │ │ └── LVMCluster.odf-lvmcluster.0.yaml + │ ├── policy-generator.yaml + │ └── policy-odf-lvm-operator + │ ├── Namespace.openshift-storage.0.yaml + │ ├── OperatorGroup.openshift-storage-operatorgroup.0.yaml + │ └── Subscription.lvm-operator.0.yaml + ├── kustomization.yaml + ├── policy-generator.yaml + └── policy-sets.yaml + ``` + ## C2P as controller (deprecated) 1. Build image ``` diff --git a/docs/ocm/images/manual-end-to-end-use-case.drawio b/docs/ocm/images/manual-end-to-end-use-case.drawio new file mode 100644 index 0000000..19a1dcf --- /dev/null +++ b/docs/ocm/images/manual-end-to-end-use-case.drawio @@ -0,0 +1,76 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/docs/ocm/images/manual-end-to-end-use-case.png b/docs/ocm/images/manual-end-to-end-use-case.png new file mode 100644 index 0000000000000000000000000000000000000000..8b968d27852191182160f8b4a4de697000f0e4c2 GIT binary patch literal 47252 zcmd?Q1z1(vwm7bUN+@hVK9!wpJnxZjcg1Q9(euQBv9 zbb~1T=OWJWoOADezyE#rzW2WGp6@%j*PL^WIp*jw=2#)>s&eOW$#GAdIB`xvUKW1h z1P1!ViIcamPlJ)Ju*q`p&q+tPob-vjF3PVbPB0iaUDI~5bF;9rH9x_`Cv*6ViSHWt zZDwU`i8Quj;^nq7W8#x#;^lQ#wm>=GGe2CTZft4J z!2^vR0I_qELmJ<`qk=Fqw*~9W+zwaq@CtGtzG;R!91-FcJ{+(_9&dL5g_j!|(6Dkp zg3ojGo~5&unYrT;w8J-@5C~f*tGj<3G)36ko0~fQVWBY+iE#bnG7E(5(IJm^y$jCq zhnJuM4O3&=zm95InK|7#TFWCSa)=DHT;ANu^3KuL!n{I<6L!YOi;qs?c*ocb;d=P~ z!O#KWkO%~L^V$JVWXx?L;vLiF@V)DQXZAPzk>>VCd;b?N@Es!NVr=VtbhyI-M<>+r zY0d4;u0liuSen`zJ33mKGVw{@ak8@o13ciT1;XCxh({3TrNP!nls1^;<`fYTIv&tD z7!c+WI3AFN#DV*_CrA{2dr~(?TG^R9nIn$}-K?A-h#cIU+(1^q9$?@P5W(~B0HKH9 z;DLufgF8H;x!GU1{5#o>DCvlBMw%XT{fK8y#z;%^BkBr3ppJ#z9071fq5!vCf0qh@ zqqpw-A`i!7NON0bCo7j@_=jj29|@=BZ{U90K^xcq&ZWUg`7_<%L8z{r5He;|>-!r96oY!Q$+ zG4b+QSeOf%LPG55ghbew|1x7HBx1r1ZE(21i#gKC{D|0pL$wZu{>uEL7x)371N(SH zM4n@-_lt1w99y(srGxiaJdT<8t0WwA@V}y};L!u5T}V>x5l-Nr|B3}B#-=uw2TW6QcCxjy zhu(yYg_$wZMh!5|%IQEsIk_Qw@MjC+cxdqttjWKC6FkQR{YRWQUh^v_M2c7OS^BlRMUwiT$VJwS(wN1d!<< zg42O~EhjGz|M9@@@f8%{{T^UJPyc*`^?xRs;`@`ohE9IqzmKi||7$G8f2==85(2`q zKLYyK#ZEjxogj_+w}}G}Wcz;=2W}9I9uEBb#oU3dfE?aUZ#(W6}E8NyJei{fj`T{lU-u$^QN?1a7C{J*8t!aO3JJiOe${deR}p@V}1 z@(J;A3jLEAv;crC_)7+Tq=^3j^1n{$0ek=K1`v**T*Z6$D7yWV)`O%LO8tJxnE#jw z+k<=%%>SA;9}OAXT3OlyVwnP;099wCp%mE)Y<2Z$!p_Rf3@RM`&HV6>N&KI)zN0hz zw{mXYBT5{Rormwp_5NZMj??g8UB>aUV|)D1WZXP|O}UW=NgVG1FAh)lOX&L_!vy|g zNBTd(gukZSM=JiGKzU%<4#n(P{EwgiCn*2d3>#RT!)lY`U1R${=5<{02(R+{x*MDI)Y}o?*iWj zjYEpYab&ol2}fXfq0IqyM`#?^!kBmkplgs{Z!H9Xr-DWgO7h^x;gg-)VObtjU_oIX z3vj9NK#n8t^N>jsNajj^6x5Rv>7gfPN%gM;IRr{!#vp*8N3L z57iCSh7UFFu)_PF<9YZ%czh5D{V&+RV^jM}N^o?y_MhN+1dgMs{|(9m6$cjZ*CNPK zdiI||d2n{<_(zoIKaOR8@%aKrq3ORm^_D4MaPoO-{ zvEcptWghs_-@7pmE?s|dy1+s6fq3=$aktFz^KYFr*AonsPMn}Up&)xz)6H-`?Nl-4 zwNHU~7+Bbgd35C-1z(7UamXqCP7{#o6EQB2Qx6+pV!8f|k@7p!8dP=aXZNSU(YmG4 z!I8ll57+FiT4z<&&Bb-6{%V1tHC5-E8*a>m7}8SM*eB^|vHb7BU>MSmGO@$@-+vG& zhaP^NVTR|W{Q3+g`7fM|UOi1A)qwZ=`_PhT;-j#mz7CSgjXy637;jeoE2oK`; z7I7>D`#MykF9HPauwoQF9K^LK4NLAcvsijK=+imx&9_^Y`OxYv9gF}Y6zwge^l*^I zV$(NSJZV=lJtyiJgveRn>(NN;H)|G~Pm?glDV!3~Ses^o># zT`%M;Dc{huOkL}{bWwI#oBTye$V(F!X=3yozL{GTp=-wmIu<)O&E-V_9m&I`YUEKY zd{w<2q(Vg~ztDv2>JP5>nwQ>TuM6>2yTMi$EjCq7H1k-vz!#TJb=sQAomTAU#8RYP zPD*}dY(e&L(EIAU{zi+<+~k#2kAUO_&hr5fZ=S-Qld)yI>DW_Nm(9}O%7)#c#7I}B zw6&Naea;h~?3K7{ug6za;b3iTMi-@n#oUIzp84gY#ip+BvljGfcDi8EO+F72xH2}j zuQIJV7rd*9NOZAflFlchUW?a(Kt3cQr*OVdbG${)j!%ebs?w9adSQ0_&tbs?zABD6Z(`59^s%mf zbv?jXUZ*C)qTi-#I8gsbL?v2UAVjj?Lch} zwC~SS?xH6h^Xs3_J~6cRKT+jbn>-g9^JYGd{Xl0K>1pA46f)RO`dHK4MTwoZfvGHr z#NpB}RD^^?YoqN3!qkpS96^sXP!>h>kECMqa~N*V7r2Kf2V|vo4!qAdvUh$G@y%&F z)3dcIu;L8q@lx`{Q{YZqhIo?c!ml$Dx4g; z59=SWs0PE(Qha)Bu3?+DrmABZXBOxhsvZs+`clgvGieBBsz+;4L~KFIJ1X(BIZ^M4 z>r{S-3nTa9M8pT=PZN!`bO`bmnRm{=qP!}~L>FC5R2?HPB6}CbH;KNdPRcc_oGP-Z z$GXK-nU1g^o57~nYq-Dvo<5Uny{0rdoSVoDk{3rs zM;{<b-InQ>G@2?j}ww7ZV9~!B5Tju_448KU_>v;bpo3*`v&q4uD9Pgf0cgp zg7A&wJo~*UPd6j`esy_{Q7f$c&BcmtGIVuYqYNU3q1?Y9HI-ouwh-WGC)2&5V_?8Eg5ng^R|Q0K+SZW*6Pt zbaa++9@i3>MBvQ5Wj}WdwyU_JDAShBTeO6{ziRRZFM_OkEXoGE(#O~MsUJ6kv<`N~ z%0vTixp``+~wOE-d`ZVbQt5B+Plqg(dotceEux4VoWYE#;ib$lPznV8*3jiL|D4S&Ki&F zzG%MRxyc%fJ^W$G!=Mgw;*Xet59r6b?hIU!R2~M7K$T3P9(Gv%_C!uH>>&ovxyg5Q zL2f-bd~}=-(LQ2x-cP9OFFpTcph`Q==r0|GV~Nx9Wmr*OgxX!&%(I@+jI>Y@o{<<8 z$45zfNr+&lhy+*a(Jx)=hxWR4G-sW*kqn8RtzNk%|e} z|C<=upP*#}?r1>0XM=rGlP3h4e+Rpyp+Nr=)1tICIW5s6dL>g(f>OS$3Zjk_b}=8oY2j=^B^d@4_DPx+ zgRrxK6fe{{BX~Un{9IGE%`frqB-s*?;3(`Eb`ToB6JDA1f3A)ZMLq#@ zS9|Pb>p>3phD*H*@sQ*X?&s_gXGAL)GxWUJV|67OXJFJN+A_p3w30_@>sa+_)GCIoFMe#bM;lI zB9o5znXn#pO|XzI1V)GdnT2Ilh}ydC%twNawn6Fi3(nQ^0XQMWb%JtJUVcvzp=YRh zsUE1^zAV?)5N`b3*W2vkWI$GRK^#LioSZ04>sD!RmNDs8Z1Q5)oJ2XWCikd78U$~`Mk0K0PqOPc-?o=&p?9*)khw$ow&c0BQ1;> zdxDVpMr`Lz`BFy8$5HB&CoL0|{2Nuj#mDw2T$KGR6HHeeC!6)SeK|ET(Hq;!S9w>( zopvQm&A>tM=gLMo-7`&Ex~u17)H2q?qpCyjtNFKuoiivE!dD8EO?mK8NSYYrSb_oN zpl%vB3`_Zae?Bg-h~)4tVdJM{d5PaA{m<^qF@qcuzYj+!*9b8*dkmUNei zCK=;URH^@#sCD5JCN$|_6zh3uon=zu#fiup52Gqz$nXLySf+s6#NgRysoUI1QE?ij z(NT#76L?(b^a;2~Gd2AZ$Id0kW7oB_##;x+vQ!81)WE*W2otQ#Wx^iThr;?V;Bu*H z>Rg?<`{^07KmS;PF(F%b;&CNpSV%CU>;$LZwyTg31+yAX)PJAclQro`(Nt1rfw}{^=kA z5W&J#KqZxvW6B%9!{Z`({gno@`Qwd4PY)$sln285nHI**HpX2>f0dpCr&wWSy5y>S z%~6IYU$F?uj=z*B16V|0I)h_pECi=X8S9FA;Q>wDgDqpf)5!Cc@Mm_JcM~X6@?3q zqsjdO3Pm7X4{!l?QWA??p)ItR-M%j8X19*ay-u|OtZN^$u&cdvK2%PrxHok=>fkMo z3u?xIS6~-0cGJW)e_Y~CK{->1eBIk!s;flM*C0OUZn{mP5#oevf=`l1@M+O_>z+(i zxQa!xSl37E!b0NarePQk^e5OPAN5~yxHRTlBC!;hP4NwfkZtLW5KYz(0I4ip+{4c= z7!^B;M~`+Ozm+AXTBTq^cLEqthtV_O&*xWc#es4A+mn%->z~v@lY|1U#d1l5Ws?u$ zTC9YuIDqs_)|>%gK z93%RY7;L6SS9LBzTT?2lde|VkbCMoCSgaKE{!&OBKrQ1dwBHMPRH{pC-z&n|;A^J< zUO$+E0j6co-dA2YfVeh&fWOBf{%Oi>qPjN#n}mIE=+Ptt3$bbvultRBMrwa<>dp1N zO5rGeFD=-ssqysNc-2yEk?Sa`MdHV@Ouu)8$aKLeQtda-k}V!;&g_4m%NI0h#HJ8I zW~p$$#S&bqUi<91)@iAsChq)lZGUeUvAfnSX)qMR{P0~fjn9w9HBZrqPkG``&qG+L zP0bCJ$)mhh@_O&kqf4aWKl#ah56}6*)xdc&G%oS&IeL#qLb-vBej|jD_l|i^Us0!E zN}Bt(7p0RCqRgA??Ob&OZ+tOd`Rwn7v}}#I8qM|RXLMef%MEF13A<=oHD4Hd?jkSa z%Chz4n3R3oZ*So$}13mN_l|a z`dmN2?`J_CS{~phtKlU;bcA2DtNw;5!0*i>fLZXW^z+M8bm^AqDBHY>>B2-K??LbH zU$cJ7h0W}boLn!Ak#(F z1mRPC>)M)>imP&6TKrybx@1JOJW#j(QR!NU2p4JC!Vur+^BYfy@_*FhaTQB=eK!jP zBA~TD+0~XzkJfoDYwjK#rxlo}Ye{y9r&!gNDO;y(Tj--Tpg=<(mALE>H5&;wzGdW* zTg9JLQzY-3y1g^ou}cvo$)j4ELbZ41|$k@kV5OKM5CXquHN~l$;-S?C$iab{%ons+xGfPLv;Lz$Y|( zw}G_9?S-~QvbkMEtCkic zq?-vurlJ}XqP9AP#)hdqm#?~}mLtUa-x+!=m?s*#zhIaa8uN6V*cn39)r{P2IJZdI zwNW@^Uo{x7W%zZ^6Uf3VoBq6znf$U*_s!)7f+|xZ&y|2q?uN6kKJ!R$Vb{2C6w1+f z^`JTkB(`sh?#>rIp+nP8JE(Hs;Q(s90JI3Gv8q~I%1#A6oO*`qYL?hrd!L^hiJg-B zKQ`ZRnTnR9 zy!y;XY%%SMGjcNKT?nPifU(PTvLz`Mkdd)cbfVE{Ksg|wI7ju@)O8^4L%{MZb+K@! zt(-o4;Y;<>nCDu!itxBU$M>$6*~9EF(j+HS?f@K%E|NpU6tXh7$cDIO!ucDf4M7C1 zugBi02#uHx*%qnj%()|+W>+M>+{2{27<6I`=tF6ru1)+x&}r8(uQI#Jug~&0dUb=1 z^KXf@Hs9YHw9FXH$*;9$&n@tqTl76cT>y}hyaXT3CB9R#89pu+y?P)s z&TV}{w#c5me5R}@&%%rvF1?(NLbFa$2NvSbufi@Q&$F(^0z z;V-?ZWzdT%vrINmXyn96d@B?2rKH8f@D+?K@=UrlyQTr%PMr3Jn&i)(fFf89wPK$* z+E5GCkyFF)%_kk`CQp7-Fwjk@8(wB7efi^SABHD|##xSc<>;S@Ud8I*EdPQ*hV)Y> zg{irUR4i7`t(p^t3~tgfxP9IN)FzGB^)%9yrMntCX{^xbwK>?rS-Wj=zp)OOE_5KL zdn(z3CNiU8Di$ou*G;638Ij_f+M+vCu_H4}b^D{wQju+*G_RvpEmEX%1d&)Q58~u* zXJL^XIsp4{DP8!eayQA5nZII)q=D~ArXj}tIpi_ zPSmouMpr>x)NO@3?LYz-FXg+@O{YYWzRZi_egLzFt9tJ)2t8?}=faS1h>Z#Pq#~5I z_MTX+7HIZ#6~5Qm^s#%u!)1wXrXpiQ zP;S~?)XA#mnEg6@nND3{Tk*MT2SoqNBfejq3E9-%;C8Qt@pa7xFJ8*YHBl4a&{UAk z@K_Ylvw9k@PciXf@L4*QP@=9i+m=Cv*^Op;{In<%A~E1cVp%4Be%~n4P!)MPyRGRw zXcEdXykeQ*C0I8(lb~n+RbIlKDQ$l)zwYyC3fnJTYm=)Yx8MYrRWJKd zP~=}3XE)9W;F-+C_nyqOAE_J!o?|%EJ$BXQ#~>q@O7Y~qZ&xltF~HKdCOLdd)c6RKj)3LWx1S`s70H&HM|9~f zu#$R9qctO1`VBEkoXIR`&lbGvJajuH+6pb#_s=6UrRmY(g0l9W(W_w>9!m?zwy|R= zck+cw>4~BD9-HWekg#>nFKEMgqF0HQ&r%3>U}NIsJdJwST1Uumy_nT8X-XwXn>b}L zM10iNq#L+0T?YG+Sd^yx=kT?>s>Q-i!J*uMK>x-sgj-(7sMSE=4V-GJ%wagm3NK}- zU9Q)&wLS_S6Y242Yai*VW>x3p4W);tbL4a?m_cpp98Q3qDBgnNf`U6C zs}XWv-RRY%;0mC3by(4>aW1BoDuSyQB|OVR$&Bv4J(Wi08Kc0g(2JSAur=z@&H7s2 z$ln{5{;|ZSUlRl!Ev9Pnt@B0Q_IMn{Q7U|${4cr|?u1XVbtg1kYb!F3EdC7Q{%eX0 zg%MJ(zgY^r7cDZ5p+^f8*ke|L`u&Mn@H?MVfQ)}Qd)#JhHAobw1kc)szr;z>9?eDuTR z(UW;XbFt=UxUYsP0cHK;u2XFJ-CpW*H$cW1{`|X*FosUXWeR-tG!htFKHnDsa@DNr z>ryXMo*f-p7$JJ7Pb9TOo#G%P2!CBK_ukq1aq*QKe-s@N;$`?67{?Gv>2z z=d-tyz3csBrKJo6<dXF6+jjBFymQ_^V+v6@^l!d-%qfc)LMC2n=Y*zSK zg%Ub~XWG8zgXBs4mX0+W+%Q=nuY3YmbfZUOB(F1o7dX=)iQRcqfHP8o$a4pss0YH# z1rU{6_qM>5ILyiP@A|$fsK@1qNONeu=mG+%>AFdjwsp4EcgdMlM|}^Mc#G_B$ila$ zDF*HnNN5)i+7@+Mj8wV0_JjCvEq*R*RVJ{F6gA`Eato6!F3x@WX#VAHD8+$KU?8qNs~xD44P%Hem5WbJ}Dt;?tE zqau67!dJPl3m;5Yrx2xiiTtO1LDV^z?zO2?g-+13&3RR79ZLk{WXQ>ZFdZ2F%nu#P zSz>7;%Zt=r>mOV|axkNI&z}pVC-xhHj9;TvrprM__2SwL>?;WC2YR)P()PVU$Werv zN$bBJNo|*3v#Go15j=-4Iv=&4;t+Y|+w&h|AcTpuEBYFSdg_v8xLiJh~J=*Fd`v)Mgr)dQrh0ZF7Aa*V&l#FkCBI97i0{o z#b1qid&#M_fne9wbZ{BaqUh(=m}F#}(do%hX##g_%kp*CegoG*<`mnQV8QgWCL5PR ztQZ6f1{yWLX=h@%nar{*Ft&VTNq?xAMdWqqtB|dpHSnC)H#+w~=rve&BPNg@jb1pt zqYo^vK?86u9rm?5(~rm5a;FPlhU&Y2eOlT=?NQzhbD~*2`ML%qoJ4257b|AM;ti+1 z+$Sh4>XsPt()PNvdfW@Z$%yvc0!(GRl7ug|EVY%p4rgN@awcqJ@vbAg{%5Dtg39Gbm+6Dh6*}i z%}qxNdj(`J#HsiJ^$nRub>5s<{!bO;MR>ef(wyKqn<@5{FIHk4es1&+QMnEq3ynC% zimx;h+Y>c~O6yOhI(7|OhaF^U{>!D@I3E*)CG$8ubt-ljs|+Y<9fHFGx*E?QJH<4y zc_t{$X5VK5RnH!bqLUdO%hl!<9KCQ$>Sc7UT0*bBM#l`~ImM$_S6%LB8KThfd2}IZ z=V7eOrY#Z9)K1e^r*(tbC#aM>r;`QOI{3&I8X{ZxzC2AdL@tQ29mKni4`xO|xNM(- zs6~Z(%lAxO4EYoYi?+$DV0Kon*osS}N9Wgmf5}nQ!E3KP?U9baX8ZvRuyYp=O<;pq zx8pra`wRQ&vTZ2pRedw`Zuw+HyAg4JL(%=2M5C);m@sE3xrAW*URxvmHS4*x-@kE4 zdwQ~9o<4iGI~|C=FpZ_r=(kB-GhnOKP`XMMIR-sh!~6G=XSKW5R*$pBy~|;BN_di) z+);`&1lX(YuR#f}a@R~ON@){FW)k-r36^>kz`rcZ`ez`(Q ztAGOTWL^l}S@9nMl^-)$-o7<65qDp|YgVm(AqB@J@S?>#nr~xubqxIqg}?$_x$G7q z+K22OusyrG zMnQMkSX=Hj--@5idBRi{v20rZs5ZENSsZhE9A8F$`NV^W=c}IeHZ-`7;!|;`G)I>a z=l+K=$W$#cJXpG;aMs+uzaqS;xr+S3F`s1 zk}*;PryIM#fR0dzDh0{QZ;P|dcrY`IVK%;5F(s&3YQ$eGZ0GE<8Le_fXl=f<>`r$X z^V+JA0L%D@`#@5Qe)n~GykVqK?c*ilvxW(5*{L6ak36F#5_ksl=c6$w4SC0X)6$dj zNe1Irp|kht=&%h$&J=dbhD+uCY``QC;Ud9)y<=8CdC_P7b;~LjrpIDMcIf@}nUANh zYEjGPl6nGnYaamWMuvCC_!Q`8yDps|U=~{uQ!f{6^SH@CkM4cc=MCh&jHYy9ut*+d z<;3PSt7SIH)sZ>4EuEt_2J{ebFPk%R zut}ohG=^Um`QWd4z71*Od#9Cv0;$dL%aX{Y8B~+CA6fNIoci^`pJ zCa0C&h(*#ouBYIf>Q|ceLI-`5(f?Ray{DaQOFNbM#o2-gpM_toO{Ts>By6djgVbG` z_Wfl8-jExSq&Ny9N?yvJ4c|>|5eNBTOU2;4&Lj|9G0vr4@ld+_+CPQ0LHn9oTk@l% z=hAeHrX{1kCBtxlvtiVvE_qQ%k0<8U z<)_J`JOyP;qgOw=c&v2_jr@23Gx24}PW5*bW{kf}u)BnrntFeoT41GaMkCYtjJFwoPJG4JigsWecdIv^(o%~x)U~hKxHWU{s>I&5X^;## zTvhvpnje$cr&!1DS839t#aw^lzV<2oVpcym)zs3z#*4`u|3Dt~H28%VIo4xlbh>_w z8^-vCpJj>=(qEmljz8fv?DLn`w0*AzBI8?oTIP2A$<^BMLWB%YF0F8!6~z(%ZkzOm z89zOa7*7pbA#>aPwcGHSbL3OhSeMTc*(9Df#E5PtrZx<1;dt@m5kf6NoS0E5*X;vg z^#*KRy&mVI2YvlAN&P)(oLvU|^zW;|@~F>Me6=p1#yxm8{92pR(7Ei8EyW<7o~K>( z9WkB$u<9na+?uj9{nT)w(ejBDCPs9W5>27+R#GaRe+BAQNguL{Vxmt6{i<2RP*p_j zomI;N)^UDptTgoulWvS#rXUFJ)XWl_7izT%G;m`xewr-o^iHI^m)rl;YD7`Q%m?#C zgXvV$U#P-_jxw$;^sdKAd`jzwce&u6=&e~hRg6=hlt9Sv)nEOr_w&p$VKJ_bge}?L zSY)t6Qdm7I9c!|QR=Gim4Zf)0kXf6HTfjIgWB9}Rm^L$RcQieX8=(7DJ(AA_UVW0Bmy#a=OBV`oHbHNsq&Yj zYQgpEPt9^krH+yjEMGJBX}Zp=>CfoVD7lZTAR9 z8hUjcM}Wt^hcnv*+Yql_`uR&ZYeV2UN5q%l$lgsa^=EA@sk>`pY}vfHBsZ$#=+Oc3 zw||JhEP{*rd$&|hi=;9h_RcjN8 zWb9D~6^~Tb&yP#wQF`xfhATj{^m;2Kz0t3zURSkRBf!OOvjx0&bcigWiYY3JOPpo7G$1 zsOG@#Vq`g49``QE_+5caeVTw4idi-mwoK=MK#Wt@+Sp6(2!57RYD<3qLk~qnw-F0} zjq|pFCIP^?e|DGVvV+6r782aC9e??1(ng2=hjB$Wu*R7JCTh05k?Sj?ab>tl?BCb6 z@wrsX?Hri0#MUd9iCzyQ+v95-ueG&H_hgboQHDJfWi;SiEoYRTa4#QM8y`H6`^FRx z=iJN|cjPQ6t+t7##9ZH6t8s06&m0oBD=SaQ;D06NIYCI1jk2)0xO@e{+U4u%AvP_c z5zBCC^CbSPRAeNm`8*Yk^oK8<+HxD`XShzq5|dB2R5Ld#9gTG>NheMI5|s`VA@E1V zZ3z{nb>_OVAwglHFJ{o1jDzjWb(+fP^Aswn6=SKHni%KIcRWi4B`qd?ioIaezfWU7 ze*H}Pg`jq12{T&LD|69qHo3W7*@Q8+(umU>X=0Me_&DE^denrPA>o=1^*LtZ#Ggi8 z8q|R}Oaar}J3DQc8&C0qqHL-6RCpfG^-J@3DXU3kt{;fez8VMRD zf_{=p?COZqh6T!Y7x-Q1R;KyX^-YMqUTlo50M@6#g;?1~e2{`i5bYD4jQ_+Oof;aa zWzsoc9R4tFSA{I*9lesNzvJ@h2=%l8obHzK=tpkrALM3i+5?Gi&5B#<#9XkKR0yPC z^v8Jy2rx_eP4@CQs8D{35hScL)xBT{FK1wLSn-~)$T0zNSV(s2>*_M9Zp;u_Z$~^s zqTmJ7dIFm!Et$5JH)}CpwAeqd5?d{s4U+bztm=b`K<6cRdYAnukF*Wa>p4Gf3#H?f z+OzZXH{__$)t}@);^yW*ZgQxeg*h4}KPa~n99?NT``lZ)iFm0%VKwd(fdd+*%~dV6 z-Nv>-i>?mlruI+Oc1kBszfkn@%{Pwtx1M`M?$7AZVnZT{chzw(z_JP6GNWQ=o^Y{; zut*Hw>ym5{qYmiR{-`6$mqm%#DPJ%SjdF}$RpfXWz6tzpb<>ac+izoA4O!hDCMVS+ zRlF-M4>z7s!-yTtidB8MghAAepNvh6Hwqhl$u{W^)97NHG3_6^AIFFPomUWD_5-WE zQAUJ?3j~0w-g3$b>})uvaJH(?*`mE)H7$M1XC$OL3iA> zu(jEsn<|o9{QzP6B=rz{+ijWIub2d4QDZ1_%dq_V_`tYNh@{9}GoNQ?mjM1zW z8XgW7>|HdTScq*XjIJY4YpYS@5SyV#$M3}yeUPw*cQH|K=lS?5Gqnx#ZWa|fDQTr3Xu%6fWay*F6*$puMRLn${8Z4=vZ{Z*j2~8a!F4Wo z^>%T#EN12PvqJpzI{kGHh&q(nlLdR4)TyM=F`EKtvFm1_DN&vk94Fo_Vpt%+8|i#FEGbcq`u zm*SGCFFJOgO}&-Qz3b>;d!sP=E-@G5v(;1_D!V-tQS*mS>4_w_NPgrE)e@v{<@yE1 z-xhA>>tm@VUBobK-PkTY$BdqL=eH+&nNW}HxRc5V;!^FBl^I!;Hs5ZK=gDTZ3 zqKr`?55f>cQf`iF4@U5IZzHoxFVC!C+}mpCkGCUOL%|n|c3$veCR@@s&n>ZcF@}e; zWDtcbd%IC%YvI)F+w~@*<==@=dq`-U#)BK-Hxy6uTJgSx^G1^w_HO1Z#}^0pXBm`- zeG|34+I6kX#?Ns?^v1TLbJV1=F*Wm9qI#U2%kd|4g&$;`VPlXVpvQ{wR=ipJQuWjK zv?j$9AU%tl;i}NHO0PrnPnl!SPz zj&;Zf0k>Z6P`Tq17PR-pP#AH&f=Qw@oO*YIUwZ$FN`ivngX{YCdd<1L0=6a=lcj>T zY!Sd(l{LwRi)v+6I}F%NeP)0KR>$SU#agUi5x0!dG#=etseJVgT(XeQnU|@oXHnkq zs%OchZq#bI3`#I%h9%USxN@9&ET#2(XKEgUvopM zA!hXIx;BZ;;G5RMg|?P{nb{JntIa=YR^wVMHTe&k7d}=pVR&~F)iMybtd;_ME4I8@IgT|kLdE#sHtzUh6Wmg7WtY}h4UzG(xfs>C8K6?{jHgg{oj&SdJ;PGOw-!>id}`6OF&0KEy z21;dB18FM*BMYE9 z%hKq`Egf@`Ay6u{t;b=pEfS!c6!+M4()-9DH0t)mt^%E~QwuU&gEFSO0uv$I0G+vY zPNw+cSJxBk9rwP^acOZ;qd;;rw7z=dl>{h#=G5eAcS9w7nQKz5`F> z2bQ|v%#;SO;h<{A9r27J+u4W4eXwE<9VU6ik5`2pHWB0v{_=gsi(5W$TOEnO?7 z{uZdA1JsXVKsCl2Dm~Bas#xpwJ|anV0(X^zAgP~O7nx2ny(C;Ds8S@M(>Hx-@+-Ix zrPd30c-RGFK!a7dmr8h4-M>P~7Q`xZyT%g~HKCps(@*K`oK+oO;WLyU#abC-HN&?+ zTZA2GCdhfM^Oh-5f1+L)Tdx8X;S6S5N%d^UUC45-FIN(uE&`S4DI@9#u~m7|$uPcQ zH_)tLRXdbb+8d_RD&p3T!ubxWeZ$Yr`4{$R0J-fW4!s=41W!N3u9Fej@x>1>wci^QItA{&$_5t;xh$kQ z7nHKZ@NPYauFTtbK3$|bx@?)OCcD;#H(v^>gA}hn`{%>RsGAcfH^f15KVLDE?wGz# za!dPdpSI~a(d9RoYt(aEMqa(Dq6_>`O?@7e77L+k$H$?Z)?T}tB?m1I&R^JA8qENv zE~8UWCkbc^A+1`j#~Zr=W>ATjJSXx|({jA4*C(Q8gW ze-eQlBOvF0NA2^&VGGrJQ>z5r77Tp72o;1aKPmHt?|uXK9%UCTQ(xQHMS*gmGbTL) zW=Nc6BaGxF9o&%aw)JQx?D%5oMppG3d;e6JyPtn18E7@hI4Hy4Vjf112ho%Ukm|l$ ztlRe<0&OXJB@A5;qvGq6knh%slrBfJG(jyQIgS^%(mfVieQ26Px_MeCo9m=Sz-`9- zqx<-69zzY=Yd4-;uXs;phz+a1#s z*nrEhLrdjPX-JsP1&5twgr^hAXg&{=M+Mw_feMm7yo?h@fL;xZDng^$cl4p<2ypdu zW9H=Ex14-^ef~ygaAQ$e)ODpDRq-O%Z-zpRuQfHwt&R3$#1h>%P<|``RWc45Nki}{ zmqnfT&-wQ<1kOKG@7CjRhMo4Uo)nS8jTKr^BxX_5d&iYN4^rXssJJZIZg3aW{k6Fr zi;K{06H9f(m2C<7NCgj2{td4c<18CSD&g^0kls4C zJY@vBZJc)lAStDQUA!otCB_i=T>V`1D(*>*HT-~MB>^oDr(EzFIP(i=Z^_jR%jA^ID(%AP8i1 zMvbl*4O#_V&8P@GS-pFGqaK2b-pBv1LeywIX@32=ej%urS5^)|-B|%xqGFJ}<*QeP zZi}(4OR`c`0)sgSnj*u=QnFf0V~|8@k-`($T8hz8vC?$Pr@Dn#!8Jj7BE}LM*X1&K ziZO{0H)7XC(@qrK*Pa&|2Hs4-9?xM&2c9Nm>yF~Nqz)W1MnO+;1Kpu>OfAcjNBNFm zUtQT~04-?NjNXB*=?dm&y~G4t-E_uk@gPwbP~Xwl;U;ofD27MN`~ry-c$ZC+8Fp8 z9fXhX)r4lyFdQTBaSk|ZYW9+OH*Bb|4LX>_!A0S1p?Xbht*guW8acySguZS>N`}g% zgBB^C6;0OlTCDfASwWHpT^)>oYI)wOBHZeoaYG>5wEyR6x%9XU(9E-wC2Hyj1 zZxs(9bE=A8@=-Ud`j&iO8O>o&`h>JpmKdi;)8kiw08c&3&+5t4YxgNG9Mm}Y za}Jv^H?D$)O$lMwVvx)@k_Pd^IsC2Jg4I^1ineaWHYz+eV@;JqT_vI&yg{tSA9EAF zD75i*PR+nk-j!9Nnn`&$w@*XW%emelMq2OlT2R79YoU0)c&Ha>Z~AZv?F{aDBBOP| zr(3{>flxMe%OZ#Y?e+j?WLcW+4OF>}Kfg{fp&psSD4&sZ!96m=XAh;7PeC{AALAp@ z<=&CRv$LGw9*Z>cz6&brC7}O=)yFHKSL?k)pN^$-3xVi7_ZI#5P{GOv-uBCr5dl2& zy)j6WFQ^K-=~R^m-wq@yK;~96kf;Ytmp;j4Rr6N&RGJ=3)Rrkg2i?(_mtfn&2h1xv zr4W-vRIBh4i}b72uh|)+H}zLier|WV|4`UqMgtdK1&O@9n;|*vaMahVE9h!@sR_co z#BzipDZCz*NquGIOPZ*wi;tF4+t0=43dUUM`S%Hv&=o7vjwhWRPW_~}0}vmy?18)e zgO-B+8Hwi`tW<${D$O)Xws^rUm%PQ9V}DX;jDVyd9fycS|{9*S}4P ztEOjjz?8sMQ9JtwaIz(N233{1AlTehsm^pgL(fj8d2#t*H`C{QfP4| zKPIXtVR9BdmmSpKu%VG=4w^jMeLC?oU@j&f2*j4(koNBnm_`oj+PpFkU?OaZpqew( z4{qAJsc-GIMmom@x(;gYzH1ZyL;I%d<-^D%a?N|58_4VQ&X2Wjs^~r7&J0u>tmDX< z&HJr$6?cuv)CKt__Cc8Q z=hZ;7ORYT0mXsnp|5!#3ox}IxGbPl(D)a@vlnlDJwG7gmPm7M?OaMLc*YE1J0eS_} z=qsSRG$OfcR`^&?YgnP4Cf-*9vZ)t5>kU~$wGkld)Io@mi-S7Q6Atx}ZIJJcKP$R& z`j96rC>kjEDpR(p0oStwz~}3;hUc%t)dHXp?H@)$P!!2gq`MF9WCZWLr`0oyzGhpq z(PtB!4upULLlN@~2^)fT+wKC;@N-|j_B@k2_Ipf9`34;H##kqRbPqY`!QoIt@o#~TH29xcXWlu(2-?XNb@6<$ zpa$`3jzf6_>CrSbj4iTR6CB|oG=1x!i$~+Iiw88D9<_-;wj=(aaa;vS05YEtI_Hb~ zk@rm6ikyXxdX9jm>t^++Vw(}1M70%J#`2R3q{e06fZO>?kzkt%p3Ht=6Y?GO#|U?_ z9CVwNz)l>rc-_AqyDEGmwhuJqXI%#-Pe3!-8r;;gIm%z8Qzryh_#|)Rlbh+$$vgq) z2{AgMuVzzSNDf;0biua*)Jsq!Oa4Mu1uPf?0A%gxQB*jjY5-VT4N;)FGnwIcnKz<|2^ys8mkAX=PBiATV*Gxa?{SCM$cHAVd`Vh~T6?_*QS+5L| z6DwxWWIx4*c&*k&Yv^=7@iPd6ZP|3ZE1%;$%;NBYEpmJl3i3C0K7gJ!8?EqHanyJvrg zcR)SOWHssf>SFha5r30S_(M6qt?@ilq4Tk*0FEB<_$GFAY zyefO0#=mTm;!=6>!Q*B0jOlzZrfZ31hA02)PVXQ}8;^C79_Hj?rM+z%E=k0YeX-)+ zlHQ_EUxK##&SO)t@9)J+mpD^qA|=64t@4T}6{Vqkc;}5x zx8w(x0h9YbUh{EL+RDYzqK#QBx0Yk_^UzL$UvU( zZuyTDyG@BU`wGk8U5`XN!9sL`_CUJNMxD#T|3}+fM@7B8?Zb*FASfxQbTYPF{G4qcMB4tNH+s0&Cn>)&Cs3F?;btp`#jGt-nHI8-nCd~9a%Gc_P+Pt z_rBx0u8$S|;soMkG`womcfYntj5X7+&TQjidE4A)aM{3f0cv`*?(*LAw8;)X5#IpO zv6RxlLzM!(5fZm9%ZWKJ^C22Ao$9Tt{EnxmeXv%=7ZB`Lxx>Hu0>6Y&p4IEQwB2-W z50+iL-gwn@1sFTraaU*F#^R;J2`Lj7cOFQrH(OYRI|=kqUxA!>V@&~T>|HF#pRH>3 zY(x*!x+j;RY7uw)5hpOCnjV{`OQX5U(uKRZV=Nhi{a*_)@|SAIoz+9p7?}N~gZq8nNgw>CJd*Q0(Uc zPd>^CzlQgs>c*C@&VHJtzy<2p2NSJQ%<@$bw;*$(R;3A|Rf9_t!t?Kek8Ar5`!+Y;W@q6we@VU5sEu-jA-H!=`C{ierfs1d!V zm?SBW?em%7EeUJW`mgnkoeLK`5&XIhCLQmOoC<3yI(?EVs+eBQa1HD z_YOMl)Ql>NEZgHY%$vyxw|a+IFF@ZGL6(Kq8+zN5AAwAWsfUKq|H%t9%ildlbObTA zF=zU8)HN=djrRGQG225%-B8@(x~X3;y@_#&xdR)|GkQhNbnh7w#O#F@)&6M9CC1oC zb`}@@z$9KgJ3UOyvMUCpo-SdS$1dQiI#RyvQu{3sk@8C&*A zF^e!98RUIs5m+~oj>P2wK}d3OFC?-WJr^$ z)7YGZxzzN@lK6uN-jZQHltBvWxNDR1Y&b2`b^w?Hi(XA9#R6MCg;VpB^@b5i=e7V- z)I#sfrKP1zF7YZe0|0>Shkvd6soNJT{`*MQDj?o%@rB#Y^u)$Du_~wFY%)EEz^@JS zAXGu&<)I0wt>I`(i_2!1kl{Br$hg8dqjC}RRqn?QbDW)D@C{5AI7O`O@xK%w=vtsi zTN;Gt(>;8dvE(Qk*3uR%vecAL!K&eetw{rQ6d(q%XU!MBFTL&bE!tVG$*z_k^?I0b z*`8;Gz&_|?SN5QkytuYCpp0Nht-wF$yovhabv~u{r}g3yE_a=)A6K#4ccFKAWcv>V z#zApJ?ZYro^YQtOHg5i7T83mK%X2xiFVBk4ht{`B=vBld4D@%0uFFnPP1q!Ci&(*0 z8{Mt8=ewAbYaDcjKaZUNyttnlC5}%W{Q$OF9}{H1ACgu7%P$f#cqIJE;PbkE+4|4E zSkG^U9pp|O1)uE4Zr-rG3?Qv^r>0)s_#}NBcCrrc8Bv?c2wX$>$tJgzFAj4>ruXS! zLW<49kejN~}?i8@b-q~avBUp}2c)598dUQPFU2hwY z!+d@vBt1TRZ{{rMM;MY7Tl%WZr(@J!forl^E+bAI_u@USvYB0&R(G;V(yzK+zWguo z8T=r_O_9loL|@MIa>CE$B`$vZaZXvi9I>9g>1VaT=~nxh z{kehU^a%tmyI5lEj0fCylT~)Gh-kB(9FjTh6;#K>XO(id=`)B_E6z++Y;Hwq< z8Dds$3r>D;htRlTmO+s%Ypj`#NAG$?)OYn3gQzpTqASy|&clrF+Sa?%0a{rkrNj=A z=*cAe9mHoR>Ba^tkdM-R*!JQRbABO2871c8Z5xvb=W=hKr)rPLp=QaQ+BNP_Y%M4I_j{*y zu>$UcxF7k-@CE5{p z7~jcSx{^uMYA>ogp-nYH+P%TTZPS#PJ0tF^`BpUnFZPI)I+_~XYB1K_QYr2A15_%_ z33zwqX1Jz-V-8iZo7(T&Icd*Yt2wdG$O#{O9v~FiHZy;**BezbHcJU>sj2liVHnD~6XJ#FGHI-^lm)yS| ze`glTRt|{giml=ZU5Va)?8TgFv}ecID2*(4k&vgS9Uw%{0c&EtxNbmM$b53i^7%92 z<@t51xwZskqJV$NjMI80=Q!l|!6P!_EmXZtQx$(gYJaplVq)W{c5Q84WGLL@bT{yq zOC}`+tt?l=7S(#`uUlIVG5KlRyR!>j$M(;!uK#l1_LD)1HseD_STOy+38AMkxLg#N zQPS%yRuKSaF_a76d zA})S4W7@Z{nOicXz@v88XQpmh{$!uZdsQ#hDx!93W-o4JsZpI9xZl?lK84Ztvky4ow8>DlrrUJv zF7FUXGU(q&J%oO^jb^wv)NzYl#Zfv9Y#nv2*uD4+{eISP!F5(M6g}%o=yDH;Y^BqvH$G%$78Fn z_m*6|{|&02`?yW02m@aG*8{3gR@72rfH6PdL)b~jdb~uFb~9V-^vBiMMtRR$T&L8I zyyVZW^Cq&qALZb(WmQF$V+5TTtj9^0J1s6p)1B3p2eR8^kAEoJ;Bp|6dLQpw-jh@o z>JHp)vM?5>wBqaMt#?ZImQ1z(Z0FRT3X?{rcBRyj(nd*QmMJ3nur*Dd6S4M(vE~F3 ze7f($5xo}@zx|CF9OzdI>q7xg#6S*LjD@VE2Iaw{q|dUn&$vO(w;teV)dBi$oEd9M zz<%YM4!%)@#mvVzTJL6wk&wnG`|F?Pqy6gfn zRv&3lFCbbDr~TjlG@5IVX6%E)!~d2_cY&N8oh(P?BZ9ZUSeSV8xMZ+jqcs~iUgjc{ z_u>*eaz(183 zzoLsQv6DbdK*>l>?>#{$8weh>D;3Qez=Zyo=^9AK7ZCqzD!uqmp`%m%|4_;R0P?hi z=wHwe5HRn=4wg_*t}1_fZDe4qW<4&IR7Nqe@YAkZ`Ces z5CgFNhcqR1$zrO0UO#32(F2kH#PpBFK`wtx^;U@W>eyg+&($V#ji1^Ev3uS{w=~>x zzb%;#rJ7U_4=84TQ~2mT*KIHmS1Yp0rKmkLCfn_3qss|MEm-vqA<+dqG^`3;d;!+^ zrvw%H(n0P7RKMQ>fJQ|S{AU73G2$Q66uNj6tqi51#E?Hw3{?O15@Zd%bd=K6D#%)0 z!u=(II#8B4`nRg`Up24nUl0bs3s+4oD+KWIH?+vtpys2PA|sCjgfTkRGj8Yg@Pjju z1`~M?4am`LMZh-!3H!ffApWzd>Ob+T(Ea&K6`#OgvKxQ#-wgah#W5r z{xd=K|7C(VtIj}we**yht3jpVSDn+k$sg_>|M2qyx8H!{y8)UprT7x(1C^P^5yF-} zH%Uv(@{*Z`Pns@Izl7iCX?_|(VMeU@$fp-D0R#X)Y78{R($~%bhil^Ud|ze6IXjrC z476(`b|EtnK!JjrRR$^3Gl6^9egLxg`;!wQp8>Lk@aGBigB>lEFbHiu0AP!_ei#EY1t_1>%;nRM}>g1FjV{{C7$ZLVX}PoQ4aGvv{9_<52?oS%TZU(@rCL zo1lvs7`3S10T{s_SLS~>z4hq{GU&xP8jXr59%(6FH7X#zkG z;(owQ+T46kZf(14Ta*a;%Dw2m?eQ`os9WgOJ1arF!Mw`>|9O=1Y(A9R5)BL)j@X4u zt_*)k6gyq{*k|mu^Brpf^mHk2qGdXM9z0961E4NH;|6zds|e0NEN&oJ2@;h9c&d@9 zpN$tGam=%400=P#x+pf(9y>nt-C&4$3Pl`D3>r>D{b;$$(1}Ap_wFnzX z0EG{U-2+)Fcq`%S(~gDd0(E9VuHdvz!$3+CAoO7}SPJH0r33c0UQoB#@#K%@)IJz! zSXU~6-pQ87{LllNZ||=6om~Rp%BVlF@@V!pha0lNcl@N>liBZR4KQXKqO4}TfF;Qc z4)rB4Mdt4g0ZwXtleut=92_I%f7Ng3X%G}SaHY2Wc0D3Y>fLtD!d)E;P}4h-@&lHe z5SVgQA4xFhY%S4b&v?Bci6&=k02*N>8lvHJ{Otz*C=hF*zQZc3O1N*n?cbixtTrvQ zF~M7gMq~e|)rNkc-=g7E%g7ad)WAiD!qE!g8NIsL_TI;AASp!SY*cY>g4T<77;N_c zvxGx*@PC(ZNB|NJD(FGHZ%+e*_-{T%Tk@Yl#Mc+|0xUi8P91=&=yu{jwVyzyP>Xfz zMcs)q3?>tSVY6m4U=Qm&H{bPCB@Dn+iU?#RJRUQpt_Q9CJ4B$)x}8W~w_>NyLTcb) z=aNQ{hK7}Rih~Br`jV~_dQ#mAXPP55o;6KTR^~JgmNzhk3~(N`2H~L z)<3(*bhiBq^d^v#7`S!k;cF~P$0$*#@OQP{#mfT)uG-cY&m`q8(WJ&kQ+b-0S1`!2 zairLi03jO*RAVQb-nBBAK2TaJ@5{ZlL}Cg3QG8FX(pI9P2|yWZe-W@tgbVg?@lnyI zD>zvF4g@JZ7zBpQVf4*^c7%4#KHCV;9=To)s3hE(k6=S6Kq%8A)ov2TpSD3hNFXBO zz_F?Yd{#ZwJ?>Ty;vwkpJ))=4kDVO6|L+nG9sgazAq;(OZCE7--vS+=M^bI_pwEYw ztlY_hffD#)(H^e}2>8=sZ+;T7s$2^?UBKl=l!#&g2;OeGf5HDz$pJEo_|UfM+Aoad zlcTO5jpJM6;6J);RPSl;u`yc8_59XeZ$!FlNAylx_T*P#w}TZArGq3u>aR<&gL0ad zCq;nU{q@(Yk-sB#@wjmB+7NC4@V6G{m* z@I-cRkbU(WoZ?}D(N{NIGN=>#d1CfV(w;4(DaTZzagHf}qZ3V8Wa_5yKe8~0pefMI z9;MH0a(AUl3#@G)+qh{$H5s*o@-df!p$_*6_{LI`M%#8DzLM;NY z1~{vRHFRqGz0_&N$tEB{JZS8bJD_z=D{}?G=hVC9$(w>6~itBp8C3F=k zR}uLj-%FVB4(%fL92y?a&o+LJ+Qk?+K+Patkr2ligvL86 z?yIwq_Qftu##yy1j4AhyKL8Qx#DiJqH88gHcQ2})WIqt8McDT~>5)OMd!-J)egae+ z9^L)_SH(f^uZlwq{W%@#0Z)V+{3)Jl)DpmieHjHjUS+n*%AYHioqUuHxvO zNMS<`Gyuk^8x1I92@FaUhBf}4$6W^;$S17x_GX+mdlN0tYC<{hJ|HG3GNCWCF-XWvCiOH)3DVKyrb+Q9)nFdPGM? zR16y7MEdeAZK_F%nOge9;KMHU3{KGH{+~(}<}i2?&L&tR-#iK2xuD{ z(Hi8@dlhn(mH^QRrP%)NR{;=EK)ypO&1`_^)agrB0JMhM&}Z=~j_y0q z)~Y?+oT!#*jM)zLpo{t4Vk;9-DshuGN?)ssv(i`L3c%<%=WzPiOxD`b?6OUr$;a;j)_SWX894+F+Qq=@G30^X$H^sS)} z?I8CVxj!J_3@)mt*T@|~jvz9-yA|_RWmShe%62dO)2Dkej-5=oHl`_Nd8Fx5IcEo} z#?M>#%0`Vs#{kKE9ZK4geT`s*(s`72CgLC7K1}Auxg?^`U-=Yz-3(UCotb(o8eFZ7 z!=X|s`)~PNcV10^AdU})G^SqyjMeQr%SvLP$|07cbO)VKUk~EnfaW0Hzxq|m9=+%I zYT^2E@Hv595Wld5{wI5<0ZFVe5ZEm@Hh)p{QeEy#-?x%m0+LnxQ!^VcBzNEaCEH_q zH7S}**gAxCWG3vEwP->OR&ZDEu<%YWy--P zb}W95fpT|rphwI>;jAe+VYFvA{1TH|2zY>&S`(|9uA*@@L!rIlN3yS##iX7-7n zS&nGZvM$#H;kP!XbjKkLGTT`ntZ`tP#H&U%wMHQJ^?+6Y*31urV*M=wo?V0o$?ei@ z*Y&Yi+%OPB!P%2aaRu#G+U8fkz$NAQijv<{9TdsI<#A04ljY#;cyvzV5g>P*;3<5A zj}~|<_woz|sqn)XH&nc4-FpV-KK>D18I^~k&V~Ed#C;fs0X1|W*s3Rtj0gifdJ`aA zlhsjIt;!eg9>kO`P-(pb3P*oTs#^u_1bva5>U@{y}N!xx7LuY;6&(bPlI}d z?vEl%MM94TI9--wQsY0b`2dtFe@*Krpym>Z)P=tRcbusO*S~vSG#oH;UD)*IyE}(b6+Eay%tDZmS}*r97#>?fjyDMH0p`3$ue1q7 zF{Hyf&50zBaAV(e>i|8OJ5SBkg+aL^-Z+ns7rk0lXnZTDd(JSRG(1*|6F+d5dD8jA zvhE1Pbq^OGzyZ^2D$k*@XC~P+W7S!s=sASdlwJg?KFa^lu;WeVCo)Lq)k(j%u7_y7 zI7r>zI}R!Dag&ZZiPWrkuqN*&;ck~r@DSHfB6pq zz!)kc8QVNBi9ssvE|_)^m??z+*ho@H$&sW1K&upsw|PLS!S1Dc4x(ae+GAfy$0(Rl zmmbRT>6x0ct3G@W3&uF<_i_o_@IG46t(NO0B|c0z!`M7UinrwwTD${j+{W9DXVx!r zD4La4!pKhBe)O9AB%&d%v5(CIVC|BLvP_I&4Zbtuhg221N zrtvg*hCYaLR$>udU=psPCN(tw95lK@O+I>7a$GwPo zP5vKw7gJH>yBBN#amL<|F*<=RLP?@&;kYfDw=Dw6MEM*^=J+##1QsPv0EHTn9oW$9 z!Yo;I&mT$xT@l`6Z(7#CPtYSm$5x%qZUHL$PFexm*(aJ+rGWgsa>vu(S1Jrs)BJPb zuu4(Wr5hO##HKq#lIRYNy^I77-a7FrorR#+9`PIvgv z!zqxIvug-|ZP-ReaspIA?H)eMK_I3)vYAU~Tm2J>V{n4YpR(Y0mgC~@0xGz3@8fYd&#dAmYzYS<#HHWTWvPfIa!Mt9ykqrkmT}8r<8k8{S2EM9d@Vd zKQEbMq`kwMAA{R(hqwg70y4s#Q+7@CtcSCMq5G@Mx=M1xssk*4+|^%pVvM~3G$e;K zAvdPgw06G*wMkXX4$zy|6Ns5anYzIR(xj^{$dhNKQ&sMJ%T;ESv*>44&t;ta_^Cq@ zN$9W*r&Hn3x}3SeXKx@JMU$2;4vIp?q4JLj0fd$`I272i$wJO4(zYeDx!fC|)R#*G z{L3&_H0?Ywm^PbE*VqBdcs1ni2H;iCCBbqgnW5G|bmtb~n^3om0M~GM(Xd|}F`o)5 z-e@to#u>4K&CU4yJxmJ8dRzm;RG@1hMkS`hiv>QKpxHnxN!4;Ry;FUfcoHG=S z`YK)&AO{Daz9J&bY!n$yL;-va;0~QI*6L?vp z7<{7!%D^p9`#L%bp)r);mE@nyknGx7V@hXa$}6uH?MZ#R)Oy7hV0lp%#W7;a?lCXV zV;Gm84><#Nj1#Ir&QTJdiGHn|x7G&83~}W}yiqyGfnHO{0nXyHLiYC`sw}P7$`(6$ zKiG7);%m$yZ`#F#1?OW>vZ%5}echF1jwbg=3sW8-1B9{rk36Od4axA}{HS zr$>_xDuUKTtoVZbtQB!v;Y3}#|QuJ&pW`W%)5i`kJ?AfHZx zODzR@zQ*dv#kefDS<$=ky8shZg?z(y9S3&h? z3W~v*1pf;*7A!+N#&PZ;?b@8v*)DvC1JF<4l%8~|Lx)fHx=xR^j}^lpZ|{?FD;ZuL ze8-hTE2qL?C)bNXrAs`EtyhKlfBJj0GSoP)3muwqrR)#zy!76CARyclDDuIkpWAO0 z6aoB~J6J@%WRynY08L%n6r9TB5;8!DX-arc1+h;b9QPxl#y%rJKdHkL73UUZuP=Q+ za+&SRFyg+eQO{?Le%+AA1TM;o;xX^z%8|(0MasERTIEbr0cAF*nuj(FvYW++g_TMj zSbFqv6pN8F{;!RXZEG2%hpDa5UNVc zx<$vgqc)~W*K`H$)5B-SW5!E6FD#oh8X|*7K@5^o8y@8onm0o>HT8wt5$U0mf~=L(DelbH_U<*Bb<+llypST4GGMsKAjoI|e1o zB~9D!!KVw5jum3V7j%x+yLvUXgx+VrPaQR^r`Y~DHgnF2(S2~-qcoUm86pLr?fD(U zI2)DC=J1CS4fY18-Bz+9T$vanVhAIuuVctVl^LzJLG=qkMnOmArsDdgBlh}9j!owy zM)Kr}sODb0(R93QC>jstblkNE zVe?lDtXig@ObjUhHUgrBw(Un9Gp>UTrgA)}@N^P$F_7haCH$)5O@~^wYrpQ-;1dMArCiuA=^$NUcdlJ zM!q5A{fNNH4?pGI$1RBeNG!haed3ri8QTr|3XrBWGW{Ju_(+VTX4Vg@UTLO&J-0{e zB=6}#m7z^!6C}lbuKGiT(aQ6^%TPjxS2jajyN&)10M0MFP`7leKm@rl0uJ?rt7EDv zj%)4_*&s-C+0~LBORaKHVS4%Ett0PJi%${)wG$=E^DQ&O-|~jqg(VV3G!50#Ky@P1 z_Gkjs!DpVr9)`qenhK^p?TK8JkQAcL%q4n)E9(P+K2GL_%?3UhQc;U9U3*-3rCo?= zE9M_twg>y_3|VfweJ5u)Dv?&>+DfXqMInuUeG=)>Lb`lb3)iMrz@{|vi;VJeJd}n_ z?Gj9Ok(d&%uvDyc`F-IAVSs(wakiPyJvpFi!KHh%l6@ZT4 zVyrA6@%bbN6h%C0Kjkb+AYt%+S7926*}-Oe1f_+)0YRVSyd28`>^zyd)okK@ut4L1 zdW^m+9>g%faz7a*(`;}%5xNbCgy-^47_G!uJNWv3_31;^l*8aFwJZ#%IW|nKxV=e& zyVA9fRFDN;ep?`g-0E2pMYq?K{x*EAgRk{-rYTtpb?$Ss9+W)<6p$~HO3QIlz=VBe z8ThPOmQ)kB0*TtWr7UCR)uZi{C|nFJoksCr^~wiBEI(dCq9XY9~X)O!U6{_a&@xHKD8a80n=&!bdxoo+F(6?Cmys$(0Q?m z%bnK1hq1Q0`FBtp~q(J=-0C)S3 z)F$wZ&+&ckzh{iS*5+OjyB0;}yY$69>K=Y_pst$oZQ9jnOr>Tunq#m1oAOG7c`;Q7 zvSv(cLv$;Ozl2eQyB_omu~6iRPpn6?4#aLz7YkMX2?718X`qnS_{mNmHt{mXUY@Ls zA}GRjwt!3}i2&zoBNaDJmRDlExtwrU5xN%Bg4Kh*tv6S+*A2WV&w#Wj{U|@hXFS$z z8`=qlbm(_>4CRkD5!9SGOpWF(xIHL z)!w*ENXgpqH11Ywyb(sGQk6IQUc^O-Jby{rCIJl`+LGI02DBh9n@KDiyBxZQ#8%U$f3X>WH24n06i0BahRt{sMvUHdb zjGH+ShK0sp#Nw(AS+mDDoeGd?yV=;DPVQf9i?4gn|LcdJ!zRD#?Zzv+JCkt?c7>m` z6~#bu&>Ew{IY&UowN*@b{AL!L2wD?WFXH)}_0S8)_yTpnhhcSi9L@_K$nhkbK3-fd z>0qK#F#L@p?F;&-RE~=>cQpyKgelE0FMY<-Mm2bK$vMYKU9K2{-+}rUuZ-szOzwb# zVOjpbk~tRiT;@s`+SGXyv$3>EfCr|jI$c{JWr1gXc=lw-i(VV?o*`WtX4iI_%B=^-kdbl?|Su>p_MmXPa`uivK^Jc>6nYF)L@jSbF=Rg8&{m(>wzQ3W{f}; z*4)nGS&_@nPpW82m#jIV{LSr>mb=>Z0cqkO(Mn`odgD9P!~;an!Zf-Y`_M9*(T@uW zd`RZldza?E5M-SSkg*nXPgg$VY+I7_;?LLCr{R-Dva)u|+s2#&n1pqI5U2ou18M+* z^`O;nVdQ4?jkR9%^7q0>PLnz81ekJjevKJ0nNwC&*8$f9E%AE;{hk#prNAd4()}i3 zfxU&407ht$5)+b3gR;}tvitgx4yF5k#<0$oPb{L;{Sa_FjQYin(@ODMZ?hN9I!B8G zI{eg%yh)eE+&V8BRU6D@4lxfgA{~CoZ#)LPH zF8GG;MMcH!9|J+dC4nU=fbUp3qMSp01eN~w&|4xUGdGPd4BVG7oW@+IcfG&BCR4I= zwp4jlVI8?I?hvVdHlL&?;#eahjMmmL!{j%)&n8zd_l(i{Yu#`z*F84Er*u}qVX&vL zC_C^@s{+>WJhSn`iFMEX?ds*UZP7%}BlxlKl__Vp$MVL-*6~Hd*~Z08zt{BgcR4J@ zjdMVaALJF=Em4Ms?iof?Z!Wxyi#$4yK&|A}Xw6TFa{HHrsm;Y&E{|tJCJIVfGUYzl zWqYJrRSmY_OX!j$NWGJldW632IhS1k*PEN|5xp}{NR6s+^7#Gxp>hRZ2sgpf|A^Nt z>(dPQh6V|QdRHT#6C2MJK$Rw4wd0z=0*V03Ca!C85Xh=ZV0ub4|bue z+dIC-z|V&W0R2Cx7C>HH28_Ugk7B*uKpV810;(9bdU-x|UVt3H-0zM6OGJm%HBZKHI%pc(;A`8g zx3fU$m=6&QivVvMZEy1{6H=<%@|S`8hTRungH`d(Zx{ui6~RUjH;S*HM7knC>pm;y zql4;Vb0a{4SODb8mz-Y7$1!JZ_5{X#wMwCTX{Py}GaSf3K^xULViTyVta(4En$te} zNNf3{?E_lFxDVibvYUAWj)vSxvshJsqqk;2;CXrGg(dAI;Ti{xQgyyw(FwS=^PIsu zJ{o1$-R zRPN8&y{#TkK zv4Jvtf;d*M>OObGjWw_fehuX+gq~sWOQ=nNy%ze6@G{iqDHba-SQT9?b^={q+&pe8`a6>*af0FgXgS}n%w z;#r#Z`$Q{&qVU1+woEALJ+i0%7tH~<<%*i|XKiJ9>NKe>T5+a)_w<}vvk~mN@z#(R zio#e5V%?xdpMF*_xcUu+N+U%?KHf6FrwHenT?o z+fOOIPTst#%4{-5-%6cv#hCZw%Bh>ve!KFPp#2sxY1-Ze5Mh~izHX6AJRoUYJ7da$ z6isTy6D(!1p+(jv&56A=C4mS5I(%!aU1DS7hnID8 zxawBulu`w(prYW#56*Uw2%l<9_E7twmxGx}XHEdWHVAGR=K0$^?ULuhR~FlSNNCITiz%C1SzdK@08cOGggFCkkPEuXxJ!L!>b2~y7;cj%1z-Vw8U>H;_p>8dY zXN0Fu!KL!aRJG6V=3VYBJ%HL7^7jJpJIZmO!w}MMn^bwbd-a+{Zt5c15XFvl78X6( z2rN}96s>2KWuWFL1K=jxWyN(}T@Sgg1(YzI!OY`W8v&RrH1IlC zpO$u9EM4fm&4TETgb|-}+4EPAxhm|OB*>aZ zB~x@}Lt=wh%E(DkdKh19_myRY=V*k~j68(&XcTbnJ`5`%4!LFM|DGVw3(1;K;vMT7 zwUeOrF6bb5Qg&#A9bmCumww6=%tky=l6u|;I-1!8gzXIh&qH`N96s;F*Nl?n_k&iH zRt4dR;~W9>90)P5bqBRq|Cmg5z2EuWzNud;ZrL`$aRw`N&tDtCQh{rb)rm2Up;1AP z(0=FpDx3@gAx1ZhOMTOD?~}1Yh|qgUi#9U)yFZDhnfYgB`?4c;WUUsFy7HDLmnDF7 zNE2RF19==WVXN9tWkLG@KgdRU7?ns`8i{oYw4GC*4fxo#hO)6A*V-<>t~KCrFnS?t zz=2%f zwEM@8w)F0A?r0}-PXle62?{U%&1-FZea^E^8Zyz)WUR5jjzeepb1+XWC+YV*WixNN<6jD>cLsu?ZXL!Q(eNMaMSqkH-zxlems+~(%y13L9U zGd#3cD~_mP7JK&&cze^>7J_#%o;r(u(Y;N5&Zh#`VO|hTLK!;MX{bZsm-6Zb{Ok`qN?3|B%%(W^+KFwB!RgY_{Q++ovnG_t zN_tHu#j;NtpF-l#Sp+T`&Uz)(v+4W$Vix%tFU@j`-pgi*PY)E8A=zG{)n3FHr29o} z9C*^82+xSSB}I36zlA%XcPhT^9@c1u44hoG@5{HJJ8=uwm(3*HsO7?gT&^v|Q^UJU zyX;$typ<@NtA(|(7?G>o_=E+_{{1zb^G>wCAngo!ke!$X&Sj&n=8-gxHs$dT>)fi6Db$VcY2CCyji}P_53E z5T{tcvsCR1fg5cx>8y0^GIgs*EMEcvZ1!ebBra4tsKqz!r>jyI(j#=wB4o${x;$pl4|(|K35{ih>|=?ui890>PB7Jr@+_#RPsu$Rjs7KL!0{k7)#a9C+MNv0XOenC9#_^h;)b7wW?9 z6z_vL=DCL~qvDX3Q)(=KUY1dt2o+q-AUZp`-+1jyfi%45H`KLnzAZEqD=+|;%>49V zRc3|?ys3_kQKKS1!_8bfi>^J;HZnz=#p>EMl1iAgtg&E!cf>Vom-Hg=HkdwJZCcJ<=km*;Qh<0(o@hwc~LB`mm~o&GtK<8JQ5 z2kqG~X<-QyjTUg>-P?BKz?1F~$xb@|TA;*;RPPtGiYoW$OB1GxRqPQ}5Poxd2qb<; zwO_arKMA@Ws`artBhcqJ(}x#49}U5qdz!TFrm9SJRI?PPy7G6FvlPGosPjPS?^sgd z)7o*&`%lF+Zr@O<9Edef3^KyAQ(#mH3rLM)%Mf;0vNyc}2tpQVCMK&)%!T> zoR2of=TifSz02w2#(Z=n z75@_(C-|hNJ8)fqc^wG-v-0NBwBj(s6bM~JNFYlG(TK{yh29%CH@UP*o>2H{*;5JS zDWz8FmY3Q-J0%!cEnOew0_Tkq&t3!^H0AO^IB@x*rYO#i$R}IJ55N)0h$Th!rd4Mh zKI|7lMeW8AtEkLnO`;E}HR9G3b?BZXF_q#ODavndO+(i2-!GZ|^QDxUL+x^tdxnqw zPZ!^!FO}B1*TZat5v|14pi|A*!bN>0Alh|K# zk2p|0_aq73`y5=?kVOpQAYsQR{4U?J5hk^yf)!y+60SwXc>NXSJAn*!&|M3b@Ak)g&bL;c_ z90``6U$t7$5d(ZO@b0IjyWk+>A+lSv<1{gcdczq0oyF$gSyZ-YK6C(|5j6Qs(YV)i zHPO>$Uu?k)+>Gd6snG0z%!$^sBbq?TS+e(b&!`>X7-$Qyw-2gM_axgF2g=b*oP~*@ zq#*34LI)thq1HPtVtR$4L<8pGul=$y(wGGpMs=$arvm+}o*&I%-1|%VsZWft|2&k* z@#jCkxrPZw1g8SOb(o&CAbyJnrrxd?F9YYxM>YufpwOS+&jBgJ5~6m5Y2ZE>Nq90F zu#JYO@4K4*|GQr4KydVdQ)- zj=;k{gNK#mdr0?z?+_--;kRJgGrm&ISnnA{&(W?}>6JOgQJhLIO9v+h(jo2MaTn&( zpm$(c%s)VVCQa~o9P`iA_QCT0U#12=?a&YY{8C@KyER5Q%{vwwY1yeR6t?9N?2S(8 zz>hZ=OamF$GVJ%wn64W*qIXv%PSU%7f4*U(ZdrO=yM2X<(y3}G=?ahh4dROC;Kazth2zBO{J>cx1e3|&y# z@0x&h2S1(!B`n)FGF5TU$jR;d{;o($#X5^k}qHVS++$&`pWunEtn zlTmH_!LUH-W9WvB{(2O8zk4h-i}741{*?KIUA3`3$2;nP9tQHEQ%+c3mH~>?}{qx9`}nZwpX4fGIDN~Sk14P)u(I6 zxnK{aCIbsUc>#?0g>KauJcQ0?Ch?$_Ak?Eg2bW=!ZuKoJ(LbEvQ)WzsO;G=3a85C- zPIc%jV;r_zGxU;SSMKUdjypp-+iLjhvwFX`SBgQ0%BdnSqPhE;a&_V!s-!4Q*lGHr zkU{(bCk%Vfz2&k4Cerk?W0-*xCzFz9_5GqdWV<8KnXu2l+CyfDHAdfZun)%&u^zZh zm2e;!!(~ob-dLMc&ag=!EnGiIN<~E)H_pVd9LebU$nq?mAZ70ktU3`m&ExGcw2jP} z!13m@rS8LQe|HVzw3w0hD5%TiJB@Q#PAKD7w$+y~_bS6(ILtNUqv-{=@2Bw8D_OcH zyDx1RS0!2!OA(KoPbYGZa0G=}f(-pRG)Pe@3ga~uGn8|4v~CF!9IHM<0$&*Lu_zYm zcEqL~+J`=Ghuz3J@1N_Azrol1y2LTfthaH$0*N$NC1wx{1=OFdS)BD)0ssvkV4Ed4C`Wvuh1udXOS`^T~s<4{4On zA ze;*iI9Eg>%%&^H89C)9K<5GV}wmH?W&F3DzjO%7_0CQ+h?VMyl6`Y>1l1>S@jm9Y4q2x`CV`~{Wk>yQ`Cr?`tZ_t=(BdO2|J zj?}|_rBVEO%3@K&$K{OaR8*D%(FgKFUW@%w`12Q~el?)d`V+mOP9W68K@=$~^ zDeB`n?%^od6J-p*=bFD z-6Vbdixr8}dt$Vs+;KVRjcLyz*Sg&LgP7Z(s>8RM!Y-WoA~uHW4*A>zX3{HKn1od+ zw++rtNHx(pyZku)MhiJ+s~FFDNwCK&1(OFK6v1Gr9>lv zp&D2I#4c6sSnHab@^3steSv1#Y{I%`XeT!;MSDD|gaDHngSy|oLPT14cY%a_p7Y7$ z+xUdIDq7e_*06qm?_&DZTvFrk-3^{_I$Fr0Nd6;LbB@W^h3CiHbGT5qS-<7;ei5OY z)1+#G^YK@`41E$)!`X-%QPaSI0PiRBE!*SS>!~7~Fm4~mEM{#i=%zU3= zbjVs|LL{{Qj3E@V(C7{`;$adf$($u!==9j>^7c(JHar zHg4lebj-=w4#c`)v;(_JdUzI{K-97yQNxU)eG1%2mlOu{JYXkX1|ACAkwu@+XJo)z z*U6m;F+CE;WFkhD`ini@@t-khE_3O`_I=gXt(=hHC$-kRG8kSTrN$GY1eL%J49-p~ zq<1a-Nc*Wv!}pL4XC9&?)>ug`np zB*nOL?C2;Q-U6CiFwgr9DC`$yMLU#cB--!fzS9oqjPs0JtcSWKkb2Je5Cx^n&Ytv*~e zp2Wvn?mk)e!&@X2AsCcgpxO`-I2zIXP(>&pyyOCEDR#xwmv#{Qh(QxF?SWXA^*6q7 z8{#TOxtn2)hiPerOLbL}KOj1uUijQFNR z7N;zLRhn&@qCnxJGI_Q>H}?(;k0VcNapw7W&MeW>9>E71*fMjp^wyCzkrO4I_wa>o zNl{^TcKX^OIHfY-X9W8-e7B%4-$n+;RXicYmG82a8e|OJoAiFOm5Gz|trH!a)UqDF zQ+&08nT?e?KmvXK@8(#Fb*c3e-xos#?x zMw8UX0obno?sx&gRB!jZ)IIrL;^EKPv_1wko{V&@1Lty1Gc0%%i^P4J_pG=5u_P*g zn|$z~sABe{?a7W-4X|sCd%x=d)$P=f5@~zOQw$&HdSJQpYyT;&N$cEp)18~CJ0D_A zDf{bt|Aa%Yz5zdsg*V!p`VOapap&k6&%S4t^aXKDhIu*vM9iSSk>LGd_AY~Iwqcr? z1vv8-Ic>x@l@@)GbRx)->;F@=xyLiT#&NvOipk6ECvDMe*pQL?&@f?)TuyGKau!Z< z?ITuWW81#d+qB)bI8E_xJrh&-490@9*dP z{9ex_l6MtH%$~UuYWoG6`v=mFV-lhh!-_s=@V<8Fq^K5KSH@R#>CUJQT?u&*irc}f=i5TSnhVKER8 zQVMwrIxuL{7;8WVFLAn}zzjA8B4q?ICI6Awpxg*|=h+>n9vG`sEuX4$Z+=lLI=Kye zfqW@B6@_!2COt>xG<4~^vPg~~>l@0fU5~Yaj(P*PdQTLQR?m6Sv>3BC^ zxg0)h+?l`$hBsmV_|hbD+Xd+iq-4( z7WDcYDyFfO<|cD6E$DXJUY%g227oPT>;wr-?a#QTX87K{NGN!9Vd4f_Vs)D5D%AO? zY?1+Emf(`9?(7icnxw6T`+l40dFwXzGkU8|Fj$j#HOek>sbkR&UC~Q!N-q)A%q<$m ztzAlgbHM+(nWIsD1Q!#=bL&W=k|S?AEuCt4sC{RHzuLkr=VzyNfHZ80tvABG&3LF+ z8r;9Je7ey3oxDk|%pXC`p+7pBT0x z``ugyYinS%O+b|V9|K^9{Se)9VU4wB&n<2|F%q$y?2LwV7@5G2~Q2(rUB4*l9+AP-2YdHYK#XUunx@bXqSe74YXYLcQ$l!R3V(Zsp}i^y;Kh%(5ZPxJZ~Y zgx4$(P;yNbpU9go%whH}J`t3D1IlFnDA)oLSzG#;Z?_-z@Y4DeeMGimbP*$RS5hfA z57Buu+$S-{d8}jKV6#yBr$E91k*j!Py2TgNOpdw^SaPccu&q054V|F(okY&xvzRX8~xv~&d=k{_9hxKh)CwKl*9p#b0N?8<=3Y$w7rSp_YO-oW$VEp zlsU-RmE)|kU|jWx%$zD;fm;!2*(c~iF44(i)%rb1`eRQ!Q`1(*&bT0i32*THqh)fUEVkKb4kOzCrkD zl}py#_(*Kn-UIYtF~O>Zk(_k0GFdXGIY2Z4uI?++Bx1-AN0R0ADx%%E9Xp;*7lHJn zrc<)>$;t)bf*DCZ)*LNGw9(eKhU@l+kK$U5BEhn|3pX7G+qYNz@vt){zS)EXD;1}%L1MGUnb*FAJSJ)ErK{<)?pD+XT`(?Q6 YqP1DNs`2TmpSOUAX5(aCwx1sNKkuf$PXGV_ literal 0 HcmV?d00001