2020-08-07 17:09:24 -07:00
|
|
|
---
|
|
|
|
kind: Namespace
|
|
|
|
apiVersion: v1
|
2020-11-09 11:26:12 -08:00
|
|
|
metadata:
|
2020-08-07 17:09:24 -07:00
|
|
|
name: "kyverno"
|
|
|
|
---
|
|
|
|
apiVersion: v1
|
|
|
|
kind: Service
|
|
|
|
metadata:
|
|
|
|
namespace: kyverno
|
|
|
|
name: kyverno-svc
|
|
|
|
labels:
|
|
|
|
app: kyverno
|
|
|
|
spec:
|
|
|
|
ports:
|
|
|
|
- port: 443
|
2020-10-22 11:26:22 -07:00
|
|
|
targetPort: https
|
2020-08-07 17:09:24 -07:00
|
|
|
selector:
|
|
|
|
app: kyverno
|
|
|
|
---
|
|
|
|
apiVersion: v1
|
|
|
|
kind: ServiceAccount
|
|
|
|
metadata:
|
|
|
|
name: kyverno-service-account
|
|
|
|
namespace: kyverno
|
|
|
|
---
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
|
|
kind: ClusterRole
|
|
|
|
metadata:
|
|
|
|
name: kyverno:policyviolations
|
|
|
|
rules:
|
|
|
|
- apiGroups: ["kyverno.io"]
|
|
|
|
resources:
|
|
|
|
- policyviolations
|
2020-11-11 15:50:17 -08:00
|
|
|
verbs: ["get", "list", "watch", "delete"]
|
2020-08-07 17:09:24 -07:00
|
|
|
---
|
|
|
|
kind: ClusterRoleBinding
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
metadata:
|
|
|
|
name: kyverno:webhook
|
|
|
|
roleRef:
|
|
|
|
apiGroup: rbac.authorization.k8s.io
|
|
|
|
kind: ClusterRole
|
|
|
|
name: kyverno:webhook
|
|
|
|
subjects:
|
|
|
|
- kind: ServiceAccount
|
|
|
|
name: kyverno-service-account
|
|
|
|
namespace: kyverno
|
|
|
|
---
|
|
|
|
kind: ClusterRoleBinding
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
metadata:
|
|
|
|
name: kyverno:userinfo
|
|
|
|
roleRef:
|
|
|
|
apiGroup: rbac.authorization.k8s.io
|
|
|
|
kind: ClusterRole
|
|
|
|
name: kyverno:userinfo
|
|
|
|
subjects:
|
|
|
|
- kind: ServiceAccount
|
|
|
|
name: kyverno-service-account
|
|
|
|
namespace: kyverno
|
|
|
|
---
|
|
|
|
kind: ClusterRoleBinding
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
metadata:
|
|
|
|
name: kyverno:customresources
|
|
|
|
roleRef:
|
|
|
|
apiGroup: rbac.authorization.k8s.io
|
|
|
|
kind: ClusterRole
|
|
|
|
name: kyverno:customresources
|
|
|
|
subjects:
|
|
|
|
- kind: ServiceAccount
|
|
|
|
name: kyverno-service-account
|
2020-11-09 11:26:12 -08:00
|
|
|
namespace: kyverno
|
2020-08-07 17:09:24 -07:00
|
|
|
---
|
2020-11-11 15:50:17 -08:00
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
kind: ClusterRoleBinding
|
|
|
|
metadata:
|
|
|
|
name: kyverno:policyviolations
|
|
|
|
roleRef:
|
|
|
|
apiGroup: rbac.authorization.k8s.io
|
|
|
|
kind: ClusterRole
|
|
|
|
name: kyverno:policyviolations
|
|
|
|
subjects:
|
|
|
|
- kind: ServiceAccount
|
|
|
|
name: kyverno-service-account
|
|
|
|
namespace: kyverno
|
|
|
|
---
|
2020-08-07 17:09:24 -07:00
|
|
|
kind: ClusterRoleBinding
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
metadata:
|
|
|
|
name: kyverno:policycontroller
|
|
|
|
roleRef:
|
|
|
|
apiGroup: rbac.authorization.k8s.io
|
|
|
|
kind: ClusterRole
|
|
|
|
name: kyverno:policycontroller
|
|
|
|
subjects:
|
|
|
|
- kind: ServiceAccount
|
|
|
|
name: kyverno-service-account
|
2020-11-09 11:26:12 -08:00
|
|
|
namespace: kyverno
|
|
|
|
---
|
2020-08-07 17:09:24 -07:00
|
|
|
kind: ClusterRoleBinding
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
metadata:
|
|
|
|
name: kyverno:generatecontroller
|
|
|
|
roleRef:
|
|
|
|
apiGroup: rbac.authorization.k8s.io
|
|
|
|
kind: ClusterRole
|
|
|
|
name: kyverno:generatecontroller
|
|
|
|
subjects:
|
|
|
|
- kind: ServiceAccount
|
|
|
|
name: kyverno-service-account
|
2020-11-09 11:26:12 -08:00
|
|
|
namespace: kyverno
|
2020-08-07 17:09:24 -07:00
|
|
|
---
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
kind: ClusterRole
|
|
|
|
metadata:
|
|
|
|
name: kyverno:webhook
|
|
|
|
rules:
|
|
|
|
# Dynamic creation of webhooks, events & certs
|
|
|
|
- apiGroups:
|
|
|
|
- '*'
|
|
|
|
resources:
|
|
|
|
- events
|
|
|
|
- mutatingwebhookconfigurations
|
|
|
|
- validatingwebhookconfigurations
|
|
|
|
- certificatesigningrequests
|
|
|
|
- certificatesigningrequests/approval
|
|
|
|
verbs:
|
|
|
|
- create
|
|
|
|
- delete
|
2020-11-09 11:26:12 -08:00
|
|
|
- get
|
2020-08-07 17:09:24 -07:00
|
|
|
- list
|
|
|
|
- patch
|
|
|
|
- update
|
|
|
|
- watch
|
|
|
|
- apiGroups:
|
|
|
|
- certificates.k8s.io
|
|
|
|
resources:
|
|
|
|
- certificatesigningrequests
|
|
|
|
- certificatesigningrequests/approval
|
|
|
|
- certificatesigningrequests/status
|
|
|
|
resourceNames:
|
|
|
|
- kubernetes.io/legacy-unknown
|
|
|
|
verbs:
|
|
|
|
- create
|
|
|
|
- delete
|
2020-11-09 11:26:12 -08:00
|
|
|
- get
|
2020-08-07 17:09:24 -07:00
|
|
|
- update
|
|
|
|
- watch
|
|
|
|
- apiGroups:
|
|
|
|
- certificates.k8s.io
|
|
|
|
resources:
|
|
|
|
- signers
|
|
|
|
resourceNames:
|
|
|
|
- kubernetes.io/legacy-unknown
|
|
|
|
verbs:
|
2020-11-09 11:26:12 -08:00
|
|
|
- approve
|
2020-08-07 17:09:24 -07:00
|
|
|
---
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
kind: ClusterRole
|
|
|
|
metadata:
|
|
|
|
name: kyverno:userinfo
|
|
|
|
rules:
|
|
|
|
# get the roleRef for incoming api-request user
|
|
|
|
- apiGroups:
|
|
|
|
- "*"
|
|
|
|
resources:
|
|
|
|
- roles
|
|
|
|
- clusterroles
|
|
|
|
- rolebindings
|
|
|
|
- clusterrolebindings
|
|
|
|
- configmaps
|
2020-09-04 03:04:23 +05:30
|
|
|
- namespaces
|
2020-08-07 17:09:24 -07:00
|
|
|
verbs:
|
|
|
|
- watch
|
2020-09-04 03:04:23 +05:30
|
|
|
- list
|
2020-08-07 17:09:24 -07:00
|
|
|
---
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
kind: ClusterRole
|
|
|
|
metadata:
|
|
|
|
name: kyverno:customresources
|
|
|
|
rules:
|
|
|
|
# Kyverno CRs
|
|
|
|
- apiGroups:
|
|
|
|
- '*'
|
|
|
|
resources:
|
2020-08-24 12:27:16 -07:00
|
|
|
- policies
|
|
|
|
- policies/status
|
2020-08-07 17:09:24 -07:00
|
|
|
- clusterpolicies
|
|
|
|
- clusterpolicies/status
|
2020-11-09 11:26:12 -08:00
|
|
|
- policyreports
|
|
|
|
- policyreports/status
|
|
|
|
- clusterpolicyreports
|
|
|
|
- clusterpolicyreports/status
|
2020-08-07 17:09:24 -07:00
|
|
|
- generaterequests
|
|
|
|
- generaterequests/status
|
2020-11-09 11:26:12 -08:00
|
|
|
- reportchangerequests
|
|
|
|
- reportchangerequests/status
|
|
|
|
- clusterreportchangerequests
|
|
|
|
- clusterreportchangerequests/status
|
2020-08-07 17:09:24 -07:00
|
|
|
verbs:
|
|
|
|
- create
|
|
|
|
- delete
|
2020-11-09 11:26:12 -08:00
|
|
|
- get
|
|
|
|
- list
|
2020-08-07 17:09:24 -07:00
|
|
|
- patch
|
|
|
|
- update
|
|
|
|
- watch
|
2020-11-09 11:26:12 -08:00
|
|
|
- apiGroups:
|
|
|
|
- 'apiextensions.k8s.io'
|
|
|
|
resources:
|
|
|
|
- customresourcedefinitions
|
|
|
|
verbs:
|
|
|
|
- delete
|
|
|
|
---
|
2020-08-07 17:09:24 -07:00
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
kind: ClusterRole
|
|
|
|
metadata:
|
|
|
|
name: kyverno:policycontroller
|
|
|
|
rules:
|
|
|
|
# background processing, identify all existing resources
|
|
|
|
- apiGroups:
|
|
|
|
- '*'
|
|
|
|
resources:
|
|
|
|
- '*'
|
|
|
|
verbs:
|
|
|
|
- get
|
|
|
|
- list
|
|
|
|
- update
|
|
|
|
---
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
kind: ClusterRole
|
|
|
|
metadata:
|
|
|
|
name: kyverno:generatecontroller
|
|
|
|
rules:
|
|
|
|
# process generate rules to generate resources
|
|
|
|
- apiGroups:
|
|
|
|
- "*"
|
|
|
|
resources:
|
|
|
|
- namespaces
|
|
|
|
- networkpolicies
|
|
|
|
- secrets
|
|
|
|
- configmaps
|
|
|
|
- resourcequotas
|
|
|
|
- limitranges
|
|
|
|
- clusterroles
|
|
|
|
- rolebindings
|
|
|
|
- clusterrolebindings
|
|
|
|
verbs:
|
|
|
|
- create
|
|
|
|
- update
|
|
|
|
- delete
|
|
|
|
- get
|
|
|
|
# dynamic watches on trigger resources for generate rules
|
|
|
|
# re-evaluate the policy if the resource is updated
|
|
|
|
- apiGroups:
|
|
|
|
- '*'
|
|
|
|
resources:
|
|
|
|
- namespaces
|
|
|
|
verbs:
|
|
|
|
- watch
|
|
|
|
---
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
|
|
kind: ClusterRole
|
2020-08-21 11:12:55 -07:00
|
|
|
metadata:
|
|
|
|
labels:
|
|
|
|
rbac.authorization.k8s.io/aggregate-to-admin: "true"
|
|
|
|
name: kyverno:admin-policies
|
|
|
|
rules:
|
|
|
|
- apiGroups:
|
|
|
|
- kyverno.io
|
|
|
|
resources:
|
|
|
|
- policies
|
|
|
|
verbs:
|
|
|
|
- "*"
|
|
|
|
---
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
|
|
kind: ClusterRole
|
2020-11-09 11:26:12 -08:00
|
|
|
metadata:
|
|
|
|
name: kyverno:policyreport
|
|
|
|
rules:
|
|
|
|
- apiGroups: ["*"]
|
|
|
|
resources:
|
|
|
|
- policyreports
|
|
|
|
- clusterpolicyreports
|
|
|
|
- pods
|
|
|
|
verbs: ["get", "list", "watch", "delete"]
|
|
|
|
---
|
|
|
|
kind: ClusterRoleBinding
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
metadata:
|
|
|
|
name: kyverno:policyreport
|
|
|
|
roleRef:
|
|
|
|
apiGroup: rbac.authorization.k8s.io
|
|
|
|
kind: ClusterRole
|
|
|
|
name: kyverno:policyreport
|
|
|
|
subjects:
|
|
|
|
- kind: ServiceAccount
|
|
|
|
name: kyverno-service-account
|
|
|
|
namespace: kyverno
|
|
|
|
---
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
|
|
kind: ClusterRole
|
|
|
|
metadata:
|
|
|
|
name: kyverno:view-policyreport
|
|
|
|
labels:
|
|
|
|
rbac.authorization.k8s.io/aggregate-to-view: "true"
|
|
|
|
rules:
|
2020-11-11 15:09:07 -08:00
|
|
|
- apiGroups: [ "wgpolicyk8s.io/v1alpha1" ]
|
2020-11-09 11:26:12 -08:00
|
|
|
resources:
|
|
|
|
- policyreport
|
|
|
|
verbs: [ "get", "list", "watch" ]
|
|
|
|
|
|
|
|
---
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
|
|
kind: ClusterRole
|
|
|
|
metadata:
|
|
|
|
name: kyverno:view-clusterpolicyreport
|
|
|
|
labels:
|
|
|
|
rbac.authorization.k8s.io/aggregate-to-admin: "true"
|
|
|
|
rules:
|
2020-11-11 15:09:07 -08:00
|
|
|
- apiGroups: ["wgpolicyk8s.io/v1alpha1"]
|
2020-11-09 11:26:12 -08:00
|
|
|
resources:
|
|
|
|
- clusterpolicyreport
|
|
|
|
verbs: ["get", "list", "watch"]
|
|
|
|
---
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
|
|
kind: ClusterRole
|
|
|
|
metadata:
|
|
|
|
labels:
|
|
|
|
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
|
|
|
name: kyverno:edit-policies-policyreport
|
|
|
|
rules:
|
|
|
|
- apiGroups:
|
2020-11-11 15:09:07 -08:00
|
|
|
- wgpolicyk8s.io/v1alpha1
|
2020-11-09 11:26:12 -08:00
|
|
|
resources:
|
|
|
|
- policyreport
|
|
|
|
- clusterpolicyreport
|
|
|
|
- policies
|
|
|
|
verbs:
|
|
|
|
- get
|
|
|
|
- list
|
|
|
|
- watch
|
|
|
|
---
|
|
|
|
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
|
|
kind: ClusterRole
|
|
|
|
metadata:
|
|
|
|
labels:
|
|
|
|
rbac.authorization.k8s.io/aggregate-to-admin: "true"
|
|
|
|
name: kyverno:admin-policyreport
|
|
|
|
rules:
|
|
|
|
- apiGroups:
|
2020-11-11 15:09:07 -08:00
|
|
|
- wgpolicyk8s.io/v1alpha1
|
2020-11-09 11:26:12 -08:00
|
|
|
resources:
|
|
|
|
- policyreport
|
|
|
|
- clusterpolicyreport
|
|
|
|
verbs:
|
2020-11-11 15:50:17 -08:00
|
|
|
- '*'
|