diff --git a/samples/AddDefaultNetworkPolicy.md b/samples/AddDefaultNetworkPolicy.md index 2d1e46424c..192a54caf4 100644 --- a/samples/AddDefaultNetworkPolicy.md +++ b/samples/AddDefaultNetworkPolicy.md @@ -9,7 +9,7 @@ A default `NetworkPolicy` should be configured for each namespace to default den [add_network_policy.yaml](best_practices/add_network_policy.yaml) ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: add-networkpolicy diff --git a/samples/AddNamespaceResourceQuota.md b/samples/AddNamespaceResourceQuota.md index 4e32f70653..e3e8d1757f 100644 --- a/samples/AddNamespaceResourceQuota.md +++ b/samples/AddNamespaceResourceQuota.md @@ -11,7 +11,7 @@ To limit the number of resources like CPU and memory, as well as objects that ma [add_ns_quota.yaml](best_practices/add_ns_quota.yaml) ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: add-ns-quota diff --git a/samples/AddSafeToEvict.md b/samples/AddSafeToEvict.md index 1558a77904..12e567188a 100644 --- a/samples/AddSafeToEvict.md +++ b/samples/AddSafeToEvict.md @@ -13,7 +13,7 @@ This policy matches and mutates pods with `emptyDir` and `hostPath` volumes, to [add_safe_to_evict_annotation.yaml](best_practices/add_safe_to_evict.yaml) ````yaml -apiVersion: "kyverno.io/v1alpha1" +apiVersion: "kyverno.io/v1" kind: "ClusterPolicy" metadata: name: "add-safe-to-evict" diff --git a/samples/CheckUserGroup.md b/samples/CheckUserGroup.md index 1b879644a3..569ad15990 100644 --- a/samples/CheckUserGroup.md +++ b/samples/CheckUserGroup.md @@ -7,7 +7,7 @@ All processes inside the pod can be made to run with specific user and groupID b [policy_validate_user_group_fsgroup_id.yaml](more/policy_validate_user_group_fsgroup_id.yaml) ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: validate-userid-groupid-fsgroup diff --git a/samples/DisallowBindMounts.md b/samples/DisallowBindMounts.md index df899c104b..0f90edb949 100644 --- a/samples/DisallowBindMounts.md +++ b/samples/DisallowBindMounts.md @@ -7,7 +7,7 @@ The volume of type `hostPath` allows pods to use host bind mounts (i.e. director [disallow_bind_mounts.yaml](best_practices/disallow_bind_mounts.yaml) ````yaml -apiVersion: "kyverno.io/v1alpha1" +apiVersion: "kyverno.io/v1" kind: "ClusterPolicy" metadata: name: "disallow-bind-mounts" diff --git a/samples/DisallowDefaultNamespace.md b/samples/DisallowDefaultNamespace.md index 03d1845a83..13bbf98861 100644 --- a/samples/DisallowDefaultNamespace.md +++ b/samples/DisallowDefaultNamespace.md @@ -7,7 +7,7 @@ Kubernetes namespaces are an optional feature that provide a way to segment and [disallow_default_namespace.yaml](best_practices/disallow_default_namespace.yaml) ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-default-namespace diff --git a/samples/DisallowDockerSockMount.md b/samples/DisallowDockerSockMount.md index af2afa3a1f..65fdc43d4c 100644 --- a/samples/DisallowDockerSockMount.md +++ b/samples/DisallowDockerSockMount.md @@ -9,7 +9,7 @@ to manage containers outside of Kubernetes, and hence should not be allowed. [disallow_docker_sock_mount.yaml](best_practices/disallow_docker_sock_mount.yaml) ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-docker-sock-mount diff --git a/samples/DisallowHelmTiller.md b/samples/DisallowHelmTiller.md index df8e949ae3..eb68787793 100644 --- a/samples/DisallowHelmTiller.md +++ b/samples/DisallowHelmTiller.md @@ -7,7 +7,7 @@ Tiller has known security challenges. It requires adminstrative privileges and a [disallow_helm_tiller.yaml](best_practices/disallow_helm_tiller.yaml) ````yaml -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-helm-tiller diff --git a/samples/DisallowHostNetworkPort.md b/samples/DisallowHostNetworkPort.md index aeaa274e81..0230f335fc 100644 --- a/samples/DisallowHostNetworkPort.md +++ b/samples/DisallowHostNetworkPort.md @@ -9,7 +9,7 @@ Using `hostPort` and `hostNetwork` allows pods to share the host networking stac ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-host-network-port diff --git a/samples/DisallowHostPIDIPC.md b/samples/DisallowHostPIDIPC.md index bf5b30f3e9..bc305cd472 100644 --- a/samples/DisallowHostPIDIPC.md +++ b/samples/DisallowHostPIDIPC.md @@ -9,7 +9,7 @@ To avoid pod container from having visibility to host process space, validate th [disallow_host_pid_ipc.yaml](best_practices/disallow_host_pid_ipc.yaml) ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-host-pid-ipc diff --git a/samples/DisallowLatestTag.md b/samples/DisallowLatestTag.md index d9075dade5..9adb57fbf2 100644 --- a/samples/DisallowLatestTag.md +++ b/samples/DisallowLatestTag.md @@ -8,7 +8,7 @@ The `:latest` tag is mutable and can lead to unexpected errors if the upstream i ````yaml -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-latest-tag diff --git a/samples/DisallowNewCapabilities.md b/samples/DisallowNewCapabilities.md index aecd0bc280..43040036bc 100644 --- a/samples/DisallowNewCapabilities.md +++ b/samples/DisallowNewCapabilities.md @@ -11,7 +11,7 @@ default capabilities. [disallow_new_capabilities.yaml](best_practices/disallow_new_capabilities.yaml) ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-new-capabilities diff --git a/samples/DisallowPrivilegedContainers.md b/samples/DisallowPrivilegedContainers.md index 4257b25d7d..291c5b4923 100644 --- a/samples/DisallowPrivilegedContainers.md +++ b/samples/DisallowPrivilegedContainers.md @@ -9,7 +9,7 @@ To disallow privileged containers and privilege escalation, run pod containers w [disallow_privileged.yaml](best_practices/disallow_privileged.yaml) ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-privileged diff --git a/samples/DisallowRootUser.md b/samples/DisallowRootUser.md index 975d3b5361..5f570a1186 100644 --- a/samples/DisallowRootUser.md +++ b/samples/DisallowRootUser.md @@ -11,7 +11,7 @@ By default, all processes in a container run as the root user (uid 0). To preven [disallow_root_user.yaml](best_practices/disallow_root_user.yaml) ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-root-user diff --git a/samples/DisallowSysctls.md b/samples/DisallowSysctls.md index 14f552b971..b7ba43167a 100644 --- a/samples/DisallowSysctls.md +++ b/samples/DisallowSysctls.md @@ -12,7 +12,7 @@ The Sysctl interface allows modifications to kernel parameters at runtime. In a [disallow_sysctls.yaml](best_practices/disallow_sysctls.yaml) ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-sysctls diff --git a/samples/RequirePodProbes.md b/samples/RequirePodProbes.md index 2c24062439..ed61d056fa 100644 --- a/samples/RequirePodProbes.md +++ b/samples/RequirePodProbes.md @@ -9,7 +9,7 @@ For each pod, a periodic `livenessProbe` is performed by the kubelet to determin [require_probes.yaml](best_practices/require_probes.yaml) ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: require-pod-probes diff --git a/samples/RequirePodRequestsLimits.md b/samples/RequirePodRequestsLimits.md index 69986ad42d..a23da6c197 100644 --- a/samples/RequirePodRequestsLimits.md +++ b/samples/RequirePodRequestsLimits.md @@ -9,7 +9,7 @@ If a namespace level request or limit is specified, defaults will automatically [require_pod_requests_limits.yaml](best_practices/require_pod_requests_limits.yaml) ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: require-pod-requests-limits diff --git a/samples/RequireReadOnlyRootFS.md b/samples/RequireReadOnlyRootFS.md index 7a1a29fac1..668d10700f 100644 --- a/samples/RequireReadOnlyRootFS.md +++ b/samples/RequireReadOnlyRootFS.md @@ -8,7 +8,7 @@ A read-only root file system helps to enforce an immutable infrastructure strate ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: require-ro-rootfs diff --git a/samples/RestrictAutomountSAToken.md b/samples/RestrictAutomountSAToken.md index 1ebee9bd0e..7459e7eda1 100644 --- a/samples/RestrictAutomountSAToken.md +++ b/samples/RestrictAutomountSAToken.md @@ -7,7 +7,7 @@ Kubernetes automatically mounts service account credentials in each pod. The ser [restrict_automount_sa_token.yaml](more/restrict_automount_sa_token.yaml) ````yaml -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: restrict-automount-sa-token diff --git a/samples/RestrictImageRegistries.md b/samples/RestrictImageRegistries.md index 46b88d84e5..095a8f2a1e 100644 --- a/samples/RestrictImageRegistries.md +++ b/samples/RestrictImageRegistries.md @@ -9,7 +9,7 @@ You can customize this policy to allow image registries that you trust. [restrict_image_registries.yaml](more/restrict_image_registries.yaml) ````yaml -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: restrict-image-registries diff --git a/samples/RestrictIngressClasses.md b/samples/RestrictIngressClasses.md index fa8506f810..aef6414d50 100644 --- a/samples/RestrictIngressClasses.md +++ b/samples/RestrictIngressClasses.md @@ -7,7 +7,7 @@ It can be useful to restrict Ingress resources to a set of known ingress classes [restrict_ingress_classes.yaml](more/restrict_ingress_classes.yaml) ````yaml -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: restrict-ingress-classes diff --git a/samples/RestrictNodePort.md b/samples/RestrictNodePort.md index 86234ca3f6..02fae85168 100644 --- a/samples/RestrictNodePort.md +++ b/samples/RestrictNodePort.md @@ -12,7 +12,7 @@ Although NodePort services can be useful, their use should be limited to service ````yaml -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: restrict-node-port diff --git a/samples/best_practices/add_network_policy.yaml b/samples/best_practices/add_network_policy.yaml index 16850bcf9e..10c2946591 100644 --- a/samples/best_practices/add_network_policy.yaml +++ b/samples/best_practices/add_network_policy.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: add-networkpolicy diff --git a/samples/best_practices/add_ns_quota.yaml b/samples/best_practices/add_ns_quota.yaml index 4fcd8ea15c..1e17ce4970 100644 --- a/samples/best_practices/add_ns_quota.yaml +++ b/samples/best_practices/add_ns_quota.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: add-ns-quota diff --git a/samples/best_practices/add_safe_to_evict.yaml b/samples/best_practices/add_safe_to_evict.yaml index 487bfad4d3..1468d2a4df 100644 --- a/samples/best_practices/add_safe_to_evict.yaml +++ b/samples/best_practices/add_safe_to_evict.yaml @@ -1,4 +1,4 @@ -apiVersion: "kyverno.io/v1alpha1" +apiVersion: "kyverno.io/v1" kind: "ClusterPolicy" metadata: name: "add-safe-to-evict" diff --git a/samples/best_practices/disallow_bind_mounts.yaml b/samples/best_practices/disallow_bind_mounts.yaml index c00b0bf190..22804431d6 100644 --- a/samples/best_practices/disallow_bind_mounts.yaml +++ b/samples/best_practices/disallow_bind_mounts.yaml @@ -1,4 +1,4 @@ -apiVersion: "kyverno.io/v1alpha1" +apiVersion: "kyverno.io/v1" kind: "ClusterPolicy" metadata: name: "disallow-bind-mounts" diff --git a/samples/best_practices/disallow_default_namespace.yaml b/samples/best_practices/disallow_default_namespace.yaml index 954b9c25e0..4df367b45c 100644 --- a/samples/best_practices/disallow_default_namespace.yaml +++ b/samples/best_practices/disallow_default_namespace.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-default-namespace diff --git a/samples/best_practices/disallow_docker_sock_mount.yaml b/samples/best_practices/disallow_docker_sock_mount.yaml index 70053f187c..cf07dca675 100644 --- a/samples/best_practices/disallow_docker_sock_mount.yaml +++ b/samples/best_practices/disallow_docker_sock_mount.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-docker-sock-mount diff --git a/samples/best_practices/disallow_helm_tiller.yaml b/samples/best_practices/disallow_helm_tiller.yaml index b1186389a0..b87f9e70ce 100644 --- a/samples/best_practices/disallow_helm_tiller.yaml +++ b/samples/best_practices/disallow_helm_tiller.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-helm-tiller diff --git a/samples/best_practices/disallow_host_network_port.yaml b/samples/best_practices/disallow_host_network_port.yaml index 9ec09a75ff..4818d6d2f6 100644 --- a/samples/best_practices/disallow_host_network_port.yaml +++ b/samples/best_practices/disallow_host_network_port.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: host-network-port diff --git a/samples/best_practices/disallow_host_pid_ipc.yaml b/samples/best_practices/disallow_host_pid_ipc.yaml index 1354bb8e3f..0b49e09e03 100644 --- a/samples/best_practices/disallow_host_pid_ipc.yaml +++ b/samples/best_practices/disallow_host_pid_ipc.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-host-pid-ipc diff --git a/samples/best_practices/disallow_latest_tag.yaml b/samples/best_practices/disallow_latest_tag.yaml index c84983b68f..41812ed5f6 100644 --- a/samples/best_practices/disallow_latest_tag.yaml +++ b/samples/best_practices/disallow_latest_tag.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-latest-tag diff --git a/samples/best_practices/disallow_new_capabilities.yaml b/samples/best_practices/disallow_new_capabilities.yaml index ffa10db35d..c1a27028b7 100644 --- a/samples/best_practices/disallow_new_capabilities.yaml +++ b/samples/best_practices/disallow_new_capabilities.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-new-capabilities diff --git a/samples/best_practices/disallow_privileged.yaml b/samples/best_practices/disallow_privileged.yaml index 57f6b48ab1..828df22334 100644 --- a/samples/best_practices/disallow_privileged.yaml +++ b/samples/best_practices/disallow_privileged.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-privileged diff --git a/samples/best_practices/disallow_root_user.yaml b/samples/best_practices/disallow_root_user.yaml index 5201126195..819229d2aa 100644 --- a/samples/best_practices/disallow_root_user.yaml +++ b/samples/best_practices/disallow_root_user.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-root-user diff --git a/samples/best_practices/disallow_sysctls.yaml b/samples/best_practices/disallow_sysctls.yaml index 8610ed4d25..acbe320e56 100644 --- a/samples/best_practices/disallow_sysctls.yaml +++ b/samples/best_practices/disallow_sysctls.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-sysctls diff --git a/samples/best_practices/require_pod_requests_limits.yaml b/samples/best_practices/require_pod_requests_limits.yaml index 1ad5e2b132..3902b97c6b 100644 --- a/samples/best_practices/require_pod_requests_limits.yaml +++ b/samples/best_practices/require_pod_requests_limits.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: require-pod-requests-limits diff --git a/samples/best_practices/require_probes.yaml b/samples/best_practices/require_probes.yaml index 043ed320f1..ff0e62bcea 100644 --- a/samples/best_practices/require_probes.yaml +++ b/samples/best_practices/require_probes.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: require-pod-probes diff --git a/samples/best_practices/require_ro_rootfs.yaml b/samples/best_practices/require_ro_rootfs.yaml index 01b49ea541..fcc111cd5d 100644 --- a/samples/best_practices/require_ro_rootfs.yaml +++ b/samples/best_practices/require_ro_rootfs.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: require-ro-rootfs diff --git a/samples/more/restrict_automount_sa_token.yaml b/samples/more/restrict_automount_sa_token.yaml index 6e0d3b6123..202a8dae80 100644 --- a/samples/more/restrict_automount_sa_token.yaml +++ b/samples/more/restrict_automount_sa_token.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: restrict-automount-sa-token diff --git a/samples/more/restrict_image_registries.yaml b/samples/more/restrict_image_registries.yaml index 8eeb968272..ad3a48905e 100644 --- a/samples/more/restrict_image_registries.yaml +++ b/samples/more/restrict_image_registries.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: restrict-image-registries diff --git a/samples/more/restrict_ingress_classes.yaml b/samples/more/restrict_ingress_classes.yaml index 10fd7f9739..973ad3e01c 100644 --- a/samples/more/restrict_ingress_classes.yaml +++ b/samples/more/restrict_ingress_classes.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: restrict-ingress-classes diff --git a/samples/more/restrict_node_port.yaml b/samples/more/restrict_node_port.yaml index 9077b4079c..d02f5901fa 100644 --- a/samples/more/restrict_node_port.yaml +++ b/samples/more/restrict_node_port.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: restrict-nodeport diff --git a/test/policy/cli/policy_deployment.yaml b/test/policy/cli/policy_deployment.yaml index be5e97f514..9a6bd29bda 100644 --- a/test/policy/cli/policy_deployment.yaml +++ b/test/policy/cli/policy_deployment.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind : ClusterPolicy metadata : name : policy-deployment diff --git a/test/policy/mutate/policy_mutate_endpoint.yaml b/test/policy/mutate/policy_mutate_endpoint.yaml index a44b9c9c2d..e1a81e433f 100644 --- a/test/policy/mutate/policy_mutate_endpoint.yaml +++ b/test/policy/mutate/policy_mutate_endpoint.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind : ClusterPolicy metadata : name : policy-endpoints diff --git a/test/policy/mutate/policy_mutate_pod_disable_automountingapicred.yaml b/test/policy/mutate/policy_mutate_pod_disable_automountingapicred.yaml index 6a3732547f..4a8b7924e3 100644 --- a/test/policy/mutate/policy_mutate_pod_disable_automountingapicred.yaml +++ b/test/policy/mutate/policy_mutate_pod_disable_automountingapicred.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: mutate-pod-disable-automoutingapicred diff --git a/test/policy/mutate/policy_mutate_validate_qos.yaml b/test/policy/mutate/policy_mutate_validate_qos.yaml index 04b31a4b38..2f77ada3db 100644 --- a/test/policy/mutate/policy_mutate_validate_qos.yaml +++ b/test/policy/mutate/policy_mutate_validate_qos.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: policy-qos diff --git a/test/policy/policy-CM.yaml b/test/policy/policy-CM.yaml index 0566b577e0..330d6fb3db 100644 --- a/test/policy/policy-CM.yaml +++ b/test/policy/policy-CM.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind : ClusterPolicy metadata : name : policy-cm diff --git a/test/policy/query/policy_validate_loadblancer.yaml b/test/policy/query/policy_validate_loadblancer.yaml index ec768316e5..4a467b95fb 100644 --- a/test/policy/query/policy_validate_loadblancer.yaml +++ b/test/policy/query/policy_validate_loadblancer.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: query1 diff --git a/test/policy/query/policy_validate_no_loadblancer.yaml b/test/policy/query/policy_validate_no_loadblancer.yaml index 76d6892032..cef848b11e 100644 --- a/test/policy/query/policy_validate_no_loadblancer.yaml +++ b/test/policy/query/policy_validate_no_loadblancer.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: query1 diff --git a/test/policy/validate/check_cpu_memory.yaml b/test/policy/validate/check_cpu_memory.yaml index 5b432e6bff..fb6e38238d 100644 --- a/test/policy/validate/check_cpu_memory.yaml +++ b/test/policy/validate/check_cpu_memory.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: check-cpu-memory diff --git a/test/policy/validate/check_hostpath.yaml b/test/policy/validate/check_hostpath.yaml index e95c9e2c9a..85ebf078e3 100644 --- a/test/policy/validate/check_hostpath.yaml +++ b/test/policy/validate/check_hostpath.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: check-host-path diff --git a/test/policy/validate/check_image_version.yaml b/test/policy/validate/check_image_version.yaml index d3530cde39..3d8a865a32 100644 --- a/test/policy/validate/check_image_version.yaml +++ b/test/policy/validate/check_image_version.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: image-pull-policy diff --git a/test/policy/validate/check_memory_requests_same_yaml.yaml b/test/policy/validate/check_memory_requests_same_yaml.yaml index 8d41242d20..732f83bc7c 100644 --- a/test/policy/validate/check_memory_requests_same_yaml.yaml +++ b/test/policy/validate/check_memory_requests_same_yaml.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind : ClusterPolicy metadata : name : validation-example2 diff --git a/test/policy/validate/check_memory_requests_same_yaml_relative.yaml b/test/policy/validate/check_memory_requests_same_yaml_relative.yaml index f13458f858..6803c4b3e1 100644 --- a/test/policy/validate/check_memory_requests_same_yaml_relative.yaml +++ b/test/policy/validate/check_memory_requests_same_yaml_relative.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind : ClusterPolicy metadata : name : validation-example2 diff --git a/test/policy/validate/check_nodeport.yaml b/test/policy/validate/check_nodeport.yaml index 17d4c84cb0..38a180c5d7 100644 --- a/test/policy/validate/check_nodeport.yaml +++ b/test/policy/validate/check_nodeport.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: check-node-port diff --git a/test/policy/validate/check_not_root.yaml b/test/policy/validate/check_not_root.yaml index 535d525351..ac57c781e1 100644 --- a/test/policy/validate/check_not_root.yaml +++ b/test/policy/validate/check_not_root.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind : ClusterPolicy metadata : name : check-non-root diff --git a/test/policy/validate/check_probe_exists.yaml b/test/policy/validate/check_probe_exists.yaml index a2826044b2..c255595993 100644 --- a/test/policy/validate/check_probe_exists.yaml +++ b/test/policy/validate/check_probe_exists.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind : ClusterPolicy metadata : name: check-probe-exists diff --git a/test/policy/validate/check_probe_intervals.yaml b/test/policy/validate/check_probe_intervals.yaml index a3402bd9b3..9b22c3f9ab 100644 --- a/test/policy/validate/check_probe_intervals.yaml +++ b/test/policy/validate/check_probe_intervals.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind : ClusterPolicy metadata : name: check-probe-intervals diff --git a/test/policy/validate/check_registries.yaml b/test/policy/validate/check_registries.yaml index 52b188ef17..c1e7c9e052 100644 --- a/test/policy/validate/check_registries.yaml +++ b/test/policy/validate/check_registries.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: check-registries diff --git a/test/policy/validate/policy_validate_default_proc_mount.yaml b/test/policy/validate/policy_validate_default_proc_mount.yaml index 74233a6cd3..945200c8c4 100644 --- a/test/policy/validate/policy_validate_default_proc_mount.yaml +++ b/test/policy/validate/policy_validate_default_proc_mount.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: validate-default-proc-mount diff --git a/test/policy/validate/policy_validate_disallow_default_serviceaccount.yaml b/test/policy/validate/policy_validate_disallow_default_serviceaccount.yaml index c890592059..e07e32e1d8 100644 --- a/test/policy/validate/policy_validate_disallow_default_serviceaccount.yaml +++ b/test/policy/validate/policy_validate_disallow_default_serviceaccount.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: validate-disallow-default-serviceaccount diff --git a/test/policy/validate/policy_validate_healthChecks.yaml b/test/policy/validate/policy_validate_healthChecks.yaml index 41a5ce439e..dc8f03c736 100644 --- a/test/policy/validate/policy_validate_healthChecks.yaml +++ b/test/policy/validate/policy_validate_healthChecks.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind : ClusterPolicy metadata : name: check-probe-exists diff --git a/test/policy/validate/policy_validate_selinux_context.yaml b/test/policy/validate/policy_validate_selinux_context.yaml index f135a5007a..7e01f44171 100644 --- a/test/policy/validate/policy_validate_selinux_context.yaml +++ b/test/policy/validate/policy_validate_selinux_context.yaml @@ -1,4 +1,4 @@ -apiVersion: kyverno.io/v1alpha1 +apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: validate-selinux-options diff --git a/test/policy/validate/policy_validate_volume_whitelist.yaml b/test/policy/validate/policy_validate_volume_whitelist.yaml index 7830babf8f..f5a1950cf9 100644 --- a/test/policy/validate/policy_validate_volume_whitelist.yaml +++ b/test/policy/validate/policy_validate_volume_whitelist.yaml @@ -1,4 +1,4 @@ -apiVersion : kyverno.io/v1alpha1 +apiVersion : kyverno.io/v1 kind: ClusterPolicy metadata: name: validate-volumes-whitelist