diff --git a/api/kyverno/v1/common_types.go b/api/kyverno/v1/common_types.go index 388db9d801..73b1857466 100644 --- a/api/kyverno/v1/common_types.go +++ b/api/kyverno/v1/common_types.go @@ -345,19 +345,11 @@ type PodSecurityStandard struct { // See: https://kubernetes.io/docs/concepts/security/pod-security-standards/ ControlName string `json:"controlName" yaml:"controlName"` - // Images is a list of matching image patterns. + // Images selects matching containers and applies the container level PSS. // Each image is the image name consisting of the registry address, repository, image, and tag. + // Empty list matches no containers, PSS checks are applied at the pod level only. // +optional Images []string `json:"images,omitempty" yaml:"images,omitempty"` - - // RestrictedField selects the field for the given Pod Security Standard control. - // When not set, all restricted fields for the control are selected. - // +optional - RestrictedField string `json:"restrictedField,omitempty" yaml:"restrictedField,omitempty"` - - // Values defines the allowed values that can be excluded. - // +optional - Values []string `json:"values,omitempty" yaml:"values,omitempty"` } // DeserializeAnyPattern deserialize apiextensions.JSON to []interface{} diff --git a/api/kyverno/v1/zz_generated.deepcopy.go b/api/kyverno/v1/zz_generated.deepcopy.go index ba7dc5f571..585328cb44 100755 --- a/api/kyverno/v1/zz_generated.deepcopy.go +++ b/api/kyverno/v1/zz_generated.deepcopy.go @@ -958,11 +958,6 @@ func (in *PodSecurityStandard) DeepCopyInto(out *PodSecurityStandard) { *out = make([]string, len(*in)) copy(*out, *in) } - if in.Values != nil { - in, out := &in.Values, &out.Values - *out = make([]string, len(*in)) - copy(*out, *in) - } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PodSecurityStandard. diff --git a/charts/kyverno/templates/crds.yaml b/charts/kyverno/templates/crds.yaml index b0b77d2edc..c392d8e2fd 100644 --- a/charts/kyverno/templates/crds.yaml +++ b/charts/kyverno/templates/crds.yaml @@ -1475,15 +1475,7 @@ spec: description: 'ControlName specifies the name of the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image patterns. Each image is the image name consisting of the registry address, repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field for the given Pod Security Standard control. When not set, all restricted fields for the control are selected. - type: string - values: - description: Values defines the allowed values that can be excluded. + description: Images selects matching containers and applies the container level PSS. Each image is the image name consisting of the registry address, repository, image, and tag. Empty list matches no containers, PSS checks are applied at the pod level only. items: type: string type: array @@ -3172,15 +3164,7 @@ spec: description: 'ControlName specifies the name of the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image patterns. Each image is the image name consisting of the registry address, repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field for the given Pod Security Standard control. When not set, all restricted fields for the control are selected. - type: string - values: - description: Values defines the allowed values that can be excluded. + description: Images selects matching containers and applies the container level PSS. Each image is the image name consisting of the registry address, repository, image, and tag. Empty list matches no containers, PSS checks are applied at the pod level only. items: type: string type: array @@ -4821,15 +4805,7 @@ spec: description: 'ControlName specifies the name of the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image patterns. Each image is the image name consisting of the registry address, repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field for the given Pod Security Standard control. When not set, all restricted fields for the control are selected. - type: string - values: - description: Values defines the allowed values that can be excluded. + description: Images selects matching containers and applies the container level PSS. Each image is the image name consisting of the registry address, repository, image, and tag. Empty list matches no containers, PSS checks are applied at the pod level only. items: type: string type: array @@ -6493,15 +6469,7 @@ spec: description: 'ControlName specifies the name of the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image patterns. Each image is the image name consisting of the registry address, repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field for the given Pod Security Standard control. When not set, all restricted fields for the control are selected. - type: string - values: - description: Values defines the allowed values that can be excluded. + description: Images selects matching containers and applies the container level PSS. Each image is the image name consisting of the registry address, repository, image, and tag. Empty list matches no containers, PSS checks are applied at the pod level only. items: type: string type: array @@ -9010,15 +8978,7 @@ spec: description: 'ControlName specifies the name of the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image patterns. Each image is the image name consisting of the registry address, repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field for the given Pod Security Standard control. When not set, all restricted fields for the control are selected. - type: string - values: - description: Values defines the allowed values that can be excluded. + description: Images selects matching containers and applies the container level PSS. Each image is the image name consisting of the registry address, repository, image, and tag. Empty list matches no containers, PSS checks are applied at the pod level only. items: type: string type: array @@ -10707,15 +10667,7 @@ spec: description: 'ControlName specifies the name of the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image patterns. Each image is the image name consisting of the registry address, repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field for the given Pod Security Standard control. When not set, all restricted fields for the control are selected. - type: string - values: - description: Values defines the allowed values that can be excluded. + description: Images selects matching containers and applies the container level PSS. Each image is the image name consisting of the registry address, repository, image, and tag. Empty list matches no containers, PSS checks are applied at the pod level only. items: type: string type: array @@ -12356,15 +12308,7 @@ spec: description: 'ControlName specifies the name of the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image patterns. Each image is the image name consisting of the registry address, repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field for the given Pod Security Standard control. When not set, all restricted fields for the control are selected. - type: string - values: - description: Values defines the allowed values that can be excluded. + description: Images selects matching containers and applies the container level PSS. Each image is the image name consisting of the registry address, repository, image, and tag. Empty list matches no containers, PSS checks are applied at the pod level only. items: type: string type: array @@ -14028,15 +13972,7 @@ spec: description: 'ControlName specifies the name of the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image patterns. Each image is the image name consisting of the registry address, repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field for the given Pod Security Standard control. When not set, all restricted fields for the control are selected. - type: string - values: - description: Values defines the allowed values that can be excluded. + description: Images selects matching containers and applies the container level PSS. Each image is the image name consisting of the registry address, repository, image, and tag. Empty list matches no containers, PSS checks are applied at the pod level only. items: type: string type: array diff --git a/config/crds/kyverno.io_clusterpolicies.yaml b/config/crds/kyverno.io_clusterpolicies.yaml index debd9ea7f6..7143ff4736 100644 --- a/config/crds/kyverno.io_clusterpolicies.yaml +++ b/config/crds/kyverno.io_clusterpolicies.yaml @@ -2320,22 +2320,12 @@ spec: the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image - patterns. Each image is the image name consisting - of the registry address, repository, image, - and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for the - control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. items: type: string type: array @@ -5118,22 +5108,12 @@ spec: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching - image patterns. Each image is the image - name consisting of the registry address, - repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for - the control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. items: type: string type: array @@ -7715,22 +7695,12 @@ spec: the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image - patterns. Each image is the image name consisting - of the registry address, repository, image, - and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for the - control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. items: type: string type: array @@ -10473,22 +10443,12 @@ spec: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching - image patterns. Each image is the image - name consisting of the registry address, - repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for - the control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. items: type: string type: array diff --git a/config/crds/kyverno.io_policies.yaml b/config/crds/kyverno.io_policies.yaml index 937333e454..ba18362055 100644 --- a/config/crds/kyverno.io_policies.yaml +++ b/config/crds/kyverno.io_policies.yaml @@ -2321,22 +2321,12 @@ spec: the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image - patterns. Each image is the image name consisting - of the registry address, repository, image, - and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for the - control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. items: type: string type: array @@ -5120,22 +5110,12 @@ spec: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching - image patterns. Each image is the image - name consisting of the registry address, - repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for - the control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. items: type: string type: array @@ -7718,22 +7698,12 @@ spec: the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image - patterns. Each image is the image name consisting - of the registry address, repository, image, - and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for the - control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. items: type: string type: array @@ -10476,22 +10446,12 @@ spec: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching - image patterns. Each image is the image - name consisting of the registry address, - repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for - the control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. items: type: string type: array diff --git a/config/install.yaml b/config/install.yaml index f2a6fc1efe..c069300f53 100644 --- a/config/install.yaml +++ b/config/install.yaml @@ -2337,22 +2337,12 @@ spec: the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image - patterns. Each image is the image name consisting - of the registry address, repository, image, - and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for the - control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. items: type: string type: array @@ -5135,22 +5125,12 @@ spec: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching - image patterns. Each image is the image - name consisting of the registry address, - repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for - the control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. items: type: string type: array @@ -7732,22 +7712,12 @@ spec: the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image - patterns. Each image is the image name consisting - of the registry address, repository, image, - and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for the - control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. items: type: string type: array @@ -10490,22 +10460,12 @@ spec: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching - image patterns. Each image is the image - name consisting of the registry address, - repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for - the control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. items: type: string type: array @@ -14269,22 +14229,12 @@ spec: the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image - patterns. Each image is the image name consisting - of the registry address, repository, image, - and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for the - control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. items: type: string type: array @@ -17068,22 +17018,12 @@ spec: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching - image patterns. Each image is the image - name consisting of the registry address, - repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for - the control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. items: type: string type: array @@ -19666,22 +19606,12 @@ spec: the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image - patterns. Each image is the image name consisting - of the registry address, repository, image, - and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for the - control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. items: type: string type: array @@ -22406,6 +22336,2927 @@ spec: description: Pattern specifies an overlay-style pattern used to check resources. x-kubernetes-preserve-unknown-fields: true + podSecurity: + description: PodSecurity applies exemptions for Kubernetes + Pod Security admission by specifying exclusions for + Pod Security Standards controls. + properties: + exclude: + description: Exclude specifies the Pod Security + Standard controls to be excluded. + items: + description: PodSecurityStandard specifies the + Pod Security Standard controls to be excluded. + properties: + controlName: + description: 'ControlName specifies the name + of the Pod Security Standard control. See: + https://kubernetes.io/docs/concepts/security/pod-security-standards/' + type: string + images: + description: Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. + items: + type: string + type: array + required: + - controlName + type: object + type: array + level: + description: Level defines the Pod Security Standard + level to be applied to workloads. Allowed values + are privileged, baseline, and restricted. + enum: + - privileged + - baseline + - restricted + type: string + version: + description: Version defines the Pod Security Standard + versions that Kubernetes supports. Allowed values + are v1.19, v1.20, v1.21, v1.22, v1.23, v1.24, + v1.25, latest. Defaults to latest. + enum: + - v1.19 + - v1.20 + - v1.21 + - v1.22 + - v1.23 + - v1.24 + - v1.25 + - latest + type: string + type: object + type: object + verifyImages: + description: VerifyImages is used to verify image signatures + and mutate them to add a digest + items: + description: ImageVerification validates that images that + match the specified pattern are signed with the supplied + public key. Once the image is verified it is mutated + to include the SHA digest retrieved during the registration. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions are certificate-extensions + used for keyless signing. Deprecated. + type: object + annotations: + additionalProperties: + type: string + description: Annotations are used for image verification. + Every specified key-value pair must exist and match + in the verified payload. The payload may contain + other key-value pairs. Deprecated. Use annotations + per Attestor instead. + type: object + attestations: + description: Attestations are optional checks for + signed in-toto Statements used to verify the image. + See https://github.com/in-toto/attestation. Kyverno + fetches signed attestations from the OCI registry + and decodes them into a list of Statement declarations. + items: + description: Attestation are checks for signed in-toto + Statements that are used to verify the image. + See https://github.com/in-toto/attestation. Kyverno + fetches signed attestations from the OCI registry + and decodes them into a list of Statements. + properties: + conditions: + description: Conditions are used to verify attributes + within a Predicate. If no Conditions are specified + the attestation check is satisfied as long + there are predicates that match the predicate + type. + items: + description: AnyAllConditions consists of + conditions wrapped denoting a logical criteria + to be fulfilled. AnyConditions get fulfilled + when at least one of its sub-conditions + passes. AllConditions get fulfilled only + when all of its sub-conditions pass. + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is + useful for finer control of when an + rule is applied. A condition can reference + object data using JMESPath notation. + Here, all of the conditions need to + pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for conditional + rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is + useful for finer control of when an + rule is applied. A condition can reference + object data using JMESPath notation. + Here, at least one of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context + entry (using JMESPath) for conditional + rule evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + type: array + predicateType: + description: PredicateType defines the type + of Predicate contained within the Statement. + type: string + type: object + type: array + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required number + of entries that must match. If the count is + null, all entries must match (a logical AND). + If the count is 1, at least one entry must + match (a logical OR). If the count contains + a value N, then N must be less than or equal + to the size of entries, and at least N entries + must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static key, + attributes for keyless verification, or a + nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set of + match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies one + or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is an + optional PEM encoded set of certificates + used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless attestor. + See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions used + for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked and a root certificate chain + is expected instead. If an empty + object is provided the public instance + of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted root + certificates. If not provided, the + system roots are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image + signatures. The keys can be directly + specified or can be a variable reference + to a key specified in a ConfigMap + (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors and + the count is applied across the + keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log service. + If the value is nil, Rekor is not + checked. If an empty object is provided + the public instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use for + signatures and attestations that match + this rule. If specified Repository will + override other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + image: + description: 'Image is the image name consisting of + the registry address, repository, image, and tag. + Wildcards (''*'' and ''?'') are allowed. See: https://kubernetes.io/docs/concepts/containers/images. + Deprecated. Use ImageReferences instead.' + type: string + imageReferences: + description: 'ImageReferences is a list of matching + image reference patterns. At least one pattern in + the list must match the image for the rule to apply. + Each image reference consists of a registry address + (defaults to docker.io), repository, image, and + tag (defaults to latest). Wildcards (''*'' and ''?'') + are allowed. See: https://kubernetes.io/docs/concepts/containers/images.' + items: + type: string + type: array + issuer: + description: Issuer is the certificate issuer used + for keyless signing. Deprecated. Use KeylessAttestor + instead. + type: string + key: + description: Key is the PEM encoded public key that + the image or attestation is signed with. Deprecated. + Use StaticKeyAttestor instead. + type: string + mutateDigest: + default: true + description: MutateDigest enables replacement of image + tags with digests. Defaults to true. + type: boolean + repository: + description: Repository is an optional alternate OCI + repository to use for image signatures and attestations + that match this rule. If specified Repository will + override the default OCI image repository configured + for the installation. The repository can also be + overridden per Attestor or Attestation. + type: string + required: + default: true + description: Required validates that images are verified + i.e. have matched passed a signature or attestation + check. + type: boolean + roots: + description: Roots is the PEM encoded Root certificate + chain used for keyless signing Deprecated. Use KeylessAttestor + instead. + type: string + subject: + description: Subject is the identity used for keyless + signing, for example an email address Deprecated. + Use KeylessAttestor instead. + type: string + verifyDigest: + default: true + description: VerifyDigest validates that images have + a digest. + type: boolean + type: object + type: array + type: object + type: array + type: object + conditions: + description: Conditions is a list of conditions that apply to the + policy + items: + description: "Condition contains details for one aspect of the current + state of this API Resource. --- This struct is intended for direct + use as an array at the field path .status.conditions. For example, + type FooStatus struct{ // Represents the observations of a foo's + current state. // Known .status.conditions.type are: \"Available\", + \"Progressing\", and \"Degraded\" // +patchMergeKey=type // +patchStrategy=merge + // +listType=map // +listMapKey=type Conditions []metav1.Condition + `json:\"conditions,omitempty\" patchStrategy:\"merge\" patchMergeKey:\"type\" + protobuf:\"bytes,1,rep,name=conditions\"` \n // other fields }" + properties: + lastTransitionTime: + description: lastTransitionTime is the last time the condition + transitioned from one status to another. This should be when + the underlying condition changed. If that is not known, then + using the time when the API field changed is acceptable. + format: date-time + type: string + message: + description: message is a human readable message indicating + details about the transition. This may be an empty string. + maxLength: 32768 + type: string + observedGeneration: + description: observedGeneration represents the .metadata.generation + that the condition was set based upon. For instance, if .metadata.generation + is currently 12, but the .status.conditions[x].observedGeneration + is 9, the condition is out of date with respect to the current + state of the instance. + format: int64 + minimum: 0 + type: integer + reason: + description: reason contains a programmatic identifier indicating + the reason for the condition's last transition. Producers + of specific condition types may define expected values and + meanings for this field, and whether the values are considered + a guaranteed API. The value should be a CamelCase string. + This field may not be empty. + maxLength: 1024 + minLength: 1 + pattern: ^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$ + type: string + status: + description: status of the condition, one of True, False, Unknown. + enum: + - "True" + - "False" + - Unknown + type: string + type: + description: type of condition in CamelCase or in foo.example.com/CamelCase. + --- Many .condition.type values are consistent across resources + like Available, but because arbitrary conditions can be useful + (see .node.status.conditions), the ability to deconflict is + important. The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt) + maxLength: 316 + pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$ + type: string + required: + - lastTransitionTime + - message + - reason + - status + - type + type: object + type: array + ready: + description: Ready indicates if the policy is ready to serve the admission + request. Deprecated in favor of Conditions + type: boolean + required: + - ready + type: object + required: + - spec + type: object + served: true + storage: false + subresources: + status: {} +--- +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + controller-gen.kubebuilder.io/version: v0.9.1-0.20220629131006-1878064c4cdf + creationTimestamp: null + labels: + app.kubernetes.io/component: kyverno + app.kubernetes.io/instance: kyverno + app.kubernetes.io/name: kyverno + app.kubernetes.io/part-of: kyverno + app.kubernetes.io/version: latest + name: policyreports.wgpolicyk8s.io +spec: + group: wgpolicyk8s.io + names: + kind: PolicyReport + listKind: PolicyReportList + plural: policyreports + shortNames: + - polr + singular: policyreport + scope: Namespaced + versions: + - additionalPrinterColumns: + - jsonPath: .scope.kind + name: Kind + priority: 1 + type: string + - jsonPath: .scope.name + name: Name + priority: 1 + type: string + - jsonPath: .summary.pass + name: Pass + type: integer + - jsonPath: .summary.fail + name: Fail + type: integer + - jsonPath: .summary.warn + name: Warn + type: integer + - jsonPath: .summary.error + name: Error + type: integer + - jsonPath: .summary.skip + name: Skip + type: integer + - jsonPath: .metadata.creationTimestamp + name: Age + type: date + name: v1alpha2 + schema: + openAPIV3Schema: + description: PolicyReport is the Schema for the policyreports API + properties: + apiVersion: + description: 'APIVersion defines the versioned schema of this representation + of an object. Servers should convert recognized schemas to the latest + internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' + type: string + kind: + description: 'Kind is a string value representing the REST resource this + object represents. Servers may infer this from the endpoint the client + submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' + type: string + metadata: + type: object + results: + description: PolicyReportResult provides result details + items: + description: PolicyReportResult provides the result for an individual + policy + properties: + category: + description: Category indicates policy category + type: string + message: + description: Description is a short user friendly message for the + policy rule + type: string + policy: + description: Policy is the name or identifier of the policy + type: string + properties: + rules: + description: Rules is a list of Rule instances. It contains auto + generated rules added for pod controllers + items: + description: Rule defines a validation, mutation, or generation + control for matching resources. Each rules contains a match + declaration to select resources, and an optional exclude declaration + to specify which resources to exclude. + properties: + context: + description: Context defines variables and data sources + that can be used during rule execution. + items: + description: ContextEntry adds variables and data sources + to a rule Context. Either a ConfigMap reference or a + APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request to the + Kubernetes API server. The JSON data retrieved is + stored in the context. + properties: + jmesPath: + description: JMESPath is an optional JSON Match + Expression that can be used to transform the + JSON response returned from the API server. + For example a JMESPath of "items | length(@)" + applied to the API server response to the URLPath + "/apis/apps/v1/deployments" will return the + total count of deployments across all namespaces. + type: string + urlPath: + description: URLPath is the URL path to be used + in the HTTP GET request to the Kubernetes API + server (e.g. "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format used + by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests to an + OCI/Docker V2 registry to fetch image details. + properties: + jmesPath: + description: JMESPath is an optional JSON Match + Expression that can be used to transform the + ImageData struct returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference to + a container image in the registry. Example: + ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary JMESPath + context variable that can be defined inline. + properties: + default: + description: Default is an optional arbitrary + JSON object that the variable may take if the + JMESPath expression evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional JMESPath + Expression that can be used to transform the + variable. + type: string + value: + description: Value is any arbitrary JSON object + representable in YAML or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + exclude: + description: ExcludeResources defines when this policy rule + should not be applied. The exclude criteria can include + resource information (e.g. kind, name, namespace, labels) + and admission review request information like the name + or role. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. Requires + at least one tag to be specified when under MatchResources. + Specifying ResourceDescription directly under match + is being deprecated. Please specify under "any" or + "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation keys + and values support the wildcard characters "*" + (matches zero or many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated in + favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key and + value but does not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the wildcard + characters `*` (matches zero or many characters) + and `?` (matches one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] matches any + key and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role names + for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names like + users, user groups, and service accounts. + items: + description: Subject contains a reference to the object + or user identities a role binding applies to. This + can either hold a direct API object reference, or + a value for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of the + referenced subject. Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as "User" + or "Group", and this value is not empty the + Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + generate: + description: Generation is used to create new resources. + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + clone: + description: Clone specifies the source resource used + to populate each generated resource. At most one of + Data or Clone can be specified. If neither are provided, + the generated resource will be created with default + data only. + properties: + name: + description: Name specifies name of the resource. + type: string + namespace: + description: Namespace specifies source resource + namespace. + type: string + type: object + cloneList: + description: CloneList specifies the list of source + resource used to populate each generated resource. + properties: + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + namespace: + description: Namespace specifies source resource + namespace. + type: string + type: object + data: + description: Data provides the resource declaration + used to populate each generated resource. At most + one of Data or Clone must be specified. If neither + are provided, the generated resource will be created + with default data only. + x-kubernetes-preserve-unknown-fields: true + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + synchronize: + description: Synchronize controls if generated resources + should be kept in-sync with their source resource. + If Synchronize is set to "true" changes to generated + resources will be overwritten with resource data from + Data or the resource specified in the Clone declaration. + Optional. Defaults to "false" if not specified. + type: boolean + type: object + imageExtractors: + additionalProperties: + items: + properties: + key: + description: Key is an optional name of the field + within 'path' that will be used to uniquely identify + an image. Note - this field MUST be unique. + type: string + name: + description: Name is the entry the image will be + available under 'images.' in the context. + If this field is not defined, image entries will + appear under 'images.custom'. + type: string + path: + description: Path is the path to the object containing + the image field in a custom resource. It should + be slash-separated. Each slash-separated key must + be a valid YAML key or a wildcard '*'. Wildcard + keys are expanded in case of arrays or objects. + type: string + value: + description: Value is an optional name of the field + within 'path' that points to the image URI. This + is useful when a custom 'key' is also defined. + type: string + required: + - path + type: object + type: array + description: ImageExtractors defines a mapping from kinds + to ImageExtractorConfigs. This config is only valid for + verifyImages rules. + type: object + match: + description: MatchResources defines when this policy rule + should be applied. The match criteria can include resource + information (e.g. kind, name, namespace, labels) and admission + review request information like the user name or role. + At least one kind is required. + properties: + all: + description: All allows specifying resources which will + be ANDed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + any: + description: Any allows specifying resources which will + be ORed + items: + description: ResourceFilter allow users to "AND" or + "OR" between resources + properties: + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation + keys and values support the wildcard characters + "*" (matches zero or many characters) and + "?" (matches at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). NOTE: "Name" is + being deprecated in favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" + (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label + selector for the resource namespace. Label + keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character).Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and + "?" (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. + Label keys and values in `matchLabels` support + the wildcard characters `*` (matches zero + or many characters) and `?` (matches one + character). Wildcards allows writing label + selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any + key and value but does not match an empty + label set.' + properties: + matchExpressions: + description: matchExpressions is a list + of label selector requirements. The + requirements are ANDed. + items: + description: A label selector requirement + is a selector that contains values, + a key, and an operator that relates + the key and values. + properties: + key: + description: key is the label key + that the selector applies to. + type: string + operator: + description: operator represents + a key's relationship to a set + of values. Valid operators are + In, NotIn, Exists and DoesNotExist. + type: string + values: + description: values is an array + of string values. If the operator + is In or NotIn, the values array + must be non-empty. If the operator + is Exists or DoesNotExist, the + values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator + is "In", and the values array contains + only "value". The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role + names for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names + like users, user groups, and service accounts. + items: + description: Subject contains a reference to + the object or user identities a role binding + applies to. This can either hold a direct + API object reference, or a value for non-objects + such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group + of the referenced subject. Defaults to + "" for ServiceAccount subjects. Defaults + to "rbac.authorization.k8s.io" for User + and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the + Authorizer does not recognized the kind + value, the Authorizer should report an + error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced + object. If the object kind is non-namespace, + such as "User" or "Group", and this value + is not empty the Authorizer should report + an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + type: array + clusterRoles: + description: ClusterRoles is the list of cluster-wide + role names for the user. + items: + type: string + type: array + resources: + description: ResourceDescription contains information + about the resource being created or modified. Requires + at least one tag to be specified when under MatchResources. + Specifying ResourceDescription directly under match + is being deprecated. Please specify under "any" or + "all" instead. + properties: + annotations: + additionalProperties: + type: string + description: Annotations is a map of annotations + (key-value pairs of type string). Annotation keys + and values support the wildcard characters "*" + (matches zero or many characters) and "?" (matches + at least one character). + type: object + kinds: + description: Kinds is a list of resource kinds. + items: + type: string + type: array + name: + description: 'Name is the name of the resource. + The name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). NOTE: "Name" is being deprecated in + favor of "Names".' + type: string + names: + description: Names are the names of the resources. + Each name supports wildcard characters "*" (matches + zero or many characters) and "?" (at least one + character). + items: + type: string + type: array + namespaceSelector: + description: 'NamespaceSelector is a label selector + for the resource namespace. Label keys and values + in `matchLabels` support the wildcard characters + `*` (matches zero or many characters) and `?` + (matches one character).Wildcards allows writing + label selectors like ["storage.k8s.io/*": "*"]. + Note that using ["*" : "*"] matches any key and + value but does not match an empty label set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + namespaces: + description: Namespaces is a list of namespaces + names. Each name supports wildcard characters + "*" (matches zero or many characters) and "?" + (at least one character). + items: + type: string + type: array + selector: + description: 'Selector is a label selector. Label + keys and values in `matchLabels` support the wildcard + characters `*` (matches zero or many characters) + and `?` (matches one character). Wildcards allows + writing label selectors like ["storage.k8s.io/*": + "*"]. Note that using ["*" : "*"] matches any + key and value but does not match an empty label + set.' + properties: + matchExpressions: + description: matchExpressions is a list of label + selector requirements. The requirements are + ANDed. + items: + description: A label selector requirement + is a selector that contains values, a key, + and an operator that relates the key and + values. + properties: + key: + description: key is the label key that + the selector applies to. + type: string + operator: + description: operator represents a key's + relationship to a set of values. Valid + operators are In, NotIn, Exists and + DoesNotExist. + type: string + values: + description: values is an array of string + values. If the operator is In or NotIn, + the values array must be non-empty. + If the operator is Exists or DoesNotExist, + the values array must be empty. This + array is replaced during a strategic + merge patch. + items: + type: string + type: array + required: + - key + - operator + type: object + type: array + matchLabels: + additionalProperties: + type: string + description: matchLabels is a map of {key,value} + pairs. A single {key,value} in the matchLabels + map is equivalent to an element of matchExpressions, + whose key field is "key", the operator is + "In", and the values array contains only "value". + The requirements are ANDed. + type: object + type: object + x-kubernetes-map-type: atomic + type: object + roles: + description: Roles is the list of namespaced role names + for the user. + items: + type: string + type: array + subjects: + description: Subjects is the list of subject names like + users, user groups, and service accounts. + items: + description: Subject contains a reference to the object + or user identities a role binding applies to. This + can either hold a direct API object reference, or + a value for non-objects such as user and group names. + properties: + apiGroup: + description: APIGroup holds the API group of the + referenced subject. Defaults to "" for ServiceAccount + subjects. Defaults to "rbac.authorization.k8s.io" + for User and Group subjects. + type: string + kind: + description: Kind of object being referenced. + Values defined by this API group are "User", + "Group", and "ServiceAccount". If the Authorizer + does not recognized the kind value, the Authorizer + should report an error. + type: string + name: + description: Name of the object being referenced. + type: string + namespace: + description: Namespace of the referenced object. If + the object kind is non-namespace, such as "User" + or "Group", and this value is not empty the + Authorizer should report an error. + type: string + required: + - kind + - name + type: object + x-kubernetes-map-type: atomic + type: array + type: object + mutate: + description: Mutation is used to modify matching resources. + properties: + foreach: + description: ForEach applies mutation rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + items: + description: ForEach applies mutation rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and + data sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON + data retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the JSON response + returned from the API server. For + example a JMESPath of "items | length(@)" + applied to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path + to be used in the HTTP GET request + to the Kubernetes API server (e.g. + "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format + used by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch + image details. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the ImageData struct + returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be + defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that the variable + may take if the JMESPath expression + evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional + JMESPath Expression that can be used + to transform the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + list: + description: List specifies a JMESPath expression + that results in one or more elements to which + the validation logic is applied. + type: string + patchStrategicMerge: + description: PatchStrategicMerge is a strategic + merge patch used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC + 6902 JSON Patch declarations used to modify + resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of + the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + patchStrategicMerge: + description: PatchStrategicMerge is a strategic merge + patch used to modify resources. See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/ + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/. + x-kubernetes-preserve-unknown-fields: true + patchesJson6902: + description: PatchesJSON6902 is a list of RFC 6902 JSON + Patch declarations used to modify resources. See https://tools.ietf.org/html/rfc6902 + and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/. + type: string + targets: + description: Targets defines the target resources to + be mutated. + items: + properties: + apiVersion: + description: APIVersion specifies resource apiVersion. + type: string + kind: + description: Kind specifies resource kind. + type: string + name: + description: Name specifies the resource name. + type: string + namespace: + description: Namespace specifies resource namespace. + type: string + type: object + type: array + type: object + name: + description: Name is a label to identify the rule, It must + be unique within the policy. + maxLength: 63 + type: string + preconditions: + description: 'Preconditions are used to determine if a policy + rule should be applied by evaluating a set of conditions. + The declaration can contain nested `any` or `all` statements. + A direct list of conditions (without `any` or `all` statements + is supported for backwards compatibility but will be deprecated + in the next major release. See: https://kyverno.io/docs/writing-policies/preconditions/' + x-kubernetes-preserve-unknown-fields: true + validate: + description: Validation is used to validate matching resources. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must be satisfied + for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + deny: + description: Deny defines conditions used to pass or + fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared + under an `any` or `all` statement. A direct list + of conditions (without `any` or `all` statements) + is also supported for backwards compatibility + but will be deprecated in the next major release. + See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + foreach: + description: ForEach applies validate rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + items: + description: ForEach applies validate rules to a list + of sub-elements by creating a context for each entry + in the list and looping over it to apply the specified + logic. + properties: + anyPattern: + description: AnyPattern specifies list of validation + patterns. At least one of the patterns must + be satisfied for the validation rule to succeed. + x-kubernetes-preserve-unknown-fields: true + context: + description: Context defines variables and data + sources that can be used during rule execution. + items: + description: ContextEntry adds variables and + data sources to a rule Context. Either a ConfigMap + reference or a APILookup must be provided. + properties: + apiCall: + description: APICall defines an HTTP request + to the Kubernetes API server. The JSON + data retrieved is stored in the context. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the JSON response + returned from the API server. For + example a JMESPath of "items | length(@)" + applied to the API server response + to the URLPath "/apis/apps/v1/deployments" + will return the total count of deployments + across all namespaces. + type: string + urlPath: + description: URLPath is the URL path + to be used in the HTTP GET request + to the Kubernetes API server (e.g. + "/api/v1/namespaces" or "/apis/apps/v1/deployments"). + The format required is the same format + used by the `kubectl get --raw` command. + type: string + required: + - urlPath + type: object + configMap: + description: ConfigMap is the ConfigMap + reference. + properties: + name: + description: Name is the ConfigMap name. + type: string + namespace: + description: Namespace is the ConfigMap + namespace. + type: string + required: + - name + type: object + imageRegistry: + description: ImageRegistry defines requests + to an OCI/Docker V2 registry to fetch + image details. + properties: + jmesPath: + description: JMESPath is an optional + JSON Match Expression that can be + used to transform the ImageData struct + returned as a result of processing + the image reference. + type: string + reference: + description: 'Reference is image reference + to a container image in the registry. + Example: ghcr.io/kyverno/kyverno:latest' + type: string + required: + - reference + type: object + name: + description: Name is the variable name. + type: string + variable: + description: Variable defines an arbitrary + JMESPath context variable that can be + defined inline. + properties: + default: + description: Default is an optional + arbitrary JSON object that the variable + may take if the JMESPath expression + evaluates to nil + x-kubernetes-preserve-unknown-fields: true + jmesPath: + description: JMESPath is an optional + JMESPath Expression that can be used + to transform the variable. + type: string + value: + description: Value is any arbitrary + JSON object representable in YAML + or JSON form. + x-kubernetes-preserve-unknown-fields: true + type: object + type: object + type: array + deny: + description: Deny defines conditions used to pass + or fail a validation rule. + properties: + conditions: + description: 'Multiple conditions can be declared + under an `any` or `all` statement. A direct + list of conditions (without `any` or `all` + statements) is also supported for backwards + compatibility but will be deprecated in + the next major release. See: https://kyverno.io/docs/writing-policies/validate/#deny-rules' + x-kubernetes-preserve-unknown-fields: true + type: object + elementScope: + description: ElementScope specifies whether to + use the current list element as the scope for + validation. Defaults to "true" if not specified. + When set to "false", "request.object" is used + as the validation scope within the foreach block + to allow referencing other elements in the subtree. + type: boolean + list: + description: List specifies a JMESPath expression + that results in one or more elements to which + the validation logic is applied. + type: string + pattern: + description: Pattern specifies an overlay-style + pattern used to check resources. + x-kubernetes-preserve-unknown-fields: true + preconditions: + description: 'AnyAllConditions are used to determine + if a policy rule should be applied by evaluating + a set of conditions. The declaration can contain + nested `any` or `all` statements. See: https://kyverno.io/docs/writing-policies/preconditions/' + properties: + all: + description: AllConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, all of the conditions + need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + any: + description: AnyConditions enable variable-based + conditional rule execution. This is useful + for finer control of when an rule is applied. + A condition can reference object data using + JMESPath notation. Here, at least one of + the conditions need to pass + items: + description: Condition defines variable-based + conditional criteria for rule execution. + properties: + key: + description: Key is the context entry + (using JMESPath) for conditional rule + evaluation. + x-kubernetes-preserve-unknown-fields: true + operator: + description: 'Operator is the conditional + operation to perform. Valid operators + are: Equals, NotEquals, In, AnyIn, + AllIn, NotIn, AnyNotIn, AllNotIn, + GreaterThanOrEquals, GreaterThan, + LessThanOrEquals, LessThan, DurationGreaterThanOrEquals, + DurationGreaterThan, DurationLessThanOrEquals, + DurationLessThan' + enum: + - Equals + - NotEquals + - In + - AnyIn + - AllIn + - NotIn + - AnyNotIn + - AllNotIn + - GreaterThanOrEquals + - GreaterThan + - LessThanOrEquals + - LessThan + - DurationGreaterThanOrEquals + - DurationGreaterThan + - DurationLessThanOrEquals + - DurationLessThan + type: string + value: + description: Value is the conditional + value, or set of values. The values + can be fixed set or can be variables + declared using JMESPath. + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + type: object + x-kubernetes-preserve-unknown-fields: true + type: object + type: array + manifests: + description: Manifest specifies conditions for manifest + verification + properties: + annotationDomain: + description: AnnotationDomain is custom domain of + annotation for message and signature. Default + is "cosign.sigstore.dev". + type: string + attestors: + description: Attestors specified the required attestors + (i.e. authorities) + items: + properties: + count: + description: Count specifies the required + number of entries that must match. If the + count is null, all entries must match (a + logical AND). If the count is 1, at least + one entry must match (a logical OR). If + the count contains a value N, then N must + be less than or equal to the size of entries, + and at least N entries must match. + minimum: 1 + type: integer + entries: + description: Entries contains the available + attestors. An attestor can be a static key, + attributes for keyless verification, or + a nested attestor declaration. + items: + properties: + annotations: + additionalProperties: + type: string + description: Annotations are used for + image verification. Every specified + key-value pair must exist and match + in the verified payload. The payload + may contain other key-value pairs. + type: object + attestor: + description: Attestor is a nested AttestorSet + used to specify a more complex set + of match authorities + x-kubernetes-preserve-unknown-fields: true + certificates: + description: Certificates specifies + one or more certificates + properties: + cert: + description: Certificate is an optional + PEM encoded public certificate. + type: string + certChain: + description: CertificateChain is + an optional PEM encoded set of + certificates used to verify + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + keyless: + description: Keyless is a set of attribute + used to verify a Sigstore keyless + attestor. See https://github.com/sigstore/cosign/blob/main/KEYLESS.md. + properties: + additionalExtensions: + additionalProperties: + type: string + description: AdditionalExtensions + are certificate-extensions used + for keyless signing. + type: object + issuer: + description: Issuer is the certificate + issuer used for keyless signing. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked and a root + certificate chain is expected + instead. If an empty object is + provided the public instance of + Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + roots: + description: Roots is an optional + set of PEM encoded trusted root + certificates. If not provided, + the system roots are used. + type: string + subject: + description: Subject is the verified + identity used for keyless signing, + for example the email address + type: string + type: object + keys: + description: Keys specifies one or more + public keys + properties: + publicKeys: + description: Keys is a set of X.509 + public keys used to verify image + signatures. The keys can be directly + specified or can be a variable + reference to a key specified in + a ConfigMap (see https://kyverno.io/docs/writing-policies/variables/). + When multiple keys are specified + each key is processed as a separate + staticKey entry (.attestors[*].entries.keys) + within the set of attestors and + the count is applied across the + keys. + type: string + rekor: + description: Rekor provides configuration + for the Rekor transparency log + service. If the value is nil, + Rekor is not checked. If an empty + object is provided the public + instance of Rekor (https://rekor.sigstore.dev) + is used. + properties: + url: + description: URL is the address + of the transparency log. Defaults + to the public log https://rekor.sigstore.dev. + type: string + required: + - url + type: object + type: object + repository: + description: Repository is an optional + alternate OCI repository to use for + signatures and attestations that match + this rule. If specified Repository + will override other OCI image repository + locations for this Attestor. + type: string + type: object + type: array + type: object + type: array + dryRun: + description: DryRun configuration + properties: + enable: + type: boolean + namespace: + type: string + type: object + ignoreFields: + description: Fields which will be ignored while + comparing manifests. + items: + properties: + fields: + items: + type: string + type: array + objects: + items: + properties: + group: + type: string + kind: + type: string + name: + type: string + namespace: + type: string + version: + type: string + type: object + type: array + type: object + type: array + repository: + description: Repository is an optional alternate + OCI repository to use for resource bundle reference. + The repository can be overridden per Attestor + or Attestation. + type: string + type: object + message: + description: Message specifies a custom message to be + displayed on failure. + type: string + pattern: + description: Pattern specifies an overlay-style pattern + used to check resources. + x-kubernetes-preserve-unknown-fields: true podSecurity: description: PodSecurity applies exemptions for Kubernetes Pod Security admission by specifying exclusions for diff --git a/config/install_debug.yaml b/config/install_debug.yaml index 9706e43c43..bd74ec1636 100644 --- a/config/install_debug.yaml +++ b/config/install_debug.yaml @@ -2335,22 +2335,12 @@ spec: the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image - patterns. Each image is the image name consisting - of the registry address, repository, image, - and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for the - control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. items: type: string type: array @@ -5133,22 +5123,12 @@ spec: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching - image patterns. Each image is the image - name consisting of the registry address, - repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for - the control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. items: type: string type: array @@ -7730,22 +7710,12 @@ spec: the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image - patterns. Each image is the image name consisting - of the registry address, repository, image, - and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for the - control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. items: type: string type: array @@ -10488,22 +10458,12 @@ spec: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching - image patterns. Each image is the image - name consisting of the registry address, - repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for - the control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. items: type: string type: array @@ -14263,22 +14223,12 @@ spec: the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image - patterns. Each image is the image name consisting - of the registry address, repository, image, - and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for the - control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. items: type: string type: array @@ -17062,22 +17012,12 @@ spec: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching - image patterns. Each image is the image - name consisting of the registry address, - repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for - the control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. items: type: string type: array @@ -19660,22 +19600,12 @@ spec: the Pod Security Standard control. See: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching image - patterns. Each image is the image name consisting - of the registry address, repository, image, - and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for the - control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each image + is the image name consisting of the registry + address, repository, image, and tag. Empty list + matches no containers, PSS checks are applied + at the pod level only. items: type: string type: array @@ -22418,22 +22348,12 @@ spec: https://kubernetes.io/docs/concepts/security/pod-security-standards/' type: string images: - description: Images is a list of matching - image patterns. Each image is the image - name consisting of the registry address, - repository, image, and tag. - items: - type: string - type: array - restrictedField: - description: RestrictedField selects the field - for the given Pod Security Standard control. - When not set, all restricted fields for - the control are selected. - type: string - values: - description: Values defines the allowed values - that can be excluded. + description: Images selects matching containers + and applies the container level PSS. Each + image is the image name consisting of the + registry address, repository, image, and + tag. Empty list matches no containers, PSS + checks are applied at the pod level only. items: type: string type: array diff --git a/docs/crd/v1/index.html b/docs/crd/v1/index.html index 1a1f2c696f..ddc216598b 100644 --- a/docs/crd/v1/index.html +++ b/docs/crd/v1/index.html @@ -2658,33 +2658,9 @@ See: We have to exclude restrictedFields for initContainers and ephemeralContainers: -// - spec.initContainers[*].securityContext.privileged -// - spec.ephemeralContainers[*].securityContext.privileged - -func TestValidate_pod_security_admission_enforce_restricted_exclude_privileged_containers_missing_restrictedFields(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-restricted-exclude-privileged-container-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-restricted-exclude-privileged-container-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "privileged", - "restrictedField": "spec.containers[*].securityContext.privileged", - "values": [ - "true" - ], - "images": [ - "nginx" - ] - } - ] - } - } - } - ] - } - } - `) - - // Restricted - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "privileged": true, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false, - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - } - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "privileged": true, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false, - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - } - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "privileged": true, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false, - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - } - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "privileged": true, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false, - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - } - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - } - assert.Assert(t, er.IsFailed()) -} - -// Exclude spec.containers[*].securityContext.privileged for containers running `nginx` image -// Exclude spec.initContainers[*].securityContext.privileged for initContainers running `nginx` image -// Exclude spec.ephemeralContainers[*].securityContext.privileged for ephemeralContainers running `nginx` image -// 2 * Container: nginx / nodejs -// 1 * InitContainer: nginx -// 1 * EphemeralContainer: nginx -// Fail -> We have to exclude restrictedFields for containers running with `nodejs` image: -// - spec.containers[*].securityContext.privileged -func TestValidate_pod_security_admission_enforce_restricted_exclude_privileged_containers(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-restricted-exclude-privileged-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-restricted-exclude-privileged-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "privileged", - "restrictedField": "spec.containers[*].securityContext.privileged", - "values": [ - "true" - ], - "images": [ - "nginx" - ] - }, - { - "controlName": "privileged", - "restrictedField": "spec.initContainers[*].securityContext.privileged", - "values": [ - "true" - ], - "images": [ - "nginx" - ] - }, - { - "controlName": "privileged", - "restrictedField": "spec.ephemeralContainers[*].securityContext.privileged", - "values": [ - "true" - ], - "images": [ - "nginx" - ] - } - ] - } - } - } - ] - } - } - `) - - // Restricted - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "privileged": true, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false, - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - } - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "privileged": true, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false, - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - } - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "privileged": true, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false, - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - } - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "privileged": true, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false, - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - } - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - } - assert.Assert(t, er.IsFailed()) -} - -// === Control: "Host Ports", check.ID: "hostPorts" - -// container-level: -// - spec.containers[*].securityContext.ports[*].hostPort -// - spec.initContainers[*].securityContext.ports[*].hostPort -// - spec.ephemeralContainers[*].securityContext.ports[*].hostPort - -func TestValidate_pod_security_admission_enforce_baseline_exclude_all_hostPorts(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostPorts-all-containers-nginx-nodejs" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostPorts-all-containers-nginx-nodejs", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "baseline", - "version": "v1.24", - "exclude": [ - { - "controlName": "Host Ports", - "images": [ - "nginx", - "nodejs" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - }, - { - "name": "nodejs", - "image": "nodejs", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_baseline_exclude_hostPorts_with_restrictedFields(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostPorts-all-containers-nginx-nodejs" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostPorts-all-containers-nginx-nodejs", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "baseline", - "version": "v1.24", - "exclude": [ - { - "controlName": "Host Ports", - "restrictedField": "spec.containers[*].ports[*].hostPort", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "8080", - "9000" - ] - }, - { - "controlName": "Host Ports", - "restrictedField": "spec.initContainers[*].ports[*].hostPort", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "8080", - "9000" - ] - }, - { - "controlName": "Host Ports", - "restrictedField": "spec.ephemeralContainers[*].ports[*].hostPort", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "8080", - "9000" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - }, - { - "name": "nodejs", - "image": "nodejs", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_baseline_exclude_hostPorts_missing_exclude_value(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostPorts-all-containers-nginx-nodejs" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostPorts-all-containers-nginx-nodejs", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "baseline", - "version": "v1.24", - "exclude": [ - { - "controlName": "Host Ports", - "restrictedField": "spec.containers[*].ports[*].hostPort", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "8080" - ] - }, - { - "controlName": "Host Ports", - "restrictedField": "spec.initContainers[*].ports[*].hostPort", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "8080", - "9000" - ] - }, - { - "controlName": "Host Ports", - "restrictedField": "spec.ephemeralContainers[*].ports[*].hostPort", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "8080", - "9000" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - }, - { - "name": "nodejs", - "image": "nodejs", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_hostPorts_missing_exclude_restrictedField(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostPorts-all-containers-nginx-nodejs" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostPorts-all-containers-nginx-nodejs", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "baseline", - "version": "v1.24", - "exclude": [ - { - "controlName": "Host Ports", - "restrictedField": "spec.containers[*].ports[*].hostPort", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "8080", - "9000" - ] - }, - { - "controlName": "Host Ports", - "restrictedField": "spec.initContainers[*].ports[*].hostPort", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "8080", - "9000" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - }, - { - "name": "nodejs", - "image": "nodejs", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "ports": [ - { - "hostPort": 8080 - }, - { - "hostPort": 9000 - } - ] - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -// === Control: "/proc Mount Type", check.ID: "procMount" - -// container-level: -// - spec.containers[*].securityContext.procMount -// - spec.initContainers[*].securityContext.procMount -// - spec.ephemeralContainers[*].securityContext.procMount - -func TestValidate_pod_security_admission_enforce_baseline_exclude_all_procMounts(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-procMounts-all-containers-nginx-nodejs" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-procMounts-all-containers-nginx-nodejs", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "baseline", - "version": "v1.24", - "exclude": [ - { - "controlName": "/proc Mount Type", - "images": [ - "nginx", - "nodejs" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "ProcMount": "Unmasked" - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "ProcMount": "Other" - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "ProcMount": "Unmasked" - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "ProcMount": "Unmasked" - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_baseline_exclude_procMounts_with_restrictedFields(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-procMounts-all-containers-nginx-nodejs" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-procMounts-all-containers-nginx-nodejs", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "baseline", - "version": "v1.24", - "exclude": [ - { - "controlName": "/proc Mount Type", - "restrictedField": "spec.containers[*].securityContext.procMount", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "Unmasked", - "Other" - ] - }, - { - "controlName": "/proc Mount Type", - "restrictedField": "spec.initContainers[*].securityContext.procMount", - "images": [ - "nginx" - ], - "values": [ - "Unmasked" - ] - }, - { - "controlName": "/proc Mount Type", - "restrictedField": "spec.ephemeralContainers[*].securityContext.procMount", - "images": [ - "nginx" - ], - "values": [ - "Unmasked" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "ProcMount": "Unmasked" - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "ProcMount": "Other" - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "ProcMount": "Unmasked" - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "ProcMount": "Unmasked" - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_baseline_exclude_procMounts_missing_exclude_value(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-procMounts-all-containers-nginx-nodejs" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-procMounts-all-containers-nginx-nodejs", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "baseline", - "version": "v1.24", - "exclude": [ - { - "controlName": "/proc Mount Type", - "restrictedField": "spec.containers[*].securityContext.procMount", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "Unmasked" - ] - }, - { - "controlName": "/proc Mount Type", - "restrictedField": "spec.initContainers[*].securityContext.procMount", - "images": [ - "nginx" - ], - "values": [ - "Unmasked" - ] - }, - { - "controlName": "/proc Mount Type", - "restrictedField": "spec.ephemeralContainers[*].securityContext.procMount", - "images": [ - "nginx" - ], - "values": [ - "Unmasked" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "ProcMount": "Unmasked" - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "ProcMount": "Other" - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "ProcMount": "Unmasked" - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "ProcMount": "Unmasked" - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -func TestValidate_pod_security_admission_enforce_baseline_exclude_procMounts_missing_exclude_RestrictedField(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-procMounts-all-containers-nginx-nodejs" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-procMounts-all-containers-nginx-nodejs", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "baseline", - "version": "v1.24", - "exclude": [ - { - "controlName": "/proc Mount Type", - "restrictedField": "spec.containers[*].securityContext.procMount", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "Unmasked", - "Other" - ] - }, - { - "controlName": "/proc Mount Type", - "restrictedField": "spec.initContainers[*].securityContext.procMount", - "images": [ - "nginx" - ], - "values": [ - "Unmasked" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "ProcMount": "Unmasked" - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "ProcMount": "Other" - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "ProcMount": "Unmasked" - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "ProcMount": "Unmasked" - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -// ====== Restricted ====== - -// === Control: "Volumes Types", check.ID: "restrictedVolumes" - -// pod-level: -// - spec.volumes[*] - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_volume_types(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Volume Types" - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "volumes": [ - { - "name": "aws-volume", - "AWSElasticBlockStore": { - "volumeID": "id", - "fsType": "ext4" - } - }, - { - "name": "gcp-volume", - "GCEPersistentDisk": { - "pdName": "my-data-disk", - "fsType": "ext4" - } - } - ], - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_volume_types_with_restrictedFields(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Volume Types", - "restrictedField": "spec.volumes[*]", - "values": [ - "spec.volumes[*].awsElasticBlockStore", - "spec.volumes[*].gcePersistentDisk" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "volumes": [ - { - "name": "aws-volume", - "AWSElasticBlockStore": { - "volumeID": "id", - "fsType": "ext4" - } - }, - { - "name": "gcp-volume", - "GCEPersistentDisk": { - "pdName": "my-data-disk", - "fsType": "ext4" - } - } - ], - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_volume_types_missing_exclude_value(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Volume Types", - "restrictedField": "spec.volumes[*]", - "values": [ - "spec.volumes[*].awsElasticBlockStore", - "spec.volumes[*].cephfs" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "volumes": [ - { - "name": "aws-volume", - "AWSElasticBlockStore": { - "volumeID": "id", - "fsType": "ext4" - } - }, - { - "name": "gcp-volume", - "GCEPersistentDisk": { - "pdName": "my-data-disk", - "fsType": "ext4" - } - } - ], - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_volume_types_missing_restrictedField(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Privilege Containers", - "images": [ - "nginx" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "volumes": [ - { - "name": "aws-volume", - "AWSElasticBlockStore": { - "volumeID": "id", - "fsType": "ext4" - } - }, - { - "name": "gcp-volume", - "GCEPersistentDisk": { - "pdName": "my-data-disk", - "fsType": "ext4" - } - } - ], - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -// === Control: "Running as Non-root user", check.ID: "runAsUser" -// pod-level: -// - spec.securityContext.runAsUser - -// container-level: -// - spec.containers[*].securityContext.runAsUser -// - spec.initContainers[*].securityContext.runAsUser -// - spec.ephemeralContainers[*].securityContext.runAsUser - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_running_as_non_root_user(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Running as Non-root user", - "images": [ - "nginx", - "nodejs" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "runAsNonRoot": true, - "runAsUser": 1, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_running_as_non_root_user_with_restrictedField(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.23", - "exclude": [ - { - "controlName": "Running as Non-root user", - "restrictedField": "spec.securityContext.runAsUser", - "values": [ - "0" - ] - }, - { - "controlName": "Running as Non-root user", - "restrictedField": "spec.containers[*].securityContext.runAsUser", - "values": [ - "0" - ], - "images": [ - "nginx", - "nodejs" - ] - }, - { - "controlName": "Running as Non-root user", - "restrictedField": "spec.initContainers[*].securityContext.runAsUser", - "values": [ - "0" - ], - "images": [ - "nginx" - ] - }, - { - "controlName": "Running as Non-root user", - "restrictedField": "spec.ephemeralContainers[*].securityContext.runAsUser", - "values": [ - "0" - ], - "images": [ - "nginx" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_running_as_non_root_user_missing_exclude_value(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.23", - "exclude": [ - { - "controlName": "Running as Non-root user", - "restrictedField": "spec.securityContext.runAsUser", - "values": [ - "0" - ] - }, - { - "controlName": "Running as Non-root user", - "restrictedField": "spec.containers[*].securityContext.runAsUser", - "values": [ - "1" - ], - "images": [ - "nginx", - "nodejs" - ] - }, - { - "controlName": "Running as Non-root user", - "restrictedField": "spec.initContainers[*].securityContext.runAsUser", - "values": [ - "0" - ], - "images": [ - "nginx", - "nodejs" - ] - }, - { - "controlName": "Running as Non-root user", - "restrictedField": "spec.ephemeralContainers[*].securityContext.runAsUser", - "values": [ - "0" - ], - "images": [ - "nginx" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - }, - { - "name": "init-nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 1, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_running_as_non_root_user_missing_restrictedField(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.23", - "exclude": [ - { - "controlName": "Running as Non-root user", - "restrictedField": "spec.securityContext.runAsUser", - "values": [ - "0" - ] - }, - { - "controlName": "Running as Non-root user", - "restrictedField": "spec.initContainers[*].securityContext.runAsUser", - "values": [ - "0" - ], - "images": [ - "nginx" - ] - }, - { - "controlName": "Running as Non-root user", - "restrictedField": "spec.ephemeralContainers[*].securityContext.runAsUser", - "values": [ - "0" - ], - "images": [ - "nginx" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "runAsUser": 0, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -// === Control: "Running as Non-root", check.ID: "runAsNonRoot" - -// pod-level: -// - spec.securityContext.runAsNonRoot - -// container-level: -// - spec.containers[*].securityContext.runAsNonRoot -// - spec.initContainers[*].securityContext.runAsNonRoot -// - spec.ephemeralContainers[*].securityContext.runAsNonRoot - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_running_as_non_root(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Running as Non-root", - "images": [ - "nginx", - "nodejs" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_running_as_non_root_with_restrictedField(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Running as Non-root", - "restrictedField": "spec.securityContext.runAsNonRoot", - "values": [ - "false" - ] - }, - { - "controlName": "Running as Non-root", - "restrictedField": "spec.containers[*].securityContext.runAsNonRoot", - "values": [ - "false" - ], - "images": [ - "nginx", - "nodejs" - ] - }, - { - "controlName": "Running as Non-root", - "restrictedField": "spec.initContainers[*].securityContext.runAsNonRoot", - "values": [ - "false" - ], - "images": [ - "nginx" - ] - }, - { - "controlName": "Running as Non-root", - "restrictedField": "spec.ephemeralContainers[*].securityContext.runAsNonRoot", - "values": [ - "false" - ], - "images": [ - "nginx" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_running_as_non_root_missing_exclude_value(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Running as Non-root", - "restrictedField": "spec.securityContext.runAsNonRoot", - "values": [ - "false" - ] - }, - { - "controlName": "Running as Non-root", - "restrictedField": "spec.containers[*].securityContext.runAsNonRoot", - "values": [ - "false" - ], - "images": [ - "nginx" - ] - }, - { - "controlName": "Running as Non-root", - "restrictedField": "spec.initContainers[*].securityContext.runAsNonRoot", - "values": [ - "false" - ], - "images": [ - "nginx" - ] - }, - { - "controlName": "Running as Non-root", - "restrictedField": "spec.ephemeralContainers[*].securityContext.runAsNonRoot", - "values": [ - "false" - ], - "images": [ - "nginx" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_running_as_non_root_missing_restrictedField(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Running as Non-root", - "restrictedField": "spec.securityContext.runAsNonRoot", - "values": [ - "false" - ] - }, - { - "controlName": "Running as Non-root", - "restrictedField": "spec.containers[*].securityContext.runAsNonRoot", - "values": [ - "false" - ], - "images": [ - "nodejs" - ] - }, - { - "controlName": "Running as Non-root", - "restrictedField": "spec.ephemeralContainers[*].securityContext.runAsNonRoot", - "values": [ - "false" - ], - "images": [ - "nginx" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": false, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -// === Control: "Seccomp", check.ID: "seccompProfile_restricted" -// pod-level: -// - spec.securityContext.seccompProfile.type - -// container-level: -// - spec.containers[*].securityContext.seccompProfile.type -// - spec.initContainers[*].securityContext.seccompProfile.type -// - spec.ephemeralContainers[*].securityContext.seccompProfile.type - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_seccomp(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Seccomp", - "images": [ - "nginx", - "nodejs" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "securityContext": { - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_seccomp_with_exclude(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Seccomp", - "restrictedField": "spec.securityContext.seccompProfile.type", - "values": [ - "Unconfined" - ] - }, - { - "controlName": "Seccomp", - "restrictedField": "spec.containers[*].securityContext.seccompProfile.type", - "values": [ - "Unconfined" - ], - "images": [ - "nginx", - "nodejs" - ] - }, - { - "controlName": "Seccomp", - "restrictedField": "spec.initContainers[*].securityContext.seccompProfile.type", - "values": [ - "Unconfined" - ], - "images": [ - "nginx" - ] - }, - { - "controlName": "Seccomp", - "restrictedField": "spec.ephemeralContainers[*].securityContext.seccompProfile.type", - "values": [ - "Unconfined" - ], - "images": [ - "nginx" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_seccomp_missing_exclude_value(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Seccomp", - "restrictedField": "spec.securityContext.seccompProfile.type", - "values": [ - "Unconfined" - ] - }, - { - "controlName": "Seccomp", - "restrictedField": "spec.containers[*].securityContext.seccompProfile.type", - "values": [ - "Unconfined" - ], - "images": [ - "nginx", - "nodejs" - ] - }, - { - "controlName": "Seccomp", - "restrictedField": "spec.initContainers[*].securityContext.seccompProfile.type", - "values": [ - "Unconfined" - ], - "images": [ - "nginxImageNotMatching" - ] - }, - { - "controlName": "Seccomp", - "restrictedField": "spec.ephemeralContainers[*].securityContext.seccompProfile.type", - "values": [ - "Unconfined" - ], - "images": [ - "nginx" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_seccomp_missing_restrictedField(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-hostProcesses-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Seccomp", - "restrictedField": "spec.securityContext.seccompProfile.type", - "values": [ - "Unconfined" - ] - }, - { - "controlName": "Seccomp", - "restrictedField": "spec.containers[*].securityContext.seccompProfile.type", - "values": [ - "Unconfined" - ], - "images": [ - "nginx", - "nodejs" - ] - }, - { - "controlName": "Seccomp", - "restrictedField": "spec.initContainers[*].securityContext.seccompProfile.type", - "values": [ - "Unconfined" - ], - "images": [ - "nginx" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - }, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "Unconfined" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -// === Control: "Privilege Escalation", check.ID: "allowPrivilegeEscalation" - -// container-level: -// - spec.containers[*].securityContext.allowPrivilegeEscalation -// - spec.initContainers[*].securityContext.allowPrivilegeEscalation -// - spec.ephemeralContainers[*].securityContext.allowPrivilegeEscalation - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_privilege_escalations(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-privilege_escalations-all-containers-nginx-nodejs" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-privilege_escalations-all-containers-nginx-nodejs", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Privilege Escalation", - "images": [ - "nginx", - "nodejs" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_privilege_escalations_with_restrictedFields(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-privilege_escalations-all-containers-nginx-nodejs" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-privilege_escalations-all-containers-nginx-nodejs", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Privilege Escalation", - "restrictedField": "spec.containers[*].securityContext.allowPrivilegeEscalation", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "true" - ] - }, - { - "controlName": "Privilege Escalation", - "restrictedField": "spec.initContainers[*].securityContext.allowPrivilegeEscalation", - "images": [ - "nginx" - ], - "values": [ - "true" - ] - }, - { - "controlName": "Privilege Escalation", - "restrictedField": "spec.ephemeralContainers[*].securityContext.allowPrivilegeEscalation", - "images": [ - "nginx" - ], - "values": [ - "true" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_privilege_escalations_missing_exclude_value(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-privilege_escalations-all-containers-nginx-nodejs" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-privilege_escalations-all-containers-nginx-nodejs", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Privilege Escalation", - "restrictedField": "spec.containers[*].securityContext.allowPrivilegeEscalation", - "images": [ - "nginx" - ], - "values": [ - "true" - ] - }, - { - "controlName": "Privilege Escalation", - "restrictedField": "spec.initContainers[*].securityContext.allowPrivilegeEscalation", - "images": [ - "nginx" - ], - "values": [ - "true" - ] - }, - { - "controlName": "Privilege Escalation", - "restrictedField": "spec.ephemeralContainers[*].securityContext.allowPrivilegeEscalation", - "images": [ - "nginx" - ], - "values": [ - "true" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_privilege_escalations_missing_restrictedField(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-baseline-exclude-all-privilege_escalations-all-containers-nginx-nodejs" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-baseline-exclude-all-privilege_escalations-all-containers-nginx-nodejs", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Privilege Escalation", - "restrictedField": "spec.initContainers[*].securityContext.allowPrivilegeEscalation", - "images": [ - "nginx" - ], - "values": [ - "true" - ] - }, - { - "controlName": "Privilege Escalation", - "restrictedField": "spec.ephemeralContainers[*].securityContext.allowPrivilegeEscalation", - "images": [ - "nginx" - ], - "values": [ - "true" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "ALL" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": true - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -// === Control: "Capabilities", check.ID: "capabilities_restricted" -// container-level: -// - spec.containers[*].securityContext.capabilities.drop -// - spec.initContainers[*].securityContext.capabilities.drop -// - spec.ephemeralContainers[*].securityContext.capabilities.drop -// - spec.containers[*].securityContext.capabilities.add -// - spec.initContainers[*].securityContext.capabilities.add -// - spec.ephemeralContainers[*].securityContext.capabilities.add - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_capabilities(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-restricted-exclude-all-capabilities-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-restricted-exclude-all-capabilities-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Capabilities", - "images": [ - "nginx", - "nodejs" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "add": [ - "SYS_TIME" - ], - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "add": [ - "SYS_TIME" - ], - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "add": [ - "SYS_TIME" - ], - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "add": [ - "SYS_TIME" - ], - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_capabilities_with_exclude_value(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-restricted-exclude-all-capabilities-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-restricted-exclude-all-capabilities-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Capabilities", - "restrictedField": "spec.containers[*].securityContext.capabilities.drop", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "SYS_ADMIN" - ] - }, - { - "controlName": "Capabilities", - "restrictedField": "spec.initContainers[*].securityContext.capabilities.drop", - "images": [ - "nginx" - ], - "values": [ - "SYS_ADMIN" - ] - }, - { - "controlName": "Capabilities", - "restrictedField": "spec.ephemeralContainers[*].securityContext.capabilities.drop", - "images": [ - "nginx" - ], - "values": [ - "SYS_ADMIN" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsSuccessful()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_capabilities_missing_exclude_value(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-restricted-exclude-all-capabilities-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-restricted-exclude-all-capabilities-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Capabilities", - "restrictedField": "spec.containers[*].securityContext.capabilities.drop", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "SYS_TIME" - ] - }, - { - "controlName": "Capabilities", - "restrictedField": "spec.initContainers[*].securityContext.capabilities.drop", - "images": [ - "nginx" - ], - "values": [ - "SYS_ADMIN" - ] - }, - { - "controlName": "Capabilities", - "restrictedField": "spec.ephemeralContainers[*].securityContext.capabilities.drop", - "images": [ - "nginx" - ], - "values": [ - "SYS_ADMIN" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - -func TestValidate_pod_security_admission_enforce_restricted_exclude_all_capabilities_missing_restrictedField(t *testing.T) { - rawPolicy := []byte(` - { - "apiVersion": "kyverno.io/v1", - "kind": "ClusterPolicy", - "metadata": { - "name": "enforce-restricted-exclude-all-capabilities-all-containers-nginx" - }, - "spec": { - "validationFailureAction": "enforce", - "rules": [ - { - "name": "enforce-restricted-exclude-all-capabilities-all-containers-nginx", - "match": { - "resources": { - "kinds": [ - "Pod" - ], - "namespaces": [ - "staging" - ] - } - }, - "validate": { - "podSecurity": { - "level": "restricted", - "version": "v1.24", - "exclude": [ - { - "controlName": "Capabilities", - "restrictedField": "spec.containers[*].securityContext.capabilities.drop", - "images": [ - "nginx", - "nodejs" - ], - "values": [ - "SYS_ADMIN" - ] - }, - { - "controlName": "Capabilities", - "restrictedField": "spec.initContainers[*].securityContext.capabilities.drop", - "images": [ - "nginx" - ], - "values": [ - "SYS_ADMIN" - ] - } - ] - } - } - } - ] - } - } - `) - - rawResource := []byte(` - { - "apiVersion": "v1", - "kind": "Pod", - "metadata": { - "name": "nginx-baseline-privileged-container", - "namespace": "staging" - }, - "spec": { - "hostNetwork": false, - "containers": [ - { - "name": "nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - }, - { - "name": "nodejs", - "image": "nodejs", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "initContainers": [ - { - "name": "init-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ], - "ephemeralContainers": [ - { - "name": "ephemeral-nginx", - "image": "nginx", - "securityContext": { - "seccompProfile": { - "type": "RuntimeDefault" - }, - "capabilities": { - "drop": [ - "SYS_ADMIN" - ] - }, - "runAsNonRoot": true, - "allowPrivilegeEscalation": false - } - } - ] - } - } - `) - - var policy kyverno.ClusterPolicy - err := json.Unmarshal(rawPolicy, &policy) - assert.NilError(t, err) - - resourceUnstructured, err := utils.ConvertToUnstructured(rawResource) - assert.NilError(t, err) - er := Validate(&PolicyContext{Policy: &policy, NewResource: *resourceUnstructured, JSONContext: context.NewContext()}) - - fmt.Println(er) - // msgs := []string{""} - - for _, r := range er.PolicyResponse.Rules { - fmt.Printf("== Response: %+v\n", r.Message) - // assert.Equal(t, r.Message, msgs[index]) - } - assert.Assert(t, er.IsFailed()) -} - func Test_block_bypass(t *testing.T) { testcases := []testCase{ { diff --git a/pkg/pss/evaluate.go b/pkg/pss/evaluate.go index bcbbb9ade1..917bd4e5f9 100644 --- a/pkg/pss/evaluate.go +++ b/pkg/pss/evaluate.go @@ -1,30 +1,14 @@ package pss import ( - "fmt" - "reflect" - "strconv" - "strings" - kyvernov1 "github.com/kyverno/kyverno/api/kyverno/v1" - enginectx "github.com/kyverno/kyverno/pkg/engine/context" - "github.com/kyverno/kyverno/pkg/utils" - "github.com/pkg/errors" corev1 "k8s.io/api/core/v1" "k8s.io/pod-security-admission/api" "k8s.io/pod-security-admission/policy" ) -func FormatChecksPrint(checks []PSSCheckResult) string { - var str string - for _, check := range checks { - str += fmt.Sprintf("(%+v)\n", check.CheckResult) - } - return str -} - // Evaluate Pod's specified containers only and get PSSCheckResults -func evaluatePSS(level *api.LevelVersion, pod *corev1.Pod) (results []PSSCheckResult) { +func evaluatePSS(level *api.LevelVersion, pod corev1.Pod) (results []pssCheckResult) { checks := policy.DefaultChecks() for _, check := range checks { @@ -34,12 +18,12 @@ func evaluatePSS(level *api.LevelVersion, pod *corev1.Pod) (results []PSSCheckRe // check version for _, versionCheck := range check.Versions { checkResult := versionCheck.CheckPod(&pod.ObjectMeta, &pod.Spec) - // Append only if the checkResult is not already in PSSCheckResults + // Append only if the checkResult is not already in pssCheckResult if !checkResult.Allowed { - results = append(results, PSSCheckResult{ - ID: check.ID, - CheckResult: checkResult, - RestrictedFields: getRestrictedFields(check), + results = append(results, pssCheckResult{ + id: check.ID, + checkResult: checkResult, + restrictedFields: getRestrictedFields(check), }) } } @@ -47,322 +31,73 @@ func evaluatePSS(level *api.LevelVersion, pod *corev1.Pod) (results []PSSCheckRe return results } -// When we specify the controlName only we want to exclude all restrictedFields for this control. -// Remove all PSSChecks related to this control -func trimExemptedChecks(pssChecks []PSSCheckResult, rule *kyvernov1.PodSecurity) []PSSCheckResult { - // Keep in memory the number of checks that have been removed - // to avoid panics when removing a new check. - removedChecks := 0 - for checkIndex, check := range pssChecks { - for _, exclude := range rule.Exclude { - // Translate PSS control to check_id and remove it from PSSChecks if it's specified in exclude block - for _, CheckID := range PSS_controls_to_check_id[exclude.ControlName] { - if check.ID == CheckID && exclude.RestrictedField == "" && checkIndex <= len(pssChecks) { - index := checkIndex - removedChecks - pssChecks = append(pssChecks[:index], pssChecks[index+1:]...) - removedChecks++ - } +func exemptKyvernoExclusion(defaultCheckResults, excludeCheckResults []pssCheckResult, exclude kyvernov1.PodSecurityStandard) []pssCheckResult { + defaultCheckResultsMap := make(map[string]pssCheckResult, len(defaultCheckResults)) + + for _, result := range defaultCheckResults { + defaultCheckResultsMap[result.id] = result + } + + for _, excludeResult := range excludeCheckResults { + for _, checkID := range PSS_controls_to_check_id[exclude.ControlName] { + if excludeResult.id == checkID { + delete(defaultCheckResultsMap, checkID) } } } - return pssChecks + + var newDefaultCheckResults []pssCheckResult + for _, result := range defaultCheckResultsMap { + newDefaultCheckResults = append(newDefaultCheckResults, result) + } + + return newDefaultCheckResults } -func forbiddenValuesExempted(ctx enginectx.Interface, pod *corev1.Pod, check PSSCheckResult, exclude kyvernov1.PodSecurityStandard, restrictedField string) (bool, error) { - if err := enginectx.AddJSONObject(ctx, pod); err != nil { - return false, errors.Wrap(err, "failed to add podSpec to engine context") +func parseVersion(rule *kyvernov1.PodSecurity) (*api.LevelVersion, error) { + // Get pod security admission version + var apiVersion api.Version + + // Version set to "latest" by default + if rule.Version == "" || rule.Version == "latest" { + apiVersion = api.LatestVersion() + } else { + parsedApiVersion, err := api.ParseVersion(rule.Version) + if err != nil { + return nil, err + } + apiVersion = api.MajorMinorVersion(parsedApiVersion.Major(), parsedApiVersion.Minor()) } - value, err := ctx.Query(restrictedField) + return &api.LevelVersion{ + Level: rule.Level, + Version: apiVersion, + }, nil +} + +// EvaluatePod applies PSS checks to the pod and exempts controls specified in the rule +func EvaluatePod(rule *kyvernov1.PodSecurity, pod *corev1.Pod) (bool, []pssCheckResult, error) { + level, err := parseVersion(rule) if err != nil { - return false, errors.Wrap(err, fmt.Sprintf("failed to query value with the given path %s", exclude.RestrictedField)) + return false, nil, err } - if !allowedValues(value, exclude, PSS_controls[check.ID]) { - return false, nil - } - return true, nil -} -func checkContainer(ctx enginectx.Interface, pod *corev1.Pod, check PSSCheckResult, exclude []kyvernov1.PodSecurityStandard, restrictedField restrictedField, containerName string, containerTypePrefix string) (bool, error) { - matchedOnce := false - // Container.Name with double quotes - formatedContainerName := fmt.Sprintf(`"%s"`, containerName) - if !strings.Contains(check.CheckResult.ForbiddenDetail, formatedContainerName) { - return true, nil - } - for _, exclude := range exclude { - if !strings.Contains(exclude.RestrictedField, containerTypePrefix) { - continue - } + defaultCheckResults := evaluatePSS(level, *pod) - // Get values of this container only. - // spec.containers[*].securityContext.privileged -> spec.containers[?name=="nginx"].securityContext.privileged - newRestrictedField := strings.Replace(restrictedField.path, "*", fmt.Sprintf(`?name=='%s'`, containerName), 1) - - // No need to check if exclude.Images contains container.Image - // Since we only have containers matching the exclude.images with getPodWithMatchingContainers() - exempted, err := forbiddenValuesExempted(ctx, pod, check, exclude, newRestrictedField) - if err != nil || !exempted { - return false, nil - } - matchedOnce = true - } - // If container name is in check.Forbidden but isn't exempted by an exclude then pod creation is forbidden - if strings.Contains(check.CheckResult.ForbiddenDetail, formatedContainerName) && !matchedOnce { - return false, nil - } - return true, nil -} - -func checkContainerLevelFields(ctx enginectx.Interface, pod *corev1.Pod, check PSSCheckResult, exclude []kyvernov1.PodSecurityStandard, restrictedField restrictedField) (bool, error) { - if strings.Contains(restrictedField.path, "spec.containers[*]") { - for _, container := range pod.Spec.Containers { - allowed, err := checkContainer(ctx, pod, check, exclude, restrictedField, container.Name, "spec.containers[*]") - if err != nil || !allowed { - return false, nil - } - } - } - if strings.Contains(restrictedField.path, "spec.initContainers[*]") { - for _, container := range pod.Spec.InitContainers { - allowed, err := checkContainer(ctx, pod, check, exclude, restrictedField, container.Name, "spec.initContainers[*]") - if err != nil || !allowed { - return false, nil - } - } - } - if strings.Contains(restrictedField.path, "spec.ephemeralContainers[*]") { - for _, container := range pod.Spec.EphemeralContainers { - allowed, err := checkContainer(ctx, pod, check, exclude, restrictedField, container.Name, "spec.ephemeralContainers[*]") - if err != nil || !allowed { - return false, nil - } - } - } - return true, nil -} - -func checkHostNamespacesControl(check PSSCheckResult, restrictedField string) bool { - hostNamespace := strings.Trim(restrictedField, "spec.") - return strings.Contains(check.CheckResult.ForbiddenDetail, hostNamespace) -} - -func checkPodLevelFields(ctx enginectx.Interface, pod *corev1.Pod, check PSSCheckResult, rule *kyvernov1.PodSecurity, restrictedField restrictedField) (bool, error) { - // Specific checks for controls with multiple pod-level restrictedFields - // TO DO: SELinux control - if check.ID == "hostNamespaces" { - if !checkHostNamespacesControl(check, restrictedField.path) { - return true, nil - } - } - matchedOnce := false for _, exclude := range rule.Exclude { - if !strings.Contains(exclude.RestrictedField, restrictedField.path) { - continue - } + spec, matching := getPodWithMatchingContainers(exclude, pod) - exempted, err := forbiddenValuesExempted(ctx, pod, check, exclude, exclude.RestrictedField) - if err != nil || !exempted { - return false, nil + switch { + // exclude pod level checks + case spec != nil: + excludeCheckResults := evaluatePSS(level, *spec) + defaultCheckResults = exemptKyvernoExclusion(defaultCheckResults, excludeCheckResults, exclude) + + // exclude container level checks + default: + excludeCheckResults := evaluatePSS(level, *matching) + defaultCheckResults = exemptKyvernoExclusion(defaultCheckResults, excludeCheckResults, exclude) } - matchedOnce = true } - if !matchedOnce { - return false, nil - } - return true, nil -} - -func exemptProfile(checks []PSSCheckResult, rule *kyvernov1.PodSecurity, pod *corev1.Pod) (bool, error) { - ctx := enginectx.NewContext() - - // 1. Iterate over check.RestrictedFields - // 2. Check if it's a `container-level` or `pod-level` restrictedField - // - `container-level`: container has a disallowed check (container name in check.ForbiddenDetail) && exempted by an exclude rule ? continue : pod creation is forbbiden - // - `pod-level`: Exempted by an exclude rule ? good : pod creation is forbbiden - for _, check := range checks { - for _, restrictedField := range check.RestrictedFields { - // Is a container-level restrictedField - - // RestrictedField.path can contain: - // - containers[*] - // - initContainers[*] - // - ephemeralContainers[*] - // So we check if it contains `ontainers[*]` to know if there is a CheckResult related to containers. - if strings.Contains(restrictedField.path, "ontainers[*]") { - allowed, err := checkContainerLevelFields(ctx, pod, check, rule.Exclude, restrictedField) - if err != nil { - return false, errors.Wrap(err, err.Error()) - } - if !allowed { - return false, nil - } - } else { - // Is a pod-level restrictedField - if !strings.HasPrefix(check.CheckResult.ForbiddenDetail, "pod") && containsContainerLevelControl(check.RestrictedFields) { - continue - } - allowed, err := checkPodLevelFields(ctx, pod, check, rule, restrictedField) - if err != nil { - return false, errors.Wrap(err, err.Error()) - } - if !allowed { - return false, nil - } - } - } - } - return true, nil -} - -// Check if the pod creation is allowed after exempting some PSS controls -func EvaluatePod(rule *kyvernov1.PodSecurity, pod *corev1.Pod, level *api.LevelVersion) (bool, []PSSCheckResult, error) { - // 1. Evaluate containers that match images specified in exclude - podWithMatchingContainers := getPodWithMatchingContainers(rule.Exclude, pod) - pssChecks := evaluatePSS(level, &podWithMatchingContainers) - pssChecks = trimExemptedChecks(pssChecks, rule) - - // 2. Check if all PSSCheckResults are exempted by exclude values - allowed, err := exemptProfile(pssChecks, rule, &podWithMatchingContainers) - if err != nil { - return false, pssChecks, err - } - // Good to have: remove checks that are exempted and return only forbidden ones - if !allowed { - return false, pssChecks, nil - } - - // 3. Check the remaining containers - podWithNotMatchingContainers := getPodWithNotMatchingContainers(rule.Exclude, pod, &podWithMatchingContainers) - pssChecks = evaluatePSS(level, &podWithNotMatchingContainers) - if len(pssChecks) > 0 { - return false, pssChecks, nil - } - return true, pssChecks, nil -} - -func appendAllowedValues(controls []restrictedField, exclude *kyvernov1.PodSecurityStandard) { - for _, control := range controls { - if control.path == exclude.RestrictedField { - for _, allowedValue := range control.allowedValues { - switch v := allowedValue.(type) { - case string: - if !utils.ContainsString(exclude.Values, v) { - exclude.Values = append(exclude.Values, v) - } - } - } - } - } -} - -func allowedValuesSlice(excludeValues []interface{}, exclude kyvernov1.PodSecurityStandard) bool { - for _, values := range excludeValues { - v := reflect.TypeOf(values) - switch v.Kind() { - case reflect.Slice: - for _, value := range values.([]interface{}) { - if reflect.TypeOf(value).Kind() == reflect.Float64 { - if !utils.ContainsString(exclude.Values, fmt.Sprintf("%.f", value)) { - return false - } - } else if reflect.TypeOf(value).Kind() == reflect.String { - if !utils.ContainsString(exclude.Values, value.(string)) { - return false - } - } - } - case reflect.Map: - for key, value := range values.(map[string]interface{}) { - if exclude.RestrictedField == "spec.volumes[*]" { - if key == "name" { - continue - } - matchedOnce := false - for _, excludeValue := range exclude.Values { - // Remove `spec.volumes[*].` prefix - if strings.TrimPrefix(excludeValue, "spec.volumes[*].") == key { - matchedOnce = true - } - } - if !matchedOnce { - return false - } - } - // "HostPath volume" control: check the path of the hostPath volume since the type is optional - // volumes: - // - name: test-volume - // hostPath: - // # directory location on host - // path: /data <--- Check the path - // # this field is optional - // type: Directory - if exclude.RestrictedField == "spec.volumes[*].hostPath" { - if key != "path" { - continue - } - if !utils.ContainsString(exclude.Values, value.(string)) { - return false - } - } - } - case reflect.String: - if !utils.ContainsString(exclude.Values, values.(string)) { - return false - } - - case reflect.Bool: - if !utils.ContainsString(exclude.Values, strconv.FormatBool(values.(bool))) { - return false - } - case reflect.Float64: - if !utils.ContainsString(exclude.Values, fmt.Sprintf("%.f", values)) { - return false - } - } - } - return true -} - -func allowedValues(resourceValue interface{}, exclude kyvernov1.PodSecurityStandard, controls []restrictedField) bool { - appendAllowedValues(controls, &exclude) - - v := reflect.TypeOf(resourceValue) - switch v.Kind() { - case reflect.Bool: - if !utils.ContainsString(exclude.Values, strconv.FormatBool(resourceValue.(bool))) { - return false - } - return true - case reflect.String: - if !utils.ContainsString(exclude.Values, resourceValue.(string)) { - return false - } - return true - case reflect.Float64: - if !utils.ContainsString(exclude.Values, fmt.Sprintf("%.f", resourceValue)) { - return false - } - return true - case reflect.Map: - // `AppArmor` control - for key, value := range resourceValue.(map[string]interface{}) { - if !strings.Contains(key, "container.apparmor.security.beta.kubernetes.io/") { - continue - } - // For allowed value: "localhost/*" - if strings.Contains(value.(string), "localhost/") { - continue - } - if !utils.ContainsString(exclude.Values, value.(string)) { - return false - } - } - return true - case reflect.Slice: - exempted := allowedValuesSlice(resourceValue.([]interface{}), exclude) - if !exempted { - return false - } - } - return true + + return len(defaultCheckResults) == 0, defaultCheckResults, nil } diff --git a/pkg/pss/evaluate_test.go b/pkg/pss/evaluate_test.go new file mode 100644 index 0000000000..67c1d7f369 --- /dev/null +++ b/pkg/pss/evaluate_test.go @@ -0,0 +1,5188 @@ +package pss + +import ( + "encoding/json" + "fmt" + "testing" + + kyvernov1 "github.com/kyverno/kyverno/api/kyverno/v1" + "gotest.tools/assert" + corev1 "k8s.io/api/core/v1" +) + +func Test_EvaluatePod(t *testing.T) { + testCases := []testCase{} + tests := [][]testCase{ + baseline_hostProcess, + baseline_host_namespaces, + baseline_privileged, + baseline_capabilities, + baseline_hostPath_volumes, + baseline_host_ports, + baseline_appArmor, + baseline_seLinux, + baseline_procMount, + baseline_seccompProfile, + baseline_sysctls, + restricted_volume_types, + restricted_privilege_escalation, + restricted_runAsNonRoot, + restricted_runAsUser, + restricted_seccompProfile, + restricted_capabilities, + wildcard_images, + } + + for _, test := range tests { + testCases = append(testCases, test...) + } + + for _, test := range testCases { + var pod corev1.Pod + err := json.Unmarshal(test.rawPod, &pod) + assert.NilError(t, err) + + var rule kyvernov1.PodSecurity + err = json.Unmarshal(test.rawRule, &rule) + assert.NilError(t, err) + + allowed, checkResults, err := EvaluatePod(&rule, &pod) + assert.Assert(t, err == nil) + + if allowed != test.allowed { + for _, result := range checkResults { + fmt.Printf("failed check result: %v\n", result) + } + } + assert.Assert(t, allowed == test.allowed, fmt.Sprintf("test \"%s\" fails", test.name)) + } +} + +var baseline_hostProcess = []testCase{ + { + name: "baseline_hostProcess_defines_all_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostProcess", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "windowsOptions": { + "hostProcess": false + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "windowsOptions": { + "hostProcess": true + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_hostProcess_defines_all_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostProcess", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "windowsOptions": { + "hostProcess": false + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "windowsOptions": { + "hostProcess": false + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_hostProcess_defines_container_only_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostProcess", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "windowsOptions": { + "hostProcess": true + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_hostProcess_defines_container_only_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostProcess", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "windowsOptions": { + "hostProcess": false + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_hostProcess_defines_spec_only_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostProcess" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "windowsOptions": { + "hostProcess": true + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx:1.2.3" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_hostProcess_defines_spec_only_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostProcess" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "windowsOptions": { + "hostProcess": false + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx:1.2.3" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_hostProcess_defines_none", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostProcess" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx:1.2.3" + } + ] + } + }`), + allowed: true, + }, +} + +var baseline_host_namespaces = []testCase{ + { + name: "baseline_host_namespaces_hostNetwork_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Host Namespaces" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "hostNetwork": true, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_host_namespaces_hostNetwork_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Host Namespaces" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "hostNetwork": false, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_host_namespaces_hostNetwork_undefined", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Host Namespaces" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_host_namespaces_hostPID_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Host Namespaces" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "hostPID": true, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_host_namespaces_hostPID_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Host Namespaces" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "hostPID": false, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_host_namespaces_hostPID_undefined", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Host Namespaces" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_host_namespaces_hostIPC_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Host Namespaces" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "hostIPC": true, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_host_namespaces_hostIPC_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Host Namespaces", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "hostIPC": false, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_host_namespaces_hostIPC_undefined", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Host Namespaces", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, +} + +var baseline_privileged = []testCase{ + { + name: "baseline_privileged_defines_container_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privileged Containers", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "privileged": true + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_privileged_defines_container_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privileged Containers", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "privileged": false + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_privileged_defines_container_none", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privileged Containers", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_privileged_defines_container_violate_true_skip", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privileged Containers", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx:1.2.3", + "securityContext": { + "privileged": true + } + } + ] + } + }`), + allowed: false, + }, + { + name: "baseline_privileged_defines_initContainer_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privileged Containers", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "privileged": false + } + } + ], + "initContainers": [ + { + "name": "nginx-init", + "image": "nginx", + "securityContext": { + "privileged": true + } + } + ] + } + }`), + allowed: true, + }, +} + +var baseline_capabilities = []testCase{ + { + name: "baseline_capabilities_defines_container_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Capabilities", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "capabilities": { + "add": [ + "FAKE_VALUE" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_capabilities_defines_container_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Capabilities", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "capabilities": { + "add": [ + "KILL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_capabilities_defines_container_none", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Capabilities", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_capabilities_defines_ephemeralContainers_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Capabilities", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ], + "ephemeralContainers": [ + { + "name": "nginx-ephemeral", + "image": "nginx", + "securityContext": { + "capabilities": { + "add": [ + "FAKE_VALUE" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_capabilities_defines_ephemeralContainers_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Capabilities", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ], + "ephemeralContainers": [ + { + "name": "nginx-ephemeral", + "image": "nginx", + "securityContext": { + "capabilities": { + "add": [ + "KILL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_capabilities_defines_ephemeralContainers_none", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Capabilities", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ], + "ephemeralContainers": [ + { + "name": "nginx-ephemeral", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_capabilities_not_match", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ], + "ephemeralContainers": [ + { + "name": "nginx-ephemeral", + "image": "nginx" + } + ] + } + }`), + allowed: false, + }, +} + +var baseline_hostPath_volumes = []testCase{ + { + name: "baseline_hostPath_volumes_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostPath Volumes" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ], + "volumes": [ + { + "hostPath": { + "path": "/var/lib1" + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_hostPath_volumes_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostPath Volumes" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_hostPath_volumes_not_match", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privileged Containers", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ], + "volumes": [ + { + "hostPath": { + "path": "/var/lib1" + } + } + ] + } + }`), + allowed: false, + }, +} + +var baseline_host_ports = []testCase{ + { + name: "baseline_host_ports_defines_0", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Host Ports" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "ports": [ + { + "hostPort": 0 + } + ] + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_host_ports_defines_non_zero", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Host Ports", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "ports": [ + { + "hostPort": 1000 + } + ] + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_host_ports_undefined", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Host Ports", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, +} + +var baseline_appArmor = []testCase{ + { + name: "baseline_appArmor_undefined", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "AppArmor" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_appArmor_defines_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "AppArmor" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test", + "annotations": { + "container.apparmor.security.beta.kubernetes.io/kyverno.test": "fake_value" + } + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_appArmor_defines_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "AppArmor" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test", + "annotations": { + "container.apparmor.security.beta.kubernetes.io/kyverno.test": "runtime/default" + } + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_appArmor_not_match_block", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostPath Volumes" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test", + "annotations": { + "container.apparmor.security.beta.kubernetes.io/kyverno.test": "fake_value" + } + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: false, + }, + { + name: "baseline_appArmor_not_match_pass", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostPath Volumes" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test", + "annotations": { + "container.apparmor.security.beta.kubernetes.io/kyverno.test": "localhost/default" + } + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, +} + +var baseline_seLinux = []testCase{ + { + name: "baseline_seLinux_type_defines_all_violate_true_1", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "SELinux", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seLinuxOptions": { + "type": "fake_value" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seLinuxOptions": { + "type": "fake_value" + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seLinux_type_defines_all_violate_true_2", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "SELinux" + } + ] + }`), + + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seLinuxOptions": { + "type": "fake_value" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seLinuxOptions": { + "type": "fake_value" + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seLinux_type_defines_all_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "SELinux", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seLinuxOptions": { + "type": "container_t" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seLinuxOptions": { + "type": "container_t" + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seLinux_type_defines_container_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "SELinux", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seLinuxOptions": { + "type": "fake_value" + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seLinux_type_defines_container_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "SELinux", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seLinuxOptions": { + "type": "container_t" + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seLinux_type_defines_spec_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "SELinux" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seLinuxOptions": { + "type": "fake_value" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seLinux_type_defines_spec_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "SELinux" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seLinuxOptions": { + "type": "container_t" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seLinux_type_not_match_pass", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostPath Volumes" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seLinuxOptions": { + "type": "container_t" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seLinux_type_not_match_block", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostPath Volumes" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seLinuxOptions": { + "type": "fake_value" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: false, + }, + { + name: "baseline_seLinux_type_container_not_match_pass", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Host Ports", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seLinuxOptions": { + "type": "container_t" + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seLinux_type_container_not_match_block", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Host Ports", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seLinuxOptions": { + "type": "fake_value" + } + } + } + ] + } + }`), + allowed: false, + }, + { + name: "baseline_seLinux_type_defines_none", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "SELinux" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seLinux_user_defines_spec_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "SELinux" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seLinuxOptions": { + "user": "fake_value" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seLinux_role_defines_container_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "SELinux", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seLinuxOptions": { + "role": "fake_value" + } + } + } + ] + } + }`), + allowed: true, + }, +} + +var baseline_procMount = []testCase{ + { + name: "baseline_procMount_undefined", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "/proc Mount Type", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_procMount_defines_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "/proc Mount Type", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "procMount": "fakeValue" + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_procMount_defines_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "/proc Mount Type", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "procMount": "Default" + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_procMount_not_match_pass", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privileged Containers", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "procMount": "Default" + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_procMount_not_match_block", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privileged Containers", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "procMount": "fakeValue" + } + } + ] + } + }`), + allowed: false, + }, +} + +var baseline_seccompProfile = []testCase{ + { + name: "baseline_seccompProfile_defines_all_violate_true_1", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Seccomp", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seccompProfile": { + "type": "fake" + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seccompProfile_defines_all_violate_true_2", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Seccomp" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "fake" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seccompProfile_defines_all_violate_false_1", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Seccomp", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seccompProfile_defines_all_violate_false_2", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Seccomp" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seccompProfile_defines_container_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Seccomp", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seccompProfile": { + "type": "fake" + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seccompProfile_defines_container_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Seccomp", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seccompProfile_defines_spec_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Seccomp" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "fake" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_seccompProfile_defines_spec_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Seccomp" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, +} + +var baseline_sysctls = []testCase{ + { + name: "baseline_sysctls_undefined", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Sysctls" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_sysctls_defines_violate_true", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Sysctls" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "sysctls": [ + { + "name": "fake.value" + } + ] + }, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_sysctls_defines_violate_false", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Sysctls" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "sysctls": [ + { + "name": "kernel.shm_rmid_forced" + } + ] + }, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_sysctls_not_match_pass", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Seccomp" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "sysctls": [ + { + "name": "kernel.shm_rmid_forced" + } + ] + }, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: true, + }, + { + name: "baseline_sysctls_not_match_block", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Seccomp" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "sysctls": [ + { + "name": "fake.value" + } + ] + }, + "containers": [ + { + "name": "nginx", + "image": "nginx" + } + ] + } + }`), + allowed: false, + }, +} + +var restricted_volume_types = []testCase{ + { + name: "restricted_volume_types_undefined", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Volume Types" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": true, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_volume_types_not_match_block", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": true, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ], + "volumes": [ + { + "name": "test-volume", + "awsElasticBlockStore": null, + "volumeID": "", + "fsType": "ext4" + } + ] + } + }`), + allowed: false, + }, + { + name: "restricted_volume_types_defines_violate_true", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Volume Types" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": true, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ], + "volumes": [ + { + "name": "test-volume", + "awsElasticBlockStore": null, + "volumeID": "", + "fsType": "ext4" + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_volume_types_defines_violate_false", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Volume Types" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": true, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ], + "volumes": [ + { + "emptyDir": {} + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_volume_types_defines_violate_false_not_match_pass", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostPath Volumes" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": true, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ], + "volumes": [ + { + "emptyDir": {} + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_volume_types_defines_violate_true_not_match_block", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "HostPath Volumes" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": true, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ], + "volumes": [ + { + "hostPath": { + "path": "/var/lib1" + } + } + ] + } + }`), + allowed: false, + }, +} + +var restricted_privilege_escalation = []testCase{ + { + name: "restricted_privilege_escalation_undefined", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privilege Escalation", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": true, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_privilege_escalation_undefined_not_match_block", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": true, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: false, + }, + { + name: "restricted_privilege_escalation_defines_container_violate_true", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privilege Escalation", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": true, + "runAsNonRoot": true, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + + { + name: "restricted_privilege_escalation_defines_container_violate_false", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privilege Escalation", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "runAsNonRoot": true, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + + { + name: "restricted_privilege_escalation_defines_init_container_violate_true", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privilege Escalation", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "runAsNonRoot": true, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ], + "initContainers": [ + { + "name": "nginx-init", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": true, + "runAsNonRoot": true, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + + { + name: "restricted_privilege_escalation_defines_init_container_violate_false", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privilege Escalation", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "runAsNonRoot": true, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ], + "initContainers": [ + { + "name": "nginx-init", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "runAsNonRoot": true, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + + { + name: "restricted_privilege_escalation_defines_init_container_violate_true_not_match_block", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "runAsNonRoot": true, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ], + "initContainers": [ + { + "name": "nginx-init", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": true, + "runAsNonRoot": true, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: false, + }, +} + +var restricted_runAsNonRoot = []testCase{ + { + name: "restricted_runAsNonRoot_defines_all_violate_spec_true_container_false", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root" + } + ] + }`), + rawPod: []byte(`{ + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": false, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": true, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsNonRoot_defines_all_violate_spec_false_container_false", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root" + } + ] + }`), + rawPod: []byte(`{ + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": true, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsNonRoot_defines_all_violate_spec_true_container_true_spec_level", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root" + } + ] + }`), + rawPod: []byte(`{ + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": false, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": false, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsNonRoot_defines_all_violate_spec_false_container_true_spec_level", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root" + } + ] + }`), + rawPod: []byte(`{ + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": false, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: false, + }, + { + name: "restricted_runAsNonRoot_defines_all_violate_spec_true_container_false_container_level", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(`{ + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": false, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": true, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: false, + }, + { + name: "restricted_runAsNonRoot_defines_all_violate_spec_true_container_true_container_level", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(`{ + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": false, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsNonRoot_defines_all_violate_spec_false_container_true_container_level", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(`{ + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": false, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsNonRoot_defines_all_violate_spec_false_container_false_container_level", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(`{ + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": true, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsNonRoot_defines_container_only_violate_true", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(`{ + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": false, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsNonRoot_defines_container_only_violate_false", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(`{ + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsNonRoot": true, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsNonRoot_defines_spec_only_violate_true", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": false, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsNonRoot_defines_spec_only_violate_false", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsNonRoot_defines_spec_violate_true_not_match", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privilege Escalation" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": false, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: false, + }, + { + name: "restricted_runAsNonRoot_defines_none", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsNonRoot_defines_none_not_match", + rawRule: []byte(`{ + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privilege Escalation", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: false, + }, +} + +var restricted_runAsUser = []testCase{ + { + name: "restricted_runAsUser_defines_all_violate_true_spec_level", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root user" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsUser": 0, + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsUser": 1000, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsUser_defines_all_violate_false_spec_level", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root user" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsUser": 1000, + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsUser": 1000, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsUser_defines_all_violate_true_container_level", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root user", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsUser": 1000, + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsUser": 0, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsUser_defines_all_violate_false_container_level", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root user", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsUser": 1000, + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsUser": 1000, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsUser_defines_container_violate_true", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root user", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsUser": 0, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsUser_defines_container_violate_false", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root user", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "runAsUser": 1000, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsUser_defines_spec_violate_true", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root user" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsUser": 0, + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsUser_defines_spec_violate_false", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root user" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsUser": 1000, + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsUser_defines_none", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root user" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_runAsUser_defines_spec_violate_true_not_match", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsUser": 0, + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: false, + }, +} + +var restricted_seccompProfile = []testCase{ + { + name: "restricted_seccompProfile_defines_container_violate_true", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Seccomp", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "seccompProfile": { + "type": "fakeValue" + }, + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_seccompProfile_defines_spec_violate_true", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Seccomp" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "fakeValue" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_seccompProfile_undefined", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Seccomp", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_seccompProfile_undefined_spec_level", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Seccomp" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_seccompProfile_undefined_not_match_block", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Running as Non-root user" + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: false, + }, +} + +var restricted_capabilities = []testCase{ + { + name: "restricted_capabilities_drop_undefined", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Capabilities", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_capabilities_drop_defines_violate_true", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Capabilities", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "KILL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_capabilities_drop_defines_violate_false", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Capabilities", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_capabilities_add_undefined", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Capabilities", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_capabilities_add_undefined_not_match_block", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privilege Escalation", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false + } + } + ] + } + }`), + allowed: false, + }, + { + name: "restricted_capabilities_add_undefined_not_match_pass", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privilege Escalation", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "drop": [ + "ALL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_capabilities_add_defines_violate_true", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Capabilities", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "add": [ + "KILL" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_capabilities_add_defines_violate_false", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Capabilities", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "add": [ + "NET_BIND_SERVICE" + ] + } + } + } + ] + } + }`), + allowed: true, + }, + { + name: "restricted_capabilities_add_defines_violate_true_not_match_block", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privilege Escalation", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "add": [ + "KILL" + ] + } + } + } + ] + } + }`), + allowed: false, + }, + { + name: "restricted_capabilities_add_defines_violate_false_not_match_pass", + rawRule: []byte(` + { + "level": "restricted", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privilege Escalation", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "securityContext": { + "runAsNonRoot": true, + "seccompProfile": { + "type": "RuntimeDefault" + } + }, + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "allowPrivilegeEscalation": false, + "capabilities": { + "add": [ + "NET_BIND_SERVICE" + ] + } + } + } + ] + } + }`), + allowed: false, + }, +} + +var wildcard_images = []testCase{ + { + name: "wildcard_images_violate_true_image_not_match", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privileged Containers", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx:1.2.3", + "securityContext": { + "privileged": true + } + } + ] + } + }`), + allowed: false, + }, + { + name: "wildcard_images_violate_true_image_match", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privileged Containers", + "images": [ + "nginx" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx", + "securityContext": { + "privileged": true + } + } + ] + } + }`), + allowed: true, + }, + { + name: "wildcard_images_violate_true_image_match_wildcard", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privileged Containers", + "images": [ + "nginx:*" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "nginx:1.2.3", + "securityContext": { + "privileged": true + } + } + ] + } + }`), + allowed: true, + }, + { + name: "wildcard_images_violate_true_image_not_match_wildcard", + rawRule: []byte(` + { + "level": "baseline", + "version": "v1.24", + "exclude": [ + { + "controlName": "Privileged Containers", + "images": [ + "nginx*" + ] + } + ] + }`), + rawPod: []byte(` + { + "kind": "Pod", + "metadata": { + "name": "test" + }, + "spec": { + "containers": [ + { + "name": "nginx", + "image": "busybox", + "securityContext": { + "privileged": true + } + } + ] + } + }`), + allowed: false, + }, +} + +type testCase struct { + name string + rawRule []byte + rawPod []byte + allowed bool +} diff --git a/pkg/pss/mapping.go b/pkg/pss/mapping.go index 9827ea17c0..11269cfdae 100644 --- a/pkg/pss/mapping.go +++ b/pkg/pss/mapping.go @@ -7,10 +7,10 @@ type restrictedField struct { allowedValues []interface{} } -type PSSCheckResult struct { - ID string - CheckResult policy.CheckResult - RestrictedFields []restrictedField +type pssCheckResult struct { + id string + checkResult policy.CheckResult + restrictedFields []restrictedField } // Translate PSS control to CheckResult.ID so that we can use PSS control in Kyverno policy @@ -18,10 +18,12 @@ type PSSCheckResult struct { // For CheckResult.ID see: https://github.com/kubernetes/pod-security-admission/tree/master/policy var PSS_controls_to_check_id = map[string][]string{ // Controls with 2 different controls for each level + // container-level control "Capabilities": { "capabilities_baseline", "capabilities_restricted", }, + // Container and Pod-level control "Seccomp": { "seccompProfile_baseline", "seccompProfile_restricted", @@ -38,9 +40,6 @@ var PSS_controls_to_check_id = map[string][]string{ "/proc Mount Type": { "procMount", }, - "procMount": { - "hostPorts", - }, // Container and pod-level controls "HostProcess": { @@ -67,10 +66,10 @@ var PSS_controls_to_check_id = map[string][]string{ }, // === Restricted - // Container and pod-level controls "Privilege Escalation": { "allowPrivilegeEscalation", }, + // Container and pod-level controls "Running as Non-root": { "runAsNonRoot", }, diff --git a/pkg/pss/utils.go b/pkg/pss/utils.go index 2af4a77fa7..49cd0f83eb 100644 --- a/pkg/pss/utils.go +++ b/pkg/pss/utils.go @@ -1,125 +1,51 @@ package pss import ( - "strings" + "fmt" kyvernov1 "github.com/kyverno/kyverno/api/kyverno/v1" "github.com/kyverno/kyverno/pkg/utils" corev1 "k8s.io/api/core/v1" + metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/pod-security-admission/policy" ) -func containsContainer(containers interface{}, containerName string) bool { - switch v := containers.(type) { - case []interface{}: - for _, container := range v { - switch v := container.(type) { - case corev1.Container: - if v.Name == containerName { - return true - } - case corev1.EphemeralContainer: - if v.Name == containerName { - return true - } - } - } - case []corev1.Container: - for _, container := range v { - if container.Name == containerName { - return true - } - } - case []corev1.EphemeralContainer: - for _, container := range v { - if container.Name == containerName { - return true - } - } +// getPodWithMatchingContainers extracts matching container/pod info by the given exclude rule +// and returns pod manifests containing spec and container info respectively +func getPodWithMatchingContainers(exclude kyvernov1.PodSecurityStandard, pod *corev1.Pod) (podSpec, matching *corev1.Pod) { + if len(exclude.Images) == 0 { + podSpec = pod.DeepCopy() + podSpec.Spec.Containers = []corev1.Container{{Name: "fake"}} + podSpec.Spec.InitContainers = nil + podSpec.Spec.EphemeralContainers = nil + return podSpec, nil } - return false -} - -// Get copy of pod with containers (containers, initContainers, ephemeralContainers) matching the exclude.image -func getPodWithMatchingContainers(exclude []kyvernov1.PodSecurityStandard, pod *corev1.Pod) (podCopy corev1.Pod) { - podCopy = *pod - podCopy.Spec.Containers = []corev1.Container{} - podCopy.Spec.InitContainers = []corev1.Container{} - podCopy.Spec.EphemeralContainers = []corev1.EphemeralContainer{} + matchingImages := exclude.Images + matching = &corev1.Pod{ + ObjectMeta: metav1.ObjectMeta{ + Name: pod.GetName(), + Namespace: pod.GetNamespace(), + }, + } for _, container := range pod.Spec.Containers { - for _, excludeRule := range exclude { - // Ignore all restrictedFields when we only specify the `controlName` with no `restrictedField` - controlNameOnly := excludeRule.RestrictedField == "" - if !utils.ContainsString(excludeRule.Images, container.Image) { - continue - } - if strings.Contains(excludeRule.RestrictedField, "spec.containers[*]") || controlNameOnly { - // Add to matchingContainers if either it's empty or is unique - if len(podCopy.Spec.Containers) == 0 || !containsContainer(podCopy.Spec.Containers, container.Name) { - podCopy.Spec.Containers = append(podCopy.Spec.Containers, container) - } - } + if utils.ContainsWildcardPatterns(matchingImages, container.Image) { + matching.Spec.Containers = append(matching.Spec.Containers, container) } } for _, container := range pod.Spec.InitContainers { - for _, excludeRule := range exclude { - // Ignore all restrictedFields when we only specify the `controlName` with no `restrictedField` - controlNameOnly := excludeRule.RestrictedField == "" - if !utils.ContainsString(excludeRule.Images, container.Image) { - continue - } - if strings.Contains(excludeRule.RestrictedField, "spec.initContainers[*]") || controlNameOnly { - // Add to matchingContainers if either it's empty or is unique - if len(podCopy.Spec.InitContainers) == 0 || !containsContainer(podCopy.Spec.InitContainers, container.Name) { - podCopy.Spec.InitContainers = append(podCopy.Spec.InitContainers, container) - } - } + if utils.ContainsWildcardPatterns(matchingImages, container.Image) { + matching.Spec.InitContainers = append(matching.Spec.InitContainers, container) } } - for _, container := range pod.Spec.EphemeralContainers { - for _, excludeRule := range exclude { - // Ignore all restrictedFields when we only specify the `controlName` with no `restrictedField` - controlNameOnly := excludeRule.RestrictedField == "" - if !utils.ContainsString(excludeRule.Images, container.Image) { - continue - } - if strings.Contains(excludeRule.RestrictedField, "spec.ephemeralContainers[*]") || controlNameOnly { - // Add to matchingContainers if either it's empty or is unique - if len(podCopy.Spec.EphemeralContainers) == 0 || !containsContainer(podCopy.Spec.EphemeralContainers, container.Name) { - podCopy.Spec.EphemeralContainers = append(podCopy.Spec.EphemeralContainers, container) - } - } - } - } - return podCopy -} -// Get containers NOT matching images specified in Exclude values -func getPodWithNotMatchingContainers(exclude []kyvernov1.PodSecurityStandard, pod *corev1.Pod, podWithMatchingContainers *corev1.Pod) (podCopy corev1.Pod) { - // Only copy containers because we have already evaluated the pod-level controls - // e.g.: spec.securityContext.hostProcess - podCopy.Spec.Containers = []corev1.Container{} - podCopy.Spec.InitContainers = []corev1.Container{} - podCopy.Spec.EphemeralContainers = []corev1.EphemeralContainer{} - - // Append containers that are not in podWithMatchingContainers already evaluated in EvaluatePod() - for _, container := range pod.Spec.Containers { - if !containsContainer(podWithMatchingContainers.Spec.Containers, container.Name) { - podCopy.Spec.Containers = append(podCopy.Spec.Containers, container) - } - } - for _, container := range pod.Spec.InitContainers { - if !containsContainer(podWithMatchingContainers.Spec.InitContainers, container.Name) { - podCopy.Spec.InitContainers = append(podCopy.Spec.InitContainers, container) - } - } for _, container := range pod.Spec.EphemeralContainers { - if !containsContainer(podWithMatchingContainers.Spec.EphemeralContainers, container.Name) { - podCopy.Spec.EphemeralContainers = append(podCopy.Spec.EphemeralContainers, container) + if utils.ContainsWildcardPatterns(matchingImages, container.Image) { + matching.Spec.EphemeralContainers = append(matching.Spec.EphemeralContainers, container) } } - return podCopy + + return nil, matching } // Get restrictedFields from Check.ID @@ -134,11 +60,10 @@ func getRestrictedFields(check policy.Check) []restrictedField { return nil } -func containsContainerLevelControl(restrictedFields []restrictedField) bool { - for _, restrictedField := range restrictedFields { - if strings.Contains(restrictedField.path, "ontainers[*]") { - return true - } +func FormatChecksPrint(checks []pssCheckResult) string { + var str string + for _, check := range checks { + str += fmt.Sprintf("(%+v)\n", check.checkResult) } - return false + return str } diff --git a/pkg/utils/util.go b/pkg/utils/util.go index 7c73207086..3fefde7646 100644 --- a/pkg/utils/util.go +++ b/pkg/utils/util.go @@ -83,7 +83,7 @@ func contains(list []string, element string, fn func(string, string) bool) bool // ContainsNamepace check if namespace satisfies any list of pattern(regex) func ContainsNamepace(patterns []string, ns string) bool { - return contains(patterns, ns, compareNamespaces) + return contains(patterns, ns, comparePatterns) } // ContainsString checks if the string is contained in the list @@ -91,7 +91,11 @@ func ContainsString(list []string, element string) bool { return contains(list, element, compareString) } -func compareNamespaces(pattern, ns string) bool { +func ContainsWildcardPatterns(patterns []string, key string) bool { + return contains(patterns, key, comparePatterns) +} + +func comparePatterns(pattern, ns string) bool { return wildcard.Match(pattern, ns) } diff --git a/test/policy/validate/enforce-baseline-exclude-selinuxoptions.yaml b/test/policy/validate/enforce-baseline-exclude-selinuxoptions.yaml deleted file mode 100644 index f7df5e35a7..0000000000 --- a/test/policy/validate/enforce-baseline-exclude-selinuxoptions.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: kyverno.io/v1 -kind: ClusterPolicy -metadata: - name: enforce-baseline-exclude-se-linux-options -spec: - validationFailureAction: enforce - rules: - - name: enforce-baseline-exclude-se-linux-options - match: - any: - - resources: - kinds: - - Pod - namespaces: - - privileged-pss-with-kyverno - validate: - podSecurity: - level: baseline - version: v1.24 - exclude: - - controlName: "SELinux" - restrictedField: spec.containers[*].securityContext.seLinuxOptions.role - images: - - nginx - values: - - baz - - controlName: "SELinux" - restrictedField: spec.initContainers[*].securityContext.seLinuxOptions.role - images: - - nodejs - values: - - init-bazo \ No newline at end of file