GeneratedResource takes a resource configuration file in yaml format from
+the user to compare it against the Kyverno generated resource configuration.
Status mentions the status that the user is expecting.
+Possible values are pass, fail and skip.
+This is DEPRECATED, use Result instead.
+
+
+
+
+
+
+
+
+
+
+
+
+
resource
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Resource mentions the name of the resource on which the policy is to be applied.
+This is DEPRECATED, use Resources instead.
+
+
+
+
+
+
+
+
+
+
+
+
+
namespace
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Namespace mentions the namespace of the policy which has namespace scope.
+This is DEPRECATED, use a name in the form <namespace>/<name> for policies and/or resources instead.
ApplyRules controls how rules in a policy are applied. Rule are processed in
+the order of declaration. When set to One processing stops after a rule has
+been applied i.e. the rule matches and results in a pass, fail, or error. When
+set to All all rules in the policy are processed. The default is All.
FailurePolicy defines how unexpected policy errors and webhook response timeout errors are handled.
+Rules within the same policy share the same failure behavior.
+This field should not be accessed directly, instead GetFailurePolicy() should be used.
+Allowed values are Ignore or Fail. Defaults to Fail.
ValidationFailureAction defines if a validation policy rule violation should block
+the admission review request (enforce), or allow (audit) the admission review request
+and report an error in a policy report. Optional.
+Allowed values are audit or enforce. The default value is "Audit".
ValidationFailureActionOverrides is a Cluster Policy attribute that specifies ValidationFailureAction
+namespace-wise. It overrides ValidationFailureAction for the specified namespaces.
+
+
+
+
+
+
+
+
+
+
+
+
+
admission
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Admission controls if rules are applied during admission.
+Optional. Default value is "true".
+
+
+
+
+
+
+
+
+
+
+
+
+
background
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Background controls if rules are applied to existing resources during a background scan.
+Optional. Default value is "true". The value must be set to "false" if the policy rule
+uses variables that are only available in the admission review request (e.g. user name).
WebhookTimeoutSeconds specifies the maximum time in seconds allowed to apply this policy.
+After the configured time expires, the admission request may fail, or may simply ignore the policy results,
+based on the failure policy. The default timeout is 10s, the value must be between 1 and 30 seconds.
GenerateExisting controls whether to trigger generate rule in existing resources
+If is set to "true" generate rule will be triggered and applied to existing matched resources.
+Defaults to "false" if not specified.
+
+
+
+
+
+
+
+
+
+
+
+
+
useServerSideApply
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
UseServerSideApply controls whether to use server-side apply for generate rules
+If is set to "true" create & update for generate rules will use apply instead of create/update.
+Defaults to "false" if not specified.
Policy declares validation, mutation, and generation behaviors for matching resources.
+See: https://kyverno.io/docs/writing-policies/ for more information.
ApplyRules controls how rules in a policy are applied. Rule are processed in
+the order of declaration. When set to One processing stops after a rule has
+been applied i.e. the rule matches and results in a pass, fail, or error. When
+set to All all rules in the policy are processed. The default is All.
FailurePolicy defines how unexpected policy errors and webhook response timeout errors are handled.
+Rules within the same policy share the same failure behavior.
+This field should not be accessed directly, instead GetFailurePolicy() should be used.
+Allowed values are Ignore or Fail. Defaults to Fail.
ValidationFailureAction defines if a validation policy rule violation should block
+the admission review request (enforce), or allow (audit) the admission review request
+and report an error in a policy report. Optional.
+Allowed values are audit or enforce. The default value is "Audit".
ValidationFailureActionOverrides is a Cluster Policy attribute that specifies ValidationFailureAction
+namespace-wise. It overrides ValidationFailureAction for the specified namespaces.
+
+
+
+
+
+
+
+
+
+
+
+
+
admission
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Admission controls if rules are applied during admission.
+Optional. Default value is "true".
+
+
+
+
+
+
+
+
+
+
+
+
+
background
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Background controls if rules are applied to existing resources during a background scan.
+Optional. Default value is "true". The value must be set to "false" if the policy rule
+uses variables that are only available in the admission review request (e.g. user name).
WebhookTimeoutSeconds specifies the maximum time in seconds allowed to apply this policy.
+After the configured time expires, the admission request may fail, or may simply ignore the policy results,
+based on the failure policy. The default timeout is 10s, the value must be between 1 and 30 seconds.
GenerateExisting controls whether to trigger generate rule in existing resources
+If is set to "true" generate rule will be triggered and applied to existing matched resources.
+Defaults to "false" if not specified.
+
+
+
+
+
+
+
+
+
+
+
+
+
useServerSideApply
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
UseServerSideApply controls whether to use server-side apply for generate rules
+If is set to "true" create & update for generate rules will use apply instead of create/update.
+Defaults to "false" if not specified.
URLPath is the URL path to be used in the HTTP GET or POST request to the
+Kubernetes API server (e.g. "/api/v1/namespaces" or "/apis/apps/v1/deployments").
+The format required is the same format used by the kubectl get --raw command.
+See https://kyverno.io/docs/writing-policies/external-data-sources/#variables-from-kubernetes-api-server-calls
+for details.
AnyAllConditions consists of conditions wrapped denoting a logical criteria to be fulfilled.
+AnyConditions get fulfilled when at least one of its sub-conditions passes.
+AllConditions get fulfilled only when all of its sub-conditions pass.
AnyConditions enable variable-based conditional rule execution. This is useful for
+finer control of when an rule is applied. A condition can reference object data
+using JMESPath notation.
+Here, at least one of the conditions need to pass
AllConditions enable variable-based conditional rule execution. This is useful for
+finer control of when an rule is applied. A condition can reference object data
+using JMESPath notation.
+Here, all of the conditions need to pass
Attestation are checks for signed in-toto Statements that are used to verify the image.
+See https://github.com/in-toto/attestation. Kyverno fetches signed attestations from the
+OCI registry and decodes them into a list of Statements.
+
+
+
+
+
+
+
Field
+
Description
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
predicateType
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Deprecated in favour of 'Type', to be removed soon
+
+
+
+
+
+
+
+
+
+
+
+
+
type
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Type defines the type of attestation contained within the Statement.
Conditions are used to verify attributes within a Predicate. If no Conditions are specified
+the attestation check is satisfied as long there are predicates that match the predicate type.
Annotations are used for image verification.
+Every specified key-value pair must exist and match in the verified payload.
+The payload may contain other key-value pairs.
+
+
+
+
+
+
+
+
+
+
+
+
+
repository
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Repository is an optional alternate OCI repository to use for signatures and attestations that match this rule.
+If specified Repository will override other OCI image repository locations for this Attestor.
Count specifies the required number of entries that must match. If the count is null, all entries must match
+(a logical AND). If the count is 1, at least one entry must match (a logical OR). If the count contains a
+value N, then N must be less than or equal to the size of entries, and at least N entries must match.
Variables contain definitions of variables that can be used in composition of other expressions.
+Each variable is defined as a named CEL expression.
+The variables defined here will be available under variables in other expressions of the policy.
IgnoreSCT defines whether to use the Signed Certificate Timestamp (SCT) log to check for a certificate
+timestamp. Default is false. Set to true if this was opted out during signing.
+
+
+
+
+
+
+
+
+
+
+
+
+
pubkey
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
PubKey, if set, is used to validate SCTs against a custom source.
Rekor provides configuration for the Rekor transparency log service. If an empty object
+is provided the public instance of Rekor (https://rekor.sigstore.dev) is used.
CTLog (certificate timestamp log) provides a configuration for validation of Signed Certificate
+Timestamps (SCTs). If the value is unset, the default behavior by Cosign is used.
JMESPath is an optional JSON Match Expression that can be used to
+transform the JSON response returned from the server. For example
+a JMESPath of "items | length(@)" applied to the API server response
+for the URLPath "/apis/apps/v1/deployments" will return the total count
+of deployments across all namespaces.
APICall is an HTTP request to the Kubernetes API server, or other JSON web service.
+The data returned is stored in the context with the name for the context entry.
Multiple conditions can be declared under an any or all statement. A direct list
+of conditions (without any or all statements) is also supported for backwards compatibility
+but will be deprecated in the next major release.
+See: https://kyverno.io/docs/writing-policies/validate/#deny-rules
DryRunOption is a configuration for dryrun.
+If enable is set to "true", manifest verification performs "dryrun & compare"
+which provides robust matching against changes by defaults and other admission controllers.
+Dryrun requires additional permissions. See config/dryrun/dryrun_rbac.yaml
ForEachMutation applies mutation rules to a list of sub-elements by creating a context for each entry in the list and looping over it to apply the specified logic.
+
+
+
+
+
+
+
Field
+
Description
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
list
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
List specifies a JMESPath expression that results in one or more elements
+to which the validation logic is applied.
Order defines the iteration order on the list.
+Can be Ascending to iterate from first to last element or Descending to iterate in from last to first element.
AnyAllConditions are used to determine if a policy rule should be applied by evaluating a
+set of conditions. The declaration can contain nested any or all statements.
+See: https://kyverno.io/docs/writing-policies/preconditions/
PatchStrategicMerge is a strategic merge patch used to modify resources.
+See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/
+and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/.
+
+
+
+
+
+
+
+
+
+
+
+
+
patchesJson6902
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
PatchesJSON6902 is a list of RFC 6902 JSON Patch declarations used to modify resources.
+See https://tools.ietf.org/html/rfc6902 and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/.
ForEachValidation applies validate rules to a list of sub-elements by creating a context for each entry in the list and looping over it to apply the specified logic.
+
+
+
+
+
+
+
Field
+
Description
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
list
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
List specifies a JMESPath expression that results in one or more elements
+to which the validation logic is applied.
+
+
+
+
+
+
+
+
+
+
+
+
+
elementScope
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
ElementScope specifies whether to use the current list element as the scope for validation. Defaults to "true" if not specified.
+When set to "false", "request.object" is used as the validation scope within the foreach
+block to allow referencing other elements in the subtree.
AnyAllConditions are used to determine if a policy rule should be applied by evaluating a
+set of conditions. The declaration can contain nested any or all statements.
+See: https://kyverno.io/docs/writing-policies/preconditions/
ResourceSpec contains information to select the resource.
+
+
+
+
+
+
+
+
+
+
+
+
+
synchronize
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Synchronize controls if generated resources should be kept in-sync with their source resource.
+If Synchronize is set to "true" changes to generated resources will be overwritten with resource
+data from Data or the resource specified in the Clone declaration.
+Optional. Defaults to "false" if not specified.
OrphanDownstreamOnPolicyDelete controls whether generated resources should be deleted when the rule that generated
+them is deleted with synchronization enabled. This option is only applicable to generate rules of the data type.
+See https://kyverno.io/docs/writing-policies/generate/#data-examples.
+Defaults to "false" if not specified.
Data provides the resource declaration used to populate each generated resource.
+At most one of Data or Clone must be specified. If neither are provided, the generated
+resource will be created with default data only.
Clone specifies the source resource used to populate each generated resource.
+At most one of Data or Clone can be specified. If neither are provided, the generated
+resource will be created with default data only.
ImageRegistry defines requests to an OCI/Docker V2 registry to fetch image
+details.
+
+
+
+
+
+
+
Field
+
Description
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
reference
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Reference is image reference to a container image in the registry.
+Example: ghcr.io/kyverno/kyverno:latest
+
+
+
+
+
+
+
+
+
+
+
+
+
jmesPath
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
JMESPath is an optional JSON Match Expression that can be used to
+transform the ImageData struct returned as a result of processing
+the image reference.
Providers specifies a list of OCI Registry names, whose authentication providers are provided.
+It can be of one of these values: default,google,azure,amazon,github.
+
+
+
+
+
+
+
+
+
+
+
+
+
secrets
+
+ *
+
+
+
+
+
+
+ []string
+
+
+
+
+
+
+
Secrets specifies a list of secrets that are provided for credentials.
+Secrets must live in the Kyverno namespace.
ImageVerification validates that images that match the specified pattern
+are signed with the supplied public key. Once the image is verified it is
+mutated to include the SHA digest retrieved during the registration.
ImageReferences is a list of matching image reference patterns. At least one pattern in the
+list must match the image for the rule to apply. Each image reference consists of a registry
+address (defaults to docker.io), repository, image, and tag (defaults to latest).
+Wildcards ('*' and '?') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.
SkipImageReferences is a list of matching image reference patterns that should be skipped.
+At least one pattern in the list must match the image for the rule to be skipped. Each image reference
+consists of a registry address (defaults to docker.io), repository, image, and tag (defaults to latest).
+Wildcards ('*' and '?') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.
Attestations are optional checks for signed in-toto Statements used to verify the image.
+See https://github.com/in-toto/attestation. Kyverno fetches signed attestations from the
+OCI registry and decodes them into a list of Statement declarations.
Repository is an optional alternate OCI repository to use for image signatures and attestations that match this rule.
+If specified Repository will override the default OCI image repository configured for the installation.
+The repository can also be overridden per Attestor or Attestation.
+
+
+
+
+
+
+
+
+
+
+
+
+
mutateDigest
+
+ *
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
MutateDigest enables replacement of image tags with digests.
+Defaults to true.
+
+
+
+
+
+
+
+
+
+
+
+
+
verifyDigest
+
+ *
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
VerifyDigest validates that images have a digest.
+
+
+
+
+
+
+
+
+
+
+
+
+
required
+
+ *
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Required validates that images are verified i.e. have matched passed a signature or attestation check.
Rekor provides configuration for the Rekor transparency log service. If an empty object
+is provided the public instance of Rekor (https://rekor.sigstore.dev) is used.
CTLog (certificate timestamp log) provides a configuration for validation of Signed Certificate
+Timestamps (SCTs). If the value is unset, the default behavior by Cosign is used.
+
+
+
+
+
+
+
+
+
+
+
+
+
issuer
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Issuer is the certificate issuer used for keyless signing.
+
+
+
+
+
+
+
+
+
+
+
+
+
subject
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Subject is the verified identity used for keyless signing, for example the email address.
+
+
+
+
+
+
+
+
+
+
+
+
+
roots
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Roots is an optional set of PEM encoded trusted root certificates.
+If not provided, the system roots are used.
Repository is an optional alternate OCI repository to use for resource bundle reference.
+The repository can be overridden per Attestor or Attestation.
UserInfo contains information about the user performing the operation.
+Specifying UserInfo directly under match is being deprecated.
+Please specify under "any" or "all" instead.
ResourceDescription contains information about the resource being created or modified.
+Requires at least one tag to be specified when under MatchResources.
+Specifying ResourceDescription directly under match is being deprecated.
+Please specify under "any" or "all" instead.
PatchStrategicMerge is a strategic merge patch used to modify resources.
+See https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch/
+and https://kubectl.docs.kubernetes.io/references/kustomize/patchesstrategicmerge/.
+
+
+
+
+
+
+
+
+
+
+
+
+
patchesJson6902
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
PatchesJSON6902 is a list of RFC 6902 JSON Patch declarations used to modify resources.
+See https://tools.ietf.org/html/rfc6902 and https://kubectl.docs.kubernetes.io/references/kustomize/patchesjson6902/.
ForEach applies mutation rules to a list of sub-elements by creating a context for each entry in the list and looping over it to apply the specified logic.
Level defines the Pod Security Standard level to be applied to workloads.
+Allowed values are privileged, baseline, and restricted.
+
+
+
+
+
+
+
+
+
+
+
+
+
version
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Version defines the Pod Security Standard versions that Kubernetes supports.
+Allowed values are v1.19, v1.20, v1.21, v1.22, v1.23, v1.24, v1.25, v1.26, latest. Defaults to latest.
PodSecurityStandard specifies the Pod Security Standard controls to be excluded.
+
+
+
+
+
+
+
Field
+
Description
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
controlName
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
ControlName specifies the name of the Pod Security Standard control.
+See: https://kubernetes.io/docs/concepts/security/pod-security-standards/
+
+
+
+
+
+
+
+
+
+
+
+
+
images
+
+
+
+
+
+
+ []string
+
+
+
+
+
+
+
Images selects matching containers and applies the container level PSS.
+Each image is the image name consisting of the registry address, repository, image, and tag.
+Empty list matches no containers, PSS checks are applied at the pod level only.
+Wildcards ('*' and '?') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.
+
+
+
+
+
+
+
+
+
+
+
+
+
restrictedField
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
RestrictedField selects the field for the given Pod Security Standard control.
+When not set, all restricted fields for the control are selected.
+
+
+
+
+
+
+
+
+
+
+
+
+
values
+
+
+
+
+
+
+ []string
+
+
+
+
+
+
+
Values defines the allowed values that can be excluded.
URL is the address of the transparency log. Defaults to the public Rekor log instance https://rekor.sigstore.dev.
+
+
+
+
+
+
+
+
+
+
+
+
+
pubkey
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
RekorPubKey is an optional PEM-encoded public key to use for a custom Rekor.
+If set, this will be used to validate transparency log signatures from a custom Rekor.
ResourceDescription contains criteria used to match resources.
+
+
+
+
+
+
+
Field
+
Description
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
kinds
+
+
+
+
+
+
+ []string
+
+
+
+
+
+
+
Kinds is a list of resource kinds.
+
+
+
+
+
+
+
+
+
+
+
+
+
name
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Name is the name of the resource. The name supports wildcard characters
+"*" (matches zero or many characters) and "?" (at least one character).
+NOTE: "Name" is being deprecated in favor of "Names".
+
+
+
+
+
+
+
+
+
+
+
+
+
names
+
+
+
+
+
+
+ []string
+
+
+
+
+
+
+
Names are the names of the resources. Each name supports wildcard characters
+"*" (matches zero or many characters) and "?" (at least one character).
+
+
+
+
+
+
+
+
+
+
+
+
+
namespaces
+
+
+
+
+
+
+ []string
+
+
+
+
+
+
+
Namespaces is a list of namespaces names. Each name supports wildcard characters
+"*" (matches zero or many characters) and "?" (at least one character).
+
+
+
+
+
+
+
+
+
+
+
+
+
annotations
+
+
+
+
+
+
+ map[string]string
+
+
+
+
+
+
+
Annotations is a map of annotations (key-value pairs of type string). Annotation keys
+and values support the wildcard characters "*" (matches zero or many characters) and
+"?" (matches at least one character).
Selector is a label selector. Label keys and values in matchLabels support the wildcard
+characters * (matches zero or many characters) and ? (matches one character).
+Wildcards allows writing label selectors like ["storage.k8s.io/": ""]. Note that
+using ["" : ""] matches any key and value but does not match an empty label set.
NamespaceSelector is a label selector for the resource namespace. Label keys and values
+in matchLabels support the wildcard characters * (matches zero or many characters)
+and ? (matches one character).Wildcards allows writing label selectors like
+["storage.k8s.io/": ""]. Note that using ["" : ""] matches any key and value but
+does not match an empty label set.
Rule defines a validation, mutation, or generation control for matching resources.
+Each rules contains a match declaration to select resources, and an optional exclude
+declaration to specify which resources to exclude.
+
+
+
+
+
+
+
Field
+
Description
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
name
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Name is a label to identify the rule, It must be unique within the policy.
MatchResources defines when this policy rule should be applied. The match
+criteria can include resource information (e.g. kind, name, namespace, labels)
+and admission review request information like the user name or role.
+At least one kind is required.
ExcludeResources defines when this policy rule should not be applied. The exclude
+criteria can include resource information (e.g. kind, name, namespace, labels)
+and admission review request information like the name or role.
Preconditions are used to determine if a policy rule should be applied by evaluating a
+set of conditions. The declaration can contain nested any or all statements. A direct list
+of conditions (without any or all statements is supported for backwards compatibility but
+will be deprecated in the next major release.
+See: https://kyverno.io/docs/writing-policies/preconditions/
CELPreconditions are used to determine if a policy rule should be applied by evaluating a
+set of CEL conditions. It can only be used with the validate.cel subrule
SkipBackgroundRequests bypasses admission requests that are sent by the background controller.
+The default value is set to "true", it must be set to "false" to apply
+generate and mutateExisting rules to those requests.
ApplyRules controls how rules in a policy are applied. Rule are processed in
+the order of declaration. When set to One processing stops after a rule has
+been applied i.e. the rule matches and results in a pass, fail, or error. When
+set to All all rules in the policy are processed. The default is All.
FailurePolicy defines how unexpected policy errors and webhook response timeout errors are handled.
+Rules within the same policy share the same failure behavior.
+This field should not be accessed directly, instead GetFailurePolicy() should be used.
+Allowed values are Ignore or Fail. Defaults to Fail.
ValidationFailureAction defines if a validation policy rule violation should block
+the admission review request (enforce), or allow (audit) the admission review request
+and report an error in a policy report. Optional.
+Allowed values are audit or enforce. The default value is "Audit".
ValidationFailureActionOverrides is a Cluster Policy attribute that specifies ValidationFailureAction
+namespace-wise. It overrides ValidationFailureAction for the specified namespaces.
+
+
+
+
+
+
+
+
+
+
+
+
+
admission
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Admission controls if rules are applied during admission.
+Optional. Default value is "true".
+
+
+
+
+
+
+
+
+
+
+
+
+
background
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Background controls if rules are applied to existing resources during a background scan.
+Optional. Default value is "true". The value must be set to "false" if the policy rule
+uses variables that are only available in the admission review request (e.g. user name).
WebhookTimeoutSeconds specifies the maximum time in seconds allowed to apply this policy.
+After the configured time expires, the admission request may fail, or may simply ignore the policy results,
+based on the failure policy. The default timeout is 10s, the value must be between 1 and 30 seconds.
GenerateExisting controls whether to trigger generate rule in existing resources
+If is set to "true" generate rule will be triggered and applied to existing matched resources.
+Defaults to "false" if not specified.
+
+
+
+
+
+
+
+
+
+
+
+
+
useServerSideApply
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
UseServerSideApply controls whether to use server-side apply for generate rules
+If is set to "true" create & update for generate rules will use apply instead of create/update.
+Defaults to "false" if not specified.
Keys is a set of X.509 public keys used to verify image signatures. The keys can be directly
+specified or can be a variable reference to a key specified in a ConfigMap (see
+https://kyverno.io/docs/writing-policies/variables/), or reference a standard Kubernetes Secret
+elsewhere in the cluster by specifying it in the format "k8s:///<secret_name>".
+The named Secret must specify a key cosign.pub containing the public key used for
+verification, (see https://github.com/sigstore/cosign/blob/main/KMS.md#kubernetes-secret).
+When multiple keys are specified each key is processed as a separate staticKey entry
+(.attestors[*].entries.keys) within the set of attestors and the count is applied across the keys.
Rekor provides configuration for the Rekor transparency log service. If an empty object
+is provided the public instance of Rekor (https://rekor.sigstore.dev) is used.
CTLog (certificate timestamp log) provides a configuration for validation of Signed Certificate
+Timestamps (SCTs). If the value is unset, the default behavior by Cosign is used.
Preconditions are used to determine if a policy rule should be applied by evaluating a
+set of conditions. The declaration can contain nested any or all statements. A direct list
+of conditions (without any or all statements is supported for backwards compatibility but
+will be deprecated in the next major release.
+See: https://kyverno.io/docs/writing-policies/preconditions/
ValidatingAdmissionPolicy contains status information
+
+
+
+
+
+
+
Field
+
Description
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
generated
+
+ *
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Generated indicates whether a validating admission policy is generated from the policy or not
+
+
+
+
+
+
+
+
+
+
+
+
+
message
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Message is a human readable message indicating details about the generation of validating admission policy
+It is an empty string when validating admission policy is successfully generated.
ForEach applies validate rules to a list of sub-elements by creating a context for each entry in the list and looping over it to apply the specified logic.
MatchResources defines when cleanuppolicy should be applied. The match
+criteria can include resource information (e.g. kind, name, namespace, labels)
+and admission review request information like the user name or role.
+At least one kind is required.
ExcludeResources defines when cleanuppolicy should not be applied. The exclude
+criteria can include resource information (e.g. kind, name, namespace, labels)
+and admission review request information like the name or role.
MatchResources defines when cleanuppolicy should be applied. The match
+criteria can include resource information (e.g. kind, name, namespace, labels)
+and admission review request information like the user name or role.
+At least one kind is required.
ExcludeResources defines when cleanuppolicy should not be applied. The exclude
+criteria can include resource information (e.g. kind, name, namespace, labels)
+and admission review request information like the name or role.
Background controls if exceptions are applied to existing policies during a background scan.
+Optional. Default value is "true". The value must be set to "false" if the policy rule
+uses variables that are only available in the admission review request (e.g. user name).
Conditions are used to determine if a resource applies to the exception by evaluating a
+set of conditions. The declaration can contain nested any or all statements.
MatchResources defines when cleanuppolicy should be applied. The match
+criteria can include resource information (e.g. kind, name, namespace, labels)
+and admission review request information like the user name or role.
+At least one kind is required.
ExcludeResources defines when cleanuppolicy should not be applied. The exclude
+criteria can include resource information (e.g. kind, name, namespace, labels)
+and admission review request information like the name or role.
MatchResources defines when cleanuppolicy should be applied. The match
+criteria can include resource information (e.g. kind, name, namespace, labels)
+and admission review request information like the user name or role.
+At least one kind is required.
ExcludeResources defines when cleanuppolicy should not be applied. The exclude
+criteria can include resource information (e.g. kind, name, namespace, labels)
+and admission review request information like the name or role.
ApplyRules controls how rules in a policy are applied. Rule are processed in
+the order of declaration. When set to One processing stops after a rule has
+been applied i.e. the rule matches and results in a pass, fail, or error. When
+set to All all rules in the policy are processed. The default is All.
FailurePolicy defines how unexpected policy errors and webhook response timeout errors are handled.
+Rules within the same policy share the same failure behavior.
+Allowed values are Ignore or Fail. Defaults to Fail.
ValidationFailureAction defines if a validation policy rule violation should block
+the admission review request (enforce), or allow (audit) the admission review request
+and report an error in a policy report. Optional.
+Allowed values are audit or enforce. The default value is "Audit".
ValidationFailureActionOverrides is a Cluster Policy attribute that specifies ValidationFailureAction
+namespace-wise. It overrides ValidationFailureAction for the specified namespaces.
+
+
+
+
+
+
+
+
+
+
+
+
+
admission
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Admission controls if rules are applied during admission.
+Optional. Default value is "true".
+
+
+
+
+
+
+
+
+
+
+
+
+
background
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Background controls if rules are applied to existing resources during a background scan.
+Optional. Default value is "true". The value must be set to "false" if the policy rule
+uses variables that are only available in the admission review request (e.g. user name).
WebhookTimeoutSeconds specifies the maximum time in seconds allowed to apply this policy.
+After the configured time expires, the admission request may fail, or may simply ignore the policy results,
+based on the failure policy. The default timeout is 10s, the value must be between 1 and 30 seconds.
GenerateExisting controls whether to trigger generate rule in existing resources
+If is set to "true" generate rule will be triggered and applied to existing matched resources.
+Defaults to "false" if not specified.
+
+
+
+
+
+
+
+
+
+
+
+
+
useServerSideApply
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
UseServerSideApply controls whether to use server-side apply for generate rules
+If is set to "true" create & update for generate rules will use apply instead of create/update.
+Defaults to "false" if not specified.
Policy declares validation, mutation, and generation behaviors for matching resources.
+See: https://kyverno.io/docs/writing-policies/ for more information.
ApplyRules controls how rules in a policy are applied. Rule are processed in
+the order of declaration. When set to One processing stops after a rule has
+been applied i.e. the rule matches and results in a pass, fail, or error. When
+set to All all rules in the policy are processed. The default is All.
FailurePolicy defines how unexpected policy errors and webhook response timeout errors are handled.
+Rules within the same policy share the same failure behavior.
+Allowed values are Ignore or Fail. Defaults to Fail.
ValidationFailureAction defines if a validation policy rule violation should block
+the admission review request (enforce), or allow (audit) the admission review request
+and report an error in a policy report. Optional.
+Allowed values are audit or enforce. The default value is "Audit".
ValidationFailureActionOverrides is a Cluster Policy attribute that specifies ValidationFailureAction
+namespace-wise. It overrides ValidationFailureAction for the specified namespaces.
+
+
+
+
+
+
+
+
+
+
+
+
+
admission
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Admission controls if rules are applied during admission.
+Optional. Default value is "true".
+
+
+
+
+
+
+
+
+
+
+
+
+
background
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Background controls if rules are applied to existing resources during a background scan.
+Optional. Default value is "true". The value must be set to "false" if the policy rule
+uses variables that are only available in the admission review request (e.g. user name).
WebhookTimeoutSeconds specifies the maximum time in seconds allowed to apply this policy.
+After the configured time expires, the admission request may fail, or may simply ignore the policy results,
+based on the failure policy. The default timeout is 10s, the value must be between 1 and 30 seconds.
GenerateExisting controls whether to trigger generate rule in existing resources
+If is set to "true" generate rule will be triggered and applied to existing matched resources.
+Defaults to "false" if not specified.
+
+
+
+
+
+
+
+
+
+
+
+
+
useServerSideApply
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
UseServerSideApply controls whether to use server-side apply for generate rules
+If is set to "true" create & update for generate rules will use apply instead of create/update.
+Defaults to "false" if not specified.
Background controls if exceptions are applied to existing policies during a background scan.
+Optional. Default value is "true". The value must be set to "false" if the policy rule
+uses variables that are only available in the admission review request (e.g. user name).
Conditions are used to determine if a resource applies to the exception by evaluating a
+set of conditions. The declaration can contain nested any or all statements.
AnyConditions enable variable-based conditional rule execution. This is useful for
+finer control of when an rule is applied. A condition can reference object data
+using JMESPath notation.
+Here, at least one of the conditions need to pass.
AllConditions enable variable-based conditional rule execution. This is useful for
+finer control of when an rule is applied. A condition can reference object data
+using JMESPath notation.
+Here, all of the conditions need to pass.
MatchResources defines when cleanuppolicy should be applied. The match
+criteria can include resource information (e.g. kind, name, namespace, labels)
+and admission review request information like the user name or role.
+At least one kind is required.
ExcludeResources defines when cleanuppolicy should not be applied. The exclude
+criteria can include resource information (e.g. kind, name, namespace, labels)
+and admission review request information like the name or role.
ImageVerification validates that images that match the specified pattern
+are signed with the supplied public key. Once the image is verified it is
+mutated to include the SHA digest retrieved during the registration.
ImageReferences is a list of matching image reference patterns. At least one pattern in the
+list must match the image for the rule to apply. Each image reference consists of a registry
+address (defaults to docker.io), repository, image, and tag (defaults to latest).
+Wildcards ('*' and '?') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.
SkipImageReferences is a list of matching image reference patterns that should be skipped.
+At least one pattern in the list must match the image for the rule to be skipped. Each image reference
+consists of a registry address (defaults to docker.io), repository, image, and tag (defaults to latest).
+Wildcards ('*' and '?') are allowed. See: https://kubernetes.io/docs/concepts/containers/images.
Attestations are optional checks for signed in-toto Statements used to verify the image.
+See https://github.com/in-toto/attestation. Kyverno fetches signed attestations from the
+OCI registry and decodes them into a list of Statement declarations.
+
+
+
+
+
+
+
+
+
+
+
+
+
repository
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Repository is an optional alternate OCI repository to use for image signatures and attestations that match this rule.
+If specified Repository will override the default OCI image repository configured for the installation.
+The repository can also be overridden per Attestor or Attestation.
+
+
+
+
+
+
+
+
+
+
+
+
+
mutateDigest
+
+ *
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
MutateDigest enables replacement of image tags with digests.
+Defaults to true.
+
+
+
+
+
+
+
+
+
+
+
+
+
verifyDigest
+
+ *
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
VerifyDigest validates that images have a digest.
+
+
+
+
+
+
+
+
+
+
+
+
+
required
+
+ *
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Required validates that images are verified i.e. have matched passed a signature or attestation check.
Background controls if exceptions are applied to existing policies during a background scan.
+Optional. Default value is "true". The value must be set to "false" if the policy rule
+uses variables that are only available in the admission review request (e.g. user name).
Conditions are used to determine if a resource applies to the exception by evaluating a
+set of conditions. The declaration can contain nested any or all statements.
PodSecurity specifies the Pod Security Standard controls to be excluded.
+Applicable only to policies that have validate.podSecurity subrule.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
ResourceDescription
+
+
+
+
+ (Appears in:)
+
+
+
+
ResourceDescription contains criteria used to match resources.
+
+
+
+
+
+
+
Field
+
Description
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
kinds
+
+
+
+
+
+
+ []string
+
+
+
+
+
+
+
Kinds is a list of resource kinds.
+
+
+
+
+
+
+
+
+
+
+
+
+
names
+
+
+
+
+
+
+ []string
+
+
+
+
+
+
+
Names are the names of the resources. Each name supports wildcard characters
+"*" (matches zero or many characters) and "?" (at least one character).
+
+
+
+
+
+
+
+
+
+
+
+
+
namespaces
+
+
+
+
+
+
+ []string
+
+
+
+
+
+
+
Namespaces is a list of namespaces names. Each name supports wildcard characters
+"*" (matches zero or many characters) and "?" (at least one character).
+
+
+
+
+
+
+
+
+
+
+
+
+
annotations
+
+
+
+
+
+
+ map[string]string
+
+
+
+
+
+
+
Annotations is a map of annotations (key-value pairs of type string). Annotation keys
+and values support the wildcard characters "*" (matches zero or many characters) and
+"?" (matches at least one character).
Selector is a label selector. Label keys and values in matchLabels support the wildcard
+characters * (matches zero or many characters) and ? (matches one character).
+Wildcards allows writing label selectors like ["storage.k8s.io/": ""]. Note that
+using ["" : ""] matches any key and value but does not match an empty label set.
NamespaceSelector is a label selector for the resource namespace. Label keys and values
+in matchLabels support the wildcard characters * (matches zero or many characters)
+and ? (matches one character).Wildcards allows writing label selectors like
+["storage.k8s.io/": ""]. Note that using ["" : ""] matches any key and value but
+does not match an empty label set.
Rule defines a validation, mutation, or generation control for matching resources.
+Each rules contains a match declaration to select resources, and an optional exclude
+declaration to specify which resources to exclude.
+
+
+
+
+
+
+
Field
+
Description
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
name
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Name is a label to identify the rule, It must be unique within the policy.
MatchResources defines when this policy rule should be applied. The match
+criteria can include resource information (e.g. kind, name, namespace, labels)
+and admission review request information like the user name or role.
+At least one kind is required.
ExcludeResources defines when this policy rule should not be applied. The exclude
+criteria can include resource information (e.g. kind, name, namespace, labels)
+and admission review request information like the name or role.
Preconditions are used to determine if a policy rule should be applied by evaluating a
+set of conditions. The declaration can contain nested any or all statements.
+See: https://kyverno.io/docs/writing-policies/preconditions/
CELPreconditions are used to determine if a policy rule should be applied by evaluating a
+set of CEL conditions. It can only be used with the validate.cel subrule
SkipBackgroundRequests bypasses admission requests that are sent by the background controller.
+The default value is set to "true", it must be set to "false" to apply
+generate and mutateExisting rules to those requests.
ApplyRules controls how rules in a policy are applied. Rule are processed in
+the order of declaration. When set to One processing stops after a rule has
+been applied i.e. the rule matches and results in a pass, fail, or error. When
+set to All all rules in the policy are processed. The default is All.
FailurePolicy defines how unexpected policy errors and webhook response timeout errors are handled.
+Rules within the same policy share the same failure behavior.
+Allowed values are Ignore or Fail. Defaults to Fail.
ValidationFailureAction defines if a validation policy rule violation should block
+the admission review request (enforce), or allow (audit) the admission review request
+and report an error in a policy report. Optional.
+Allowed values are audit or enforce. The default value is "Audit".
ValidationFailureActionOverrides is a Cluster Policy attribute that specifies ValidationFailureAction
+namespace-wise. It overrides ValidationFailureAction for the specified namespaces.
+
+
+
+
+
+
+
+
+
+
+
+
+
admission
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Admission controls if rules are applied during admission.
+Optional. Default value is "true".
+
+
+
+
+
+
+
+
+
+
+
+
+
background
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
Background controls if rules are applied to existing resources during a background scan.
+Optional. Default value is "true". The value must be set to "false" if the policy rule
+uses variables that are only available in the admission review request (e.g. user name).
WebhookTimeoutSeconds specifies the maximum time in seconds allowed to apply this policy.
+After the configured time expires, the admission request may fail, or may simply ignore the policy results,
+based on the failure policy. The default timeout is 10s, the value must be between 1 and 30 seconds.
GenerateExisting controls whether to trigger generate rule in existing resources
+If is set to "true" generate rule will be triggered and applied to existing matched resources.
+Defaults to "false" if not specified.
+
+
+
+
+
+
+
+
+
+
+
+
+
useServerSideApply
+
+
+
+
+
+
+ bool
+
+
+
+
+
+
+
UseServerSideApply controls whether to use server-side apply for generate rules
+If is set to "true" create & update for generate rules will use apply instead of create/update.
+Defaults to "false" if not specified.
ForEach applies validate rules to a list of sub-elements by creating a context for each entry in the list and looping over it to apply the specified logic.
ScopeSelector is an optional selector for multiple scopes (e.g. Pods).
+Either one of, or none of, but not both of, Scope or ScopeSelector should be specified.
ScopeSelector is an optional selector for multiple scopes (e.g. Pods).
+Either one of, or none of, but not both of, Scope or ScopeSelector should be specified.
SubjectSelector is an optional label selector for checked Kubernetes resources.
+For example, a policy result may apply to all pods that match a label.
+Either a Subject or a SubjectSelector can be specified.
+If neither are provided, the result is assumed to be for the policy report scope.
+
+
+
+
+
+
+
+
+
+
+
+
+
message
+
+ *
+
+
+
+
+
+
+ string
+
+
+
+
+
+
+
Description is a short user friendly message for the policy rule
+
+
diff --git a/docs/user/html/members.tpl b/docs/user/html/members.tpl
new file mode 100644
index 0000000000..77fc0235f3
--- /dev/null
+++ b/docs/user/html/members.tpl
@@ -0,0 +1,48 @@
+{{ define "members" }}
+
+ {{/* . is a apiType */}}
+ {{ range .GetMembers }}
+ {{/* . is a apiMember */}}
+ {{ if not .Hidden }}
+
+
{{ .FieldName }}
+ {{ if not .IsOptional }}
+ *
+ {{ end }}
+
+
+ {{/* Link for type reference */}}
+ {{ with .GetType }}
+ {{ if .Link }}
+
+ {{ .DisplayName }}
+
+ {{ else }}
+ {{ .DisplayName }}
+ {{ end }}
+ {{ end }}
+
+
+ {{ if .IsInline }}
+
(Members of {{ .FieldName }} are embedded into this type.)
+ {{ end}}
+
+ {{ .GetComment }}
+
+ {{ if and (eq (.GetType.Name.Name) "ObjectMeta") }}
+ Refer to the Kubernetes API documentation for the fields of the
+ metadata field.
+ {{ end }}
+
+ {{ if or (eq .FieldName "spec") }}
+
+
+
+ {{ template "members" .GetType }}
+
+ {{ end }}
+
+
+ {{ end }}
+ {{ end }}
+{{ end }}
diff --git a/docs/user/html/pkg.tpl b/docs/user/html/pkg.tpl
new file mode 100644
index 0000000000..eceb065be8
--- /dev/null
+++ b/docs/user/html/pkg.tpl
@@ -0,0 +1,56 @@
+{{ define "packages" }}
+
+
+
+
+
+
+
+
+
+ {{ range .packages }}
+ {{/* Only display package that has a group name */}}
+ {{ if ne .GroupName "" }}
+
Package: {{- .DisplayName -}}
+
{{ .GetComment }}
+ {{ end }}
+ {{ end }}
+ {{ range .packages }}
+ {{ if ne .GroupName "" }}
+ {{/* TODO: Make the following line conditional */}}
+
Resource Types:
+
+ {{- range .VisibleTypes -}}
+ {{ if .IsExported -}}
+
+
+ {{/* For package with a group name, list all type definitions in it. */}}
+ {{ range .VisibleTypes }}
+ {{- if or .Referenced .IsExported -}}
+ {{ template "type" . }}
+ {{- end -}}
+ {{ end }}
+ {{ else }}
+ {{/* For package without a group name, list only type definitions that are referenced. */}}
+ {{ range .VisibleTypes }}
+ {{ if .Referenced }}
+ {{ template "type" . }}
+ {{ end }}
+ {{ end }}
+ {{ end }}
+
+ {{ end }}
+
+
+
+{{ end }}
diff --git a/docs/user/html/type.tpl b/docs/user/html/type.tpl
new file mode 100644
index 0000000000..f607deceb0
--- /dev/null
+++ b/docs/user/html/type.tpl
@@ -0,0 +1,52 @@
+{{ define "type" }}
+