1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-31 03:45:17 +00:00

update doc

This commit is contained in:
Shuting Zhao 2020-09-22 18:28:21 -07:00
parent b8b1d81df0
commit f8faa08f92

View file

@ -10,41 +10,84 @@ The Configmap Reference allows the reference of configmap values inside kyverno
To refer Configmap inside any Rule provide the context inside each rule defining the list of configmaps which will be referenced in that Rule.
```
````yaml
rules:
- name: add-sidecar-pod
- name: example-configmap-lookup
# added context to define the configmap information which will be referred
context:
# unique name to identify configmap
- name: mycmapRef
- name: dictionary
configMap:
# configmap name - name of the configmap which will be referred
name: mycmap
# configmap namepsace - namespace of the configmap which will be referred
```
namespace: test
````
Referenced Configmap Definition
```
````yaml
apiVersion: v1
data:
env: production, sandbox, staging
env: production
kind: ConfigMap
metadata:
name: mycmap
```
````
# Referring Value
The configmaps that are defined inside rule context can be referred using the unique name that is used to identify configmap inside context.
We can refer it's value using a JMESPATH
We can refer it's value using a JMESPATH `{{<name>.<data>.<key>}}`.
`{{<name>.<data>.<key>}}`
For the above context we can refer it's value by `{{dictionary.data.env}}`, which will be substitued with `production` during policy application.
So for the above context we can refer it's value using
# Deal with Array of Values
`{{mycmapRef.data.env}}`
The substitute variable can be an array of values. It allows the JSON format when defining it in the configMap.
For example, a list of allowed roles can be stored in configMap, and the kyverno policy can refer to this list to deny the disallowed request.
Here is the allowed roles in configMap:
````yaml
apiVersion: v1
data:
allowed-roles: "[\"cluster-admin\", \"cluster-operator\", \"tenant-admin\"]"
kind: ConfigMap
metadata:
name: roles-dictionary
namespace: test
````
This is a rule to deny the Deployment operation, if the value of annotation `role` is not in the allowed list:
````yaml
spec:
validationFailureAction: enforce
rules:
- name: validate-role-annotation
context:
- name: roles-dictionary
configMap:
name: roles-dictionary
namespace: test
match:
resources:
kinds:
- Deployment
preconditions:
- key: "{{ request.object.metadata.annotations.role }}"
operator: NotEquals
value: ""
validate:
message: "role {{ request.object.metadata.annotations.role }} is not in the allowed list {{ \"roles-dictionary\".data.\"allowed-roles\" }}"
deny:
conditions:
- key: "{{ request.object.metadata.annotations.role }}"
operator: NotIn
value: "{{ \"roles-dictionary\".data.\"allowed-roles\" }}"
````