Skip to content

Commit

Permalink
Update vendir https://github.com/giantswarm/kyverno to v1.11.4
Browse files Browse the repository at this point in the history
  • Loading branch information
renovate[bot] authored Apr 25, 2024
1 parent 546f4e2 commit 6fc2acf
Show file tree
Hide file tree
Showing 24 changed files with 37 additions and 41 deletions.
1 change: 1 addition & 0 deletions helm/kyverno-policies/charts/kyverno-policies/.helmignore
Original file line number Diff line number Diff line change
@@ -1,2 +1,3 @@
.helmignore
ci/
README.md.gotmpl
18 changes: 4 additions & 14 deletions helm/kyverno-policies/charts/kyverno-policies/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
apiVersion: v2
type: application
name: kyverno-policies
version: 3.0.4
appVersion: v1.10.3
version: 3.1.4
appVersion: v1.11.4
icon: https://github.com/kyverno/kyverno/raw/main/img/logo.png
description: Kubernetes Pod Security Standards implemented as Kyverno policies
keywords:
Expand All @@ -15,19 +15,9 @@ home: https://kyverno.io/policies/
sources:
- https://github.com/kyverno/policies
maintainers:
- name: Nirmata
url: https://kyverno.io/
- name: kyverno-maintainers
email: cncf-kyverno[email protected]
kubeVersion: ">=1.16.0-0"
annotations:
artifacthub.io/operator: "false"
artifacthub.io/prerelease: "false"
# valid kinds are: added, changed, deprecated, removed, fixed and security
artifacthub.io/changes: |
- kind: added
description: Add ability to configure autogen behavior
- kind: fixed
description: Support for customLabels, they were ignored up to now
- kind: removed
description: "Walk back change in PSS policy to send to to_upper"
- kind: fixed
description: Skip DELETE requests on policies using deny statements
7 changes: 4 additions & 3 deletions helm/kyverno-policies/charts/kyverno-policies/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

Kubernetes Pod Security Standards implemented as Kyverno policies

![Version: 3.0.4](https://img.shields.io/badge/Version-3.0.4-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: v1.10.3](https://img.shields.io/badge/AppVersion-v1.10.3-informational?style=flat-square)
![Version: 3.1.4](https://img.shields.io/badge/Version-3.1.4-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: v1.11.4](https://img.shields.io/badge/AppVersion-v1.11.4-informational?style=flat-square)

## About

Expand Down Expand Up @@ -63,13 +63,14 @@ The command removes all the Kubernetes components associated with the chart and

| Key | Type | Default | Description |
|-----|------|---------|-------------|
| policyKind | string | `"ClusterPolicy"` | Policy kind (`ClusterPolicy`, `Policy`) Set to `Policy` if you need namespaced policies and not cluster policies |
| podSecurityStandard | string | `"baseline"` | Pod Security Standard profile (`baseline`, `restricted`, `privileged`, `custom`). For more info https://kyverno.io/policies/pod-security. |
| podSecuritySeverity | string | `"medium"` | Pod Security Standard (`low`, `medium`, `high`). |
| podSecurityPolicies | list | `[]` | Policies to include when `podSecurityStandard` is `custom`. |
| includeOtherPolicies | list | `[]` | Additional policies to include from `other`. |
| includeRestrictedPolicies | list | `[]` | Additional policies to include from `restricted`. |
| failurePolicy | string | `"Fail"` | API server behavior if the webhook fails to respond ('Ignore', 'Fail') For more info: https://kyverno.io/docs/writing-policies/policy-settings/ |
| validationFailureAction | string | `"audit"` | Validation failure action (`audit`, `enforce`). For more info https://kyverno.io/docs/writing-policies/validate. |
| validationFailureAction | string | `"Audit"` | Validation failure action (`Audit`, `Enforce`). For more info https://kyverno.io/docs/writing-policies/validate. |
| validationFailureActionByPolicy | object | `{}` | Define validationFailureActionByPolicy for specific policies. Override the defined `validationFailureAction` with a individual validationFailureAction for individual Policies. |
| validationFailureActionOverrides | object | `{"all":[]}` | Define validationFailureActionOverrides for specific policies. The overrides for `all` will apply to all policies. |
| policyExclude | object | `{}` | Exclude resources from individual policies. Policies with multiple rules can have individual rules excluded by using the name of the rule as the key in the `policyExclude` map. |
Expand All @@ -92,7 +93,7 @@ Kubernetes: `>=1.16.0-0`

| Name | Email | Url |
| ---- | ------ | --- |
| Nirmata | | <https://kyverno.io/> |
| kyverno-maintainers | <cncf-kyverno[email protected]> | |

## Changes

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
{{- if eq (include "kyverno-policies.podSecurityBaseline" (merge (dict "name" $name) .)) "true" }}
{{- include "kyverno-policies.supportedKyvernoCheck" (dict "top" . "ver" ">= 1.6.0-0") }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "disallow-host-namespaces" }}
{{- if eq (include "kyverno-policies.podSecurityBaseline" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "disallow-host-path" }}
{{- if eq (include "kyverno-policies.podSecurityBaseline" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "disallow-host-ports" }}
{{- if eq (include "kyverno-policies.podSecurityBaseline" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "disallow-host-process" }}
{{- if eq (include "kyverno-policies.podSecurityBaseline" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "disallow-privileged-containers" }}
{{- if eq (include "kyverno-policies.podSecurityBaseline" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "disallow-proc-mount" }}
{{- if eq (include "kyverno-policies.podSecurityBaseline" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "disallow-selinux" }}
{{- if eq (include "kyverno-policies.podSecurityBaseline" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "restrict-apparmor-profiles" }}
{{- if eq (include "kyverno-policies.podSecurityBaseline" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "restrict-seccomp" }}
{{- if eq (include "kyverno-policies.podSecurityBaseline" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "restrict-sysctls" }}
{{- if eq (include "kyverno-policies.podSecurityBaseline" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "require-non-root-groups" }}
{{- if eq (include "kyverno-policies.podSecurityOther" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
{{- if eq (include "kyverno-policies.podSecurityRestricted" (merge (dict "name" $name) .)) "true" }}
{{- include "kyverno-policies.supportedKyvernoCheck" (dict "top" . "ver" ">= 1.6.0-0") }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "disallow-privilege-escalation" }}
{{- if eq (include "kyverno-policies.podSecurityRestricted" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "require-run-as-non-root-user" }}
{{- if eq (include "kyverno-policies.podSecurityRestricted" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "require-run-as-nonroot" }}
{{- if eq (include "kyverno-policies.podSecurityRestricted" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{- $name := "restrict-seccomp-strict" }}
{{- if eq (include "kyverno-policies.podSecurityRestricted" (merge (dict "name" $name) .)) "true" }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
{{- if eq (include "kyverno-policies.podSecurityRestricted" (merge (dict "name" $name) .)) "true" }}
{{- include "kyverno-policies.supportedKyvernoCheck" (dict "top" . "ver" ">= 1.6.0-0") }}
apiVersion: kyverno.io/v1
kind: ClusterPolicy
kind: {{ .Values.policyKind }}
metadata:
name: {{ $name }}
annotations:
Expand Down
8 changes: 6 additions & 2 deletions helm/kyverno-policies/charts/kyverno-policies/values.yaml
Original file line number Diff line number Diff line change
@@ -1,3 +1,7 @@
# -- Policy kind (`ClusterPolicy`, `Policy`)
# Set to `Policy` if you need namespaced policies and not cluster policies
policyKind: ClusterPolicy

# -- Pod Security Standard profile (`baseline`, `restricted`, `privileged`, `custom`).
# For more info https://kyverno.io/policies/pod-security.
podSecurityStandard: baseline
Expand All @@ -20,9 +24,9 @@ includeRestrictedPolicies: []
# For more info: https://kyverno.io/docs/writing-policies/policy-settings/
failurePolicy: Fail

# -- Validation failure action (`audit`, `enforce`).
# -- Validation failure action (`Audit`, `Enforce`).
# For more info https://kyverno.io/docs/writing-policies/validate.
validationFailureAction: audit
validationFailureAction: Audit

# -- Define validationFailureActionByPolicy for specific policies.
# Override the defined `validationFailureAction` with a individual validationFailureAction for individual Policies.
Expand Down
6 changes: 3 additions & 3 deletions vendir.lock.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2,10 +2,10 @@ apiVersion: vendir.k14s.io/v1alpha1
directories:
- contents:
- git:
commitTitle: release 1.10.3 (#8006)...
sha: 8137b4b8afd7ab1464a42e717dc83f1cc471a4a1
commitTitle: release 1.11.4 (#9453)...
sha: 6c88cf5ee12dcf0c3ecfc29b893864216a05b828
tags:
- v1.10.3
- v1.11.4
path: .
path: helm/kyverno-policies/charts/kyverno-policies
kind: LockConfig
2 changes: 1 addition & 1 deletion vendir.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ directories:
- path: .
git:
url: https://github.com/giantswarm/kyverno
ref: v1.10.3
ref: v1.11.4
includePaths:
- charts/kyverno-policies/**
newRootPath: charts/kyverno-policies

0 comments on commit 6fc2acf

Please sign in to comment.