Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

operator [N] [CI] kyverno-operator (1.12.6) #5290

Closed

Conversation

selenehyun
Copy link
Contributor

Thanks submitting your Operator. Please check below list before you create your Pull Request.

New Submissions

Updates to existing Operators

  • Did you create a ci.yaml file according to the update instructions?
  • Is your new CSV pointing to the previous version with the replaces property if you chose replaces-mode via the updateGraph property in ci.yaml?
  • Is your new CSV referenced in the appropriate channel defined in the package.yaml or annotations.yaml ?
  • Have you tested an update to your Operator when deployed via OLM?
  • Is your submission signed?

Your submission should not

  • Modify more than one operator
  • Modify an Operator you don't own
  • Rename an operator - please remove and add with a different name instead
  • Modify any files outside the above mentioned folders
  • Contain more than one commit. Please squash your commits.

Operator Description must contain (in order)

  1. Description about the managed Application and where to find more information
  2. Features and capabilities of your Operator and how to use it
  3. Any manual steps about potential pre-requisites for using your Operator

Operator Metadata should contain

  • Human readable name and 1-liner description about your Operator
  • Valid category name1
  • One of the pre-defined capability levels2
  • Links to the maintainer, source code and documentation
  • Example templates for all Custom Resource Definitions intended to be used
  • A quadratic logo

Remember that you can preview your CSV here.

--

1 If you feel your Operator does not fit any of the pre-defined categories, file an issue against this repo and explain your need

2 For more information see here

@openshift-ci openshift-ci bot requested review from haripate and mporrato November 12, 2024 06:05
@github-actions github-actions bot changed the title operator kyverno-operator (1.12.6) operator [N] [CI] kyverno-operator (1.12.6) Nov 12, 2024
@selenehyun selenehyun force-pushed the kyverno-operator-1.12.6 branch 2 times, most recently from 03c6d1c to eb2c220 Compare November 12, 2024 06:17
Copy link
Contributor

Dear @selenehyun,
your operator is in package manifest format. This format is not supported anymore. Please convert it to bundle format. More info

@selenehyun selenehyun force-pushed the kyverno-operator-1.12.6 branch from eb2c220 to fe1375b Compare November 12, 2024 06:22
Copy link
Contributor

Dockerfile or bundle.Dockerfile is added/changed. Note that for security reasons none of these files are going to be used when building bundle. Docker file will be generated and all label information is taken from annotations.yaml.

@selenehyun selenehyun force-pushed the kyverno-operator-1.12.6 branch from fe1375b to a2ed896 Compare November 12, 2024 06:28
Copy link
Contributor

Dear @selenehyun,
Some errors and/or warnings were found while doing the check of your operator (kyverno-operator/1.12.6) against the entire suite of validators for Operator Framework with Operator-SDK version v1.36.0 and the command $ operator-sdk bundle validate <bundle-path> --select-optional suite=operatorframework.

Errors (:bug:) must be fixed while warnings (:warning:) are informative, and fixing them might improve the quality of your solution.

Type Message
🐛 Value kyverno.io/v1, Kind=GlobalContextEntry: owned CRD "kyverno.io/v1, Kind=GlobalContextEntry" not found in bundle "kyverno-operator.v1.12.6"
🐛 Value kyverno.io/v1, Kind=ClusterBackgroundScanReport: owned CRD "kyverno.io/v1, Kind=ClusterBackgroundScanReport" not found in bundle "kyverno-operator.v1.12.6"
🐛 Value kyverno.io/v1, Kind=BackgroundScanReport: owned CRD "kyverno.io/v1, Kind=BackgroundScanReport" not found in bundle "kyverno-operator.v1.12.6"
🐛 Value kyverno.io/v1, Kind=UpdateRequest: owned CRD "kyverno.io/v1, Kind=UpdateRequest" not found in bundle "kyverno-operator.v1.12.6"
🐛 Value kyverno.io/v1, Kind=ClusterCleanupPolicy: owned CRD "kyverno.io/v1, Kind=ClusterCleanupPolicy" not found in bundle "kyverno-operator.v1.12.6"
🐛 Value wgpolicyk8s.io/v1, Kind=ClusterPolicyReport: owned CRD "wgpolicyk8s.io/v1, Kind=ClusterPolicyReport" not found in bundle "kyverno-operator.v1.12.6"
🐛 Value wgpolicyk8s.io/v1, Kind=PolicyReport: owned CRD "wgpolicyk8s.io/v1, Kind=PolicyReport" not found in bundle "kyverno-operator.v1.12.6"
🐛 Value kyverno.io/v1, Kind=CleanupPolicy: owned CRD "kyverno.io/v1, Kind=CleanupPolicy" not found in bundle "kyverno-operator.v1.12.6"
🐛 Value kyverno.io/v1, Kind=PolicyException: owned CRD "kyverno.io/v1, Kind=PolicyException" not found in bundle "kyverno-operator.v1.12.6"
🐛 Value kyverno.io/v1, Kind=AdmissionReport: owned CRD "kyverno.io/v1, Kind=AdmissionReport" not found in bundle "kyverno-operator.v1.12.6"
🐛 Value kyverno.io/v1, Kind=ClusterAdmissionReport: owned CRD "kyverno.io/v1, Kind=ClusterAdmissionReport" not found in bundle "kyverno-operator.v1.12.6"
🐛 Value wgpolicyk8s.io/v1alpha2, Kind=ClusterPolicyReport: CRD "wgpolicyk8s.io/v1alpha2, Kind=ClusterPolicyReport" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value wgpolicyk8s.io/v1alpha2, Kind=PolicyReport: CRD "wgpolicyk8s.io/v1alpha2, Kind=PolicyReport" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v1alpha2, Kind=AdmissionReport: CRD "kyverno.io/v1alpha2, Kind=AdmissionReport" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2alpha1, Kind=ClusterCleanupPolicy: CRD "kyverno.io/v2alpha1, Kind=ClusterCleanupPolicy" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2, Kind=PolicyException: CRD "kyverno.io/v2, Kind=PolicyException" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2, Kind=CleanupPolicy: CRD "kyverno.io/v2, Kind=CleanupPolicy" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2beta1, Kind=CleanupPolicy: CRD "kyverno.io/v2beta1, Kind=CleanupPolicy" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2beta1, Kind=ClusterCleanupPolicy: CRD "kyverno.io/v2beta1, Kind=ClusterCleanupPolicy" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2alpha1, Kind=PolicyException: CRD "kyverno.io/v2alpha1, Kind=PolicyException" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2, Kind=UpdateRequest: CRD "kyverno.io/v2, Kind=UpdateRequest" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2, Kind=AdmissionReport: CRD "kyverno.io/v2, Kind=AdmissionReport" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2, Kind=ClusterBackgroundScanReport: CRD "kyverno.io/v2, Kind=ClusterBackgroundScanReport" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2, Kind=ClusterCleanupPolicy: CRD "kyverno.io/v2, Kind=ClusterCleanupPolicy" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2, Kind=ClusterAdmissionReport: CRD "kyverno.io/v2, Kind=ClusterAdmissionReport" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v1alpha2, Kind=ClusterAdmissionReport: CRD "kyverno.io/v1alpha2, Kind=ClusterAdmissionReport" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2, Kind=BackgroundScanReport: CRD "kyverno.io/v2, Kind=BackgroundScanReport" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2alpha1, Kind=CleanupPolicy: CRD "kyverno.io/v2alpha1, Kind=CleanupPolicy" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2beta1, Kind=PolicyException: CRD "kyverno.io/v2beta1, Kind=PolicyException" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v1beta1, Kind=UpdateRequest: CRD "kyverno.io/v1beta1, Kind=UpdateRequest" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v1alpha2, Kind=BackgroundScanReport: CRD "kyverno.io/v1alpha2, Kind=BackgroundScanReport" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v1alpha2, Kind=ClusterBackgroundScanReport: CRD "kyverno.io/v1alpha2, Kind=ClusterBackgroundScanReport" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value kyverno.io/v2alpha1, Kind=GlobalContextEntry: CRD "kyverno.io/v2alpha1, Kind=GlobalContextEntry" is present in bundle "kyverno-operator.v1.12.6" but not defined in CSV
🐛 Value /, Kind=ClusterEphemeralReport: example must have a provided API
🐛 Value /, Kind=Policy: example must have a provided API
🐛 Value /, Kind=BackgroundScanReport: example must have a provided API
🐛 Value /, Kind=ClusterBackgroundScanReport: example must have a provided API
🐛 Value /, Kind=UpdateRequest: example must have a provided API
🐛 Value /, Kind=EphemeralReport: example must have a provided API
🐛 Value /, Kind=ClusterPolicyReport: example must have a provided API
🐛 Value /, Kind=AdmissionReport: example must have a provided API
🐛 Value /, Kind=GlobalContextEntry: example must have a provided API
🐛 Value /, Kind=ClusterCleanupPolicy: example must have a provided API
🐛 Value /, Kind=ClusterAdmissionReport: example must have a provided API
🐛 Value /, Kind=PolicyReport: example must have a provided API
🐛 Value /, Kind=PolicyException: example must have a provided API
🐛 Value /, Kind=CleanupPolicy: example must have a provided API
🐛 Value kyverno: error validating object: metadata.namespace: Forbidden: not allowed on this type. &{map[apiVersion:v1 data:map[defaultRegistry:docker.io enableDefaultRegistryMutation:true excludeGroups:system:nodes generateSuccessEvents:false resourceFilters:[/,kyverno,] [Event,,] [/,kube-system,] [/,kube-public,] [/,kube-node-lease,] [Node,,] [Node/,,] [APIService,,] [APIService/,,] [TokenReview,,] [SubjectAccessReview,,] [SelfSubjectAccessReview,,] [Binding,,] [Pod/binding,,] [ReplicaSet,,] [ReplicaSet/,,] [AdmissionReport,,] [AdmissionReport/,,] [ClusterAdmissionReport,,] [ClusterAdmissionReport/,,] [BackgroundScanReport,,] [BackgroundScanReport/,,] [ClusterBackgroundScanReport,,] [ClusterBackgroundScanReport/,,] [ClusterRole,,kyverno:admission-controller] [ClusterRole,,kyverno:admission-controller:core] [ClusterRole,,kyverno:admission-controller:additional] [ClusterRole,,kyverno:background-controller] [ClusterRole,,kyverno:background-controller:core] [ClusterRole,,kyverno:background-controller:additional] [ClusterRole,,kyverno:cleanup-controller] [ClusterRole,,kyverno:cleanup-controller:core] [ClusterRole,,kyverno:cleanup-controller:additional] [ClusterRole,,kyverno:reports-controller] [ClusterRole,,kyverno:reports-controller:core] [ClusterRole,,kyverno:reports-controller:additional] [ClusterRoleBinding,,kyverno:admission-controller] [ClusterRoleBinding,,kyverno:background-controller] [ClusterRoleBinding,,kyverno:cleanup-controller] [ClusterRoleBinding,,kyverno:reports-controller] [ServiceAccount,kyverno,kyverno-admission-controller] [ServiceAccount/,kyverno,kyverno-admission-controller] [ServiceAccount,kyverno,kyverno-background-controller] [ServiceAccount/,kyverno,kyverno-background-controller] [ServiceAccount,kyverno,kyverno-cleanup-controller] [ServiceAccount/,kyverno,kyverno-cleanup-controller] [ServiceAccount,kyverno,kyverno-reports-controller] [ServiceAccount/,kyverno,kyverno-reports-controller] [Role,kyverno,kyverno:admission-controller] [Role,kyverno,kyverno:background-controller] [Role,kyverno,kyverno:cleanup-controller] [Role,kyverno,kyverno:reports-controller] [RoleBinding,kyverno,kyverno:admission-controller] [RoleBinding,kyverno,kyverno:background-controller] [RoleBinding,kyverno,kyverno:cleanup-controller] [RoleBinding,kyverno,kyverno:reports-controller] [ConfigMap,kyverno,kyverno] [ConfigMap,kyverno,kyverno-metrics] [Deployment,kyverno,kyverno-admission-controller] [Deployment/,kyverno,kyverno-admission-controller] [Deployment,kyverno,kyverno-background-controller] [Deployment/,kyverno,kyverno-background-controller] [Deployment,kyverno,kyverno-cleanup-controller] [Deployment/,kyverno,kyverno-cleanup-controller] [Deployment,kyverno,kyverno-reports-controller] [Deployment/,kyverno,kyverno-reports-controller] [Pod,kyverno,kyverno-admission-controller-] [Pod/,kyverno,kyverno-admission-controller-] [Pod,kyverno,kyverno-background-controller-] [Pod/,kyverno,kyverno-background-controller-] [Pod,kyverno,kyverno-cleanup-controller-] [Pod/,kyverno,kyverno-cleanup-controller-] [Pod,kyverno,kyverno-reports-controller-] [Pod/,kyverno,kyverno-reports-controller-] [Job,kyverno,kyverno-hook-pre-delete] [Job/,kyverno,kyverno-hook-pre-delete] [NetworkPolicy,kyverno,kyverno-admission-controller] [NetworkPolicy/,kyverno,kyverno-admission-controller] [NetworkPolicy,kyverno,kyverno-background-controller] [NetworkPolicy/,kyverno,kyverno-background-controller] [NetworkPolicy,kyverno,kyverno-cleanup-controller] [NetworkPolicy/,kyverno,kyverno-cleanup-controller] [NetworkPolicy,kyverno,kyverno-reports-controller] [NetworkPolicy/,kyverno,kyverno-reports-controller] [PodDisruptionBudget,kyverno,kyverno-admission-controller] [PodDisruptionBudget/,kyverno,kyverno-admission-controller] [PodDisruptionBudget,kyverno,kyverno-background-controller] [PodDisruptionBudget/,kyverno,kyverno-background-controller] [PodDisruptionBudget,kyverno,kyverno-cleanup-controller] [PodDisruptionBudget/,kyverno,kyverno-cleanup-controller] [PodDisruptionBudget,kyverno,kyverno-reports-controller] [PodDisruptionBudget/,kyverno,kyverno-reports-controller] [Service,kyverno,kyverno-svc] [Service/,kyverno,kyverno-svc] [Service,kyverno,kyverno-svc-metrics] [Service/,kyverno,kyverno-svc-metrics] [Service,kyverno,kyverno-background-controller-metrics] [Service/,kyverno,kyverno-background-controller-metrics] [Service,kyverno,kyverno-cleanup-controller] [Service/,kyverno,kyverno-cleanup-controller] [Service,kyverno,kyverno-cleanup-controller-metrics] [Service/,kyverno,kyverno-cleanup-controller-metrics] [Service,kyverno,kyverno-reports-controller-metrics] [Service/,kyverno,kyverno-reports-controller-metrics] [ServiceMonitor,kyverno,kyverno-admission-controller] [ServiceMonitor,kyverno,kyverno-background-controller] [ServiceMonitor,kyverno,kyverno-cleanup-controller] [ServiceMonitor,kyverno,kyverno-reports-controller] [Secret,kyverno,kyverno-svc.kyverno.svc.] [Secret,kyverno,kyverno-cleanup-controller.kyverno.svc.] webhookAnnotations:{"admissions.enforcer/disabled":"true"} webhooks:[{"namespaceSelector":{"matchExpressions":[{"key":"kubernetes.io/metadata.name","operator":"NotIn","values":["kube-system"]},{"key":"kubernetes.io/metadata.name","operator":"NotIn","values":["kyverno"]}],"matchLabels":null}}]] kind:ConfigMap metadata:map[annotations:map[helm.sh/resource-policy:keep] labels:map[app.kubernetes.io/component:config app.kubernetes.io/instance:kyverno app.kubernetes.io/part-of:kyverno app.kubernetes.io/version:v1.12.6] name:kyverno namespace:kyverno]]}
🐛 Value kyverno-metrics: error validating object: metadata.namespace: Forbidden: not allowed on this type. &{map[apiVersion:v1 data:map[bucketBoundaries:0.005, 0.01, 0.025, 0.05, 0.1, 0.25, 0.5, 1, 2.5, 5, 10, 15, 20, 25, 30 namespaces:{"exclude":[],"include":[]}] kind:ConfigMap metadata:map[labels:map[app.kubernetes.io/component:config app.kubernetes.io/instance:kyverno app.kubernetes.io/part-of:kyverno app.kubernetes.io/version:v1.12.6] name:kyverno-metrics namespace:kyverno]]}
🐛 Value batch/v1, Kind=CronJob: unsupported media type registry+v1 for bundle object
🐛 Value kyverno-svc: error validating object: metadata.namespace: Forbidden: not allowed on this type. &{map[apiVersion:v1 kind:Service metadata:map[labels:map[app.kubernetes.io/component:admission-controller app.kubernetes.io/instance:kyverno app.kubernetes.io/part-of:kyverno app.kubernetes.io/version:v1.12.6] name:kyverno-svc namespace:kyverno] spec:map[ports:[map[name:https port:443 protocol:TCP targetPort:https]] selector:map[app.kubernetes.io/component:admission-controller app.kubernetes.io/instance:kyverno app.kubernetes.io/part-of:kyverno] type:ClusterIP]]}
⚠️ Value kyverno.io/v1, Kind=GlobalContextEntry: provided API should have an example annotation
⚠️ Value kyverno.io/v1, Kind=ClusterCleanupPolicy: provided API should have an example annotation
⚠️ Value reports.kyverno.io/v1, Kind=ClusterEphemeralReport: provided API should have an example annotation
⚠️ Value kyverno.io/v1, Kind=CleanupPolicy: provided API should have an example annotation
⚠️ Value kyverno.io/v1, Kind=ClusterAdmissionReport: provided API should have an example annotation
⚠️ Value kyverno.io/v1, Kind=ClusterBackgroundScanReport: provided API should have an example annotation
⚠️ Value reports.kyverno.io/v1, Kind=EphemeralReport: provided API should have an example annotation
⚠️ Value kyverno.io/v1, Kind=AdmissionReport: provided API should have an example annotation
⚠️ Value kyverno.io/v1, Kind=Policy: provided API should have an example annotation
⚠️ Value kyverno.io/v1, Kind=BackgroundScanReport: provided API should have an example annotation
⚠️ Value kyverno.io/v1, Kind=PolicyException: provided API should have an example annotation
⚠️ Value kyverno.io/v1, Kind=UpdateRequest: provided API should have an example annotation
⚠️ Value wgpolicyk8s.io/v1, Kind=ClusterPolicyReport: provided API should have an example annotation
⚠️ Value wgpolicyk8s.io/v1, Kind=PolicyReport: provided API should have an example annotation
⚠️ Value kyverno-operator.v1.12.6: this bundle is using APIs which were deprecated and removed in v1.25. More info: https://kubernetes.io/docs/reference/using-api/deprecation-guide/#v1-25. Migrate the API(s) for events: (["ClusterServiceVersion.Spec.InstallStrategy.StrategySpec.ClusterPermissions[0].Rules[6]" "ClusterServiceVersion.Spec.InstallStrategy.StrategySpec.ClusterPermissions[1].Rules[3]" "ClusterServiceVersion.Spec.InstallStrategy.StrategySpec.ClusterPermissions[2].Rules[7]" "ClusterServiceVersion.Spec.InstallStrategy.StrategySpec.ClusterPermissions[4].Rules[5]"])

@selenehyun selenehyun force-pushed the kyverno-operator-1.12.6 branch from a2ed896 to 0227cc8 Compare November 12, 2024 06:40
Copy link
Contributor

Dear @selenehyun,
Some errors and/or warnings were found while doing the check of your operator (kyverno-operator/1.12.6) against the entire suite of validators for Operator Framework with Operator-SDK version v1.36.0 and the command $ operator-sdk bundle validate <bundle-path> --select-optional suite=operatorframework.

Errors (:bug:) must be fixed while warnings (:warning:) are informative, and fixing them might improve the quality of your solution.

Type Message
🐛 Value /, Kind=ClusterAdmissionReport: example must have a provided API
🐛 Value /, Kind=ClusterCleanupPolicy: example must have a provided API
🐛 Value /, Kind=Policy: example must have a provided API
🐛 Value /, Kind=AdmissionReport: example must have a provided API
🐛 Value /, Kind=UpdateRequest: example must have a provided API
🐛 Value /, Kind=ClusterPolicyReport: example must have a provided API
🐛 Value /, Kind=CleanupPolicy: example must have a provided API
🐛 Value /, Kind=PolicyException: example must have a provided API
🐛 Value /, Kind=BackgroundScanReport: example must have a provided API
🐛 Value /, Kind=ClusterBackgroundScanReport: example must have a provided API
🐛 Value /, Kind=GlobalContextEntry: example must have a provided API
🐛 Value /, Kind=EphemeralReport: example must have a provided API
🐛 Value /, Kind=PolicyReport: example must have a provided API
🐛 Value /, Kind=ClusterEphemeralReport: example must have a provided API
🐛 Value kyverno: error validating object: metadata.namespace: Forbidden: not allowed on this type. &{map[apiVersion:v1 data:map[defaultRegistry:docker.io enableDefaultRegistryMutation:true excludeGroups:system:nodes generateSuccessEvents:false resourceFilters:[/,kyverno,] [Event,,] [/,kube-system,] [/,kube-public,] [/,kube-node-lease,] [Node,,] [Node/,,] [APIService,,] [APIService/,,] [TokenReview,,] [SubjectAccessReview,,] [SelfSubjectAccessReview,,] [Binding,,] [Pod/binding,,] [ReplicaSet,,] [ReplicaSet/,,] [AdmissionReport,,] [AdmissionReport/,,] [ClusterAdmissionReport,,] [ClusterAdmissionReport/,,] [BackgroundScanReport,,] [BackgroundScanReport/,,] [ClusterBackgroundScanReport,,] [ClusterBackgroundScanReport/,,] [ClusterRole,,kyverno:admission-controller] [ClusterRole,,kyverno:admission-controller:core] [ClusterRole,,kyverno:admission-controller:additional] [ClusterRole,,kyverno:background-controller] [ClusterRole,,kyverno:background-controller:core] [ClusterRole,,kyverno:background-controller:additional] [ClusterRole,,kyverno:cleanup-controller] [ClusterRole,,kyverno:cleanup-controller:core] [ClusterRole,,kyverno:cleanup-controller:additional] [ClusterRole,,kyverno:reports-controller] [ClusterRole,,kyverno:reports-controller:core] [ClusterRole,,kyverno:reports-controller:additional] [ClusterRoleBinding,,kyverno:admission-controller] [ClusterRoleBinding,,kyverno:background-controller] [ClusterRoleBinding,,kyverno:cleanup-controller] [ClusterRoleBinding,,kyverno:reports-controller] [ServiceAccount,kyverno,kyverno-admission-controller] [ServiceAccount/,kyverno,kyverno-admission-controller] [ServiceAccount,kyverno,kyverno-background-controller] [ServiceAccount/,kyverno,kyverno-background-controller] [ServiceAccount,kyverno,kyverno-cleanup-controller] [ServiceAccount/,kyverno,kyverno-cleanup-controller] [ServiceAccount,kyverno,kyverno-reports-controller] [ServiceAccount/,kyverno,kyverno-reports-controller] [Role,kyverno,kyverno:admission-controller] [Role,kyverno,kyverno:background-controller] [Role,kyverno,kyverno:cleanup-controller] [Role,kyverno,kyverno:reports-controller] [RoleBinding,kyverno,kyverno:admission-controller] [RoleBinding,kyverno,kyverno:background-controller] [RoleBinding,kyverno,kyverno:cleanup-controller] [RoleBinding,kyverno,kyverno:reports-controller] [ConfigMap,kyverno,kyverno] [ConfigMap,kyverno,kyverno-metrics] [Deployment,kyverno,kyverno-admission-controller] [Deployment/,kyverno,kyverno-admission-controller] [Deployment,kyverno,kyverno-background-controller] [Deployment/,kyverno,kyverno-background-controller] [Deployment,kyverno,kyverno-cleanup-controller] [Deployment/,kyverno,kyverno-cleanup-controller] [Deployment,kyverno,kyverno-reports-controller] [Deployment/,kyverno,kyverno-reports-controller] [Pod,kyverno,kyverno-admission-controller-] [Pod/,kyverno,kyverno-admission-controller-] [Pod,kyverno,kyverno-background-controller-] [Pod/,kyverno,kyverno-background-controller-] [Pod,kyverno,kyverno-cleanup-controller-] [Pod/,kyverno,kyverno-cleanup-controller-] [Pod,kyverno,kyverno-reports-controller-] [Pod/,kyverno,kyverno-reports-controller-] [Job,kyverno,kyverno-hook-pre-delete] [Job/,kyverno,kyverno-hook-pre-delete] [NetworkPolicy,kyverno,kyverno-admission-controller] [NetworkPolicy/,kyverno,kyverno-admission-controller] [NetworkPolicy,kyverno,kyverno-background-controller] [NetworkPolicy/,kyverno,kyverno-background-controller] [NetworkPolicy,kyverno,kyverno-cleanup-controller] [NetworkPolicy/,kyverno,kyverno-cleanup-controller] [NetworkPolicy,kyverno,kyverno-reports-controller] [NetworkPolicy/,kyverno,kyverno-reports-controller] [PodDisruptionBudget,kyverno,kyverno-admission-controller] [PodDisruptionBudget/,kyverno,kyverno-admission-controller] [PodDisruptionBudget,kyverno,kyverno-background-controller] [PodDisruptionBudget/,kyverno,kyverno-background-controller] [PodDisruptionBudget,kyverno,kyverno-cleanup-controller] [PodDisruptionBudget/,kyverno,kyverno-cleanup-controller] [PodDisruptionBudget,kyverno,kyverno-reports-controller] [PodDisruptionBudget/,kyverno,kyverno-reports-controller] [Service,kyverno,kyverno-svc] [Service/,kyverno,kyverno-svc] [Service,kyverno,kyverno-svc-metrics] [Service/,kyverno,kyverno-svc-metrics] [Service,kyverno,kyverno-background-controller-metrics] [Service/,kyverno,kyverno-background-controller-metrics] [Service,kyverno,kyverno-cleanup-controller] [Service/,kyverno,kyverno-cleanup-controller] [Service,kyverno,kyverno-cleanup-controller-metrics] [Service/,kyverno,kyverno-cleanup-controller-metrics] [Service,kyverno,kyverno-reports-controller-metrics] [Service/,kyverno,kyverno-reports-controller-metrics] [ServiceMonitor,kyverno,kyverno-admission-controller] [ServiceMonitor,kyverno,kyverno-background-controller] [ServiceMonitor,kyverno,kyverno-cleanup-controller] [ServiceMonitor,kyverno,kyverno-reports-controller] [Secret,kyverno,kyverno-svc.kyverno.svc.] [Secret,kyverno,kyverno-cleanup-controller.kyverno.svc.] webhookAnnotations:{"admissions.enforcer/disabled":"true"} webhooks:[{"namespaceSelector":{"matchExpressions":[{"key":"kubernetes.io/metadata.name","operator":"NotIn","values":["kube-system"]},{"key":"kubernetes.io/metadata.name","operator":"NotIn","values":["kyverno"]}],"matchLabels":null}}]] kind:ConfigMap metadata:map[annotations:map[helm.sh/resource-policy:keep] labels:map[app.kubernetes.io/component:config app.kubernetes.io/instance:kyverno app.kubernetes.io/part-of:kyverno app.kubernetes.io/version:v1.12.6] name:kyverno namespace:kyverno]]}
🐛 Value kyverno-metrics: error validating object: metadata.namespace: Forbidden: not allowed on this type. &{map[apiVersion:v1 data:map[bucketBoundaries:0.005, 0.01, 0.025, 0.05, 0.1, 0.25, 0.5, 1, 2.5, 5, 10, 15, 20, 25, 30 namespaces:{"exclude":[],"include":[]}] kind:ConfigMap metadata:map[labels:map[app.kubernetes.io/component:config app.kubernetes.io/instance:kyverno app.kubernetes.io/part-of:kyverno app.kubernetes.io/version:v1.12.6] name:kyverno-metrics namespace:kyverno]]}
🐛 Value batch/v1, Kind=CronJob: unsupported media type registry+v1 for bundle object
🐛 Value kyverno-svc: error validating object: metadata.namespace: Forbidden: not allowed on this type. &{map[apiVersion:v1 kind:Service metadata:map[labels:map[app.kubernetes.io/component:admission-controller app.kubernetes.io/instance:kyverno app.kubernetes.io/part-of:kyverno app.kubernetes.io/version:v1.12.6] name:kyverno-svc namespace:kyverno] spec:map[ports:[map[name:https port:443 protocol:TCP targetPort:https]] selector:map[app.kubernetes.io/component:admission-controller app.kubernetes.io/instance:kyverno app.kubernetes.io/part-of:kyverno] type:ClusterIP]]}
⚠️ Value kyverno.io/v1alpha2, Kind=AdmissionReport: provided API should have an example annotation
⚠️ Value kyverno.io/v1alpha2, Kind=ClusterBackgroundScanReport: provided API should have an example annotation
⚠️ Value kyverno.io/v1beta1, Kind=UpdateRequest: provided API should have an example annotation
⚠️ Value kyverno.io/v2, Kind=CleanupPolicy: provided API should have an example annotation
⚠️ Value kyverno.io/v1, Kind=Policy: provided API should have an example annotation
⚠️ Value kyverno.io/v2alpha1, Kind=GlobalContextEntry: provided API should have an example annotation
⚠️ Value wgpolicyk8s.io/v1alpha2, Kind=ClusterPolicyReport: provided API should have an example annotation
⚠️ Value reports.kyverno.io/v1, Kind=EphemeralReport: provided API should have an example annotation
⚠️ Value kyverno.io/v2, Kind=PolicyException: provided API should have an example annotation
⚠️ Value kyverno.io/v1alpha2, Kind=ClusterAdmissionReport: provided API should have an example annotation
⚠️ Value kyverno.io/v1alpha2, Kind=BackgroundScanReport: provided API should have an example annotation
⚠️ Value wgpolicyk8s.io/v1alpha2, Kind=PolicyReport: provided API should have an example annotation
⚠️ Value reports.kyverno.io/v1, Kind=ClusterEphemeralReport: provided API should have an example annotation
⚠️ Value kyverno.io/v2, Kind=ClusterCleanupPolicy: provided API should have an example annotation
⚠️ Value kyverno-operator.v1.12.6: this bundle is using APIs which were deprecated and removed in v1.25. More info: https://kubernetes.io/docs/reference/using-api/deprecation-guide/#v1-25. Migrate the API(s) for events: (["ClusterServiceVersion.Spec.InstallStrategy.StrategySpec.ClusterPermissions[0].Rules[6]" "ClusterServiceVersion.Spec.InstallStrategy.StrategySpec.ClusterPermissions[1].Rules[3]" "ClusterServiceVersion.Spec.InstallStrategy.StrategySpec.ClusterPermissions[2].Rules[7]" "ClusterServiceVersion.Spec.InstallStrategy.StrategySpec.ClusterPermissions[4].Rules[5]"])

@selenehyun selenehyun closed this Nov 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

Successfully merging this pull request may close these issues.

3 participants