|
48 | 48 | }, |
49 | 49 | "documentString": "Managed OpenShift customers may not edit certain managed resources. A managed resource has a \"hive.openshift.io/managed\": \"true\" label." |
50 | 50 | }, |
51 | | - { |
52 | | - "webhookName": "imagecontentpolicies-validation", |
53 | | - "rules": [ |
54 | | - { |
55 | | - "operations": [ |
56 | | - "CREATE", |
57 | | - "UPDATE" |
58 | | - ], |
59 | | - "apiGroups": [ |
60 | | - "config.openshift.io" |
61 | | - ], |
62 | | - "apiVersions": [ |
63 | | - "*" |
64 | | - ], |
65 | | - "resources": [ |
66 | | - "imagedigestmirrorsets", |
67 | | - "imagetagmirrorsets" |
68 | | - ], |
69 | | - "scope": "Cluster" |
70 | | - }, |
71 | | - { |
72 | | - "operations": [ |
73 | | - "CREATE", |
74 | | - "UPDATE" |
75 | | - ], |
76 | | - "apiGroups": [ |
77 | | - "operator.openshift.io" |
78 | | - ], |
79 | | - "apiVersions": [ |
80 | | - "*" |
81 | | - ], |
82 | | - "resources": [ |
83 | | - "imagecontentsourcepolicies" |
84 | | - ], |
85 | | - "scope": "Cluster" |
86 | | - } |
87 | | - ], |
88 | | - "documentString": "Managed OpenShift customers may not create ImageContentSourcePolicy, ImageDigestMirrorSet, or ImageTagMirrorSet resources that configure mirrors for the entirety of quay.io, registry.redhat.io, nor registry.access.redhat.com. If needed, specific repositories can have mirrors configured, such as quay.io/example." |
89 | | - }, |
90 | | - { |
91 | | - "webhookName": "ingresscontroller-validation", |
92 | | - "rules": [ |
93 | | - { |
94 | | - "operations": [ |
95 | | - "CREATE", |
96 | | - "UPDATE" |
97 | | - ], |
98 | | - "apiGroups": [ |
99 | | - "operator.openshift.io/v1" |
100 | | - ], |
101 | | - "apiVersions": [ |
102 | | - "*" |
103 | | - ], |
104 | | - "resources": [ |
105 | | - "ingresscontroller", |
106 | | - "ingresscontrollers" |
107 | | - ], |
108 | | - "scope": "Namespaced" |
109 | | - } |
110 | | - ], |
111 | | - "documentString": "Managed OpenShift Customer may create IngressControllers without necessary taints. This can cause those workloads to be provisioned on infra or master nodes." |
112 | | - }, |
113 | 51 | { |
114 | 52 | "webhookName": "namespace-validation", |
115 | 53 | "rules": [ |
|
154 | 92 | ], |
155 | 93 | "documentString": "Managed OpenShift Customers may use tolerations on Pods that could cause those Pods to be scheduled on infra or master nodes." |
156 | 94 | }, |
157 | | - { |
158 | | - "webhookName": "prometheusrule-validation", |
159 | | - "rules": [ |
160 | | - { |
161 | | - "operations": [ |
162 | | - "CREATE", |
163 | | - "UPDATE", |
164 | | - "DELETE" |
165 | | - ], |
166 | | - "apiGroups": [ |
167 | | - "monitoring.coreos.com" |
168 | | - ], |
169 | | - "apiVersions": [ |
170 | | - "*" |
171 | | - ], |
172 | | - "resources": [ |
173 | | - "prometheusrules" |
174 | | - ], |
175 | | - "scope": "Namespaced" |
176 | | - } |
177 | | - ], |
178 | | - "documentString": "Managed OpenShift Customers may not create PrometheusRule in namespaces managed by Red Hat." |
179 | | - }, |
180 | 95 | { |
181 | 96 | "webhookName": "regular-user-validation", |
182 | 97 | "rules": [ |
|
233 | 148 | "clusterversions", |
234 | 149 | "clusterversions/status", |
235 | 150 | "schedulers", |
236 | | - "apiservers", |
237 | | - "proxies" |
238 | | - ], |
239 | | - "scope": "*" |
240 | | - }, |
241 | | - { |
242 | | - "operations": [ |
243 | | - "CREATE", |
244 | | - "UPDATE", |
245 | | - "DELETE" |
246 | | - ], |
247 | | - "apiGroups": [ |
248 | | - "" |
249 | | - ], |
250 | | - "apiVersions": [ |
251 | | - "*" |
252 | | - ], |
253 | | - "resources": [ |
254 | | - "configmaps" |
| 151 | + "apiservers" |
255 | 152 | ], |
256 | 153 | "scope": "*" |
257 | 154 | }, |
|
260 | 157 | "*" |
261 | 158 | ], |
262 | 159 | "apiGroups": [ |
263 | | - "machineconfiguration.openshift.io" |
| 160 | + "operator.openshift.io" |
264 | 161 | ], |
265 | 162 | "apiVersions": [ |
266 | 163 | "*" |
267 | 164 | ], |
268 | 165 | "resources": [ |
269 | | - "machineconfigs", |
270 | | - "machineconfigpools" |
| 166 | + "kubeapiservers", |
| 167 | + "openshiftapiservers" |
271 | 168 | ], |
272 | 169 | "scope": "*" |
273 | 170 | }, |
|
276 | 173 | "*" |
277 | 174 | ], |
278 | 175 | "apiGroups": [ |
279 | | - "operator.openshift.io" |
| 176 | + "" |
280 | 177 | ], |
281 | 178 | "apiVersions": [ |
282 | 179 | "*" |
283 | 180 | ], |
284 | 181 | "resources": [ |
285 | | - "kubeapiservers", |
286 | | - "openshiftapiservers" |
| 182 | + "nodes", |
| 183 | + "nodes/*" |
287 | 184 | ], |
288 | 185 | "scope": "*" |
289 | 186 | }, |
|
320 | 217 | "scope": "*" |
321 | 218 | } |
322 | 219 | ], |
323 | | - "documentString": "Managed OpenShift customers may not manage any objects in the following APIgroups [admissionregistration.k8s.io config.openshift.io operator.openshift.io network.openshift.io cloudcredential.openshift.io machine.openshift.io managed.openshift.io machineconfiguration.openshift.io autoscaling.openshift.io addons.managed.openshift.io ocmagent.managed.openshift.io splunkforwarder.managed.openshift.io upgrade.managed.openshift.io cloudingress.managed.openshift.io], nor may Managed OpenShift customers alter the APIServer, KubeAPIServer, OpenShiftAPIServer, ClusterVersion, Proxy or SubjectPermission objects." |
324 | | - }, |
325 | | - { |
326 | | - "webhookName": "regular-user-validation-osd", |
327 | | - "rules": [ |
328 | | - { |
329 | | - "operations": [ |
330 | | - "*" |
331 | | - ], |
332 | | - "apiGroups": [ |
333 | | - "" |
334 | | - ], |
335 | | - "apiVersions": [ |
336 | | - "*" |
337 | | - ], |
338 | | - "resources": [ |
339 | | - "nodes", |
340 | | - "nodes/*" |
341 | | - ], |
342 | | - "scope": "*" |
343 | | - } |
344 | | - ], |
345 | | - "documentString": "Managed OpenShift customers may not manage any objects in the following APIgroups [], nor may Managed OpenShift customers alter the Node objects." |
| 220 | + "documentString": "Managed OpenShift customers may not manage any objects in the following APIgroups [network.openshift.io cloudcredential.openshift.io managed.openshift.io ocmagent.managed.openshift.io upgrade.managed.openshift.io config.openshift.io operator.openshift.io machine.openshift.io admissionregistration.k8s.io addons.managed.openshift.io cloudingress.managed.openshift.io splunkforwarder.managed.openshift.io autoscaling.openshift.io], nor may Managed OpenShift customers alter the APIServer, KubeAPIServer, OpenShiftAPIServer, ClusterVersion, Node or SubjectPermission objects." |
346 | 221 | }, |
347 | 222 | { |
348 | 223 | "webhookName": "scc-validation", |
|
364 | 239 | "scope": "Cluster" |
365 | 240 | } |
366 | 241 | ], |
367 | | - "documentString": "Managed OpenShift Customers may not modify the following default SCCs: [anyuid hostaccess hostmount-anyuid hostnetwork hostnetwork-v2 node-exporter nonroot nonroot-v2 privileged restricted restricted-v2]" |
| 242 | + "documentString": "Managed OpenShift Customers may not modify the following default SCCs: [anyuid hostaccess hostmount-anyuid hostnetwork node-exporter nonroot privileged restricted]" |
368 | 243 | }, |
369 | 244 | { |
370 | 245 | "webhookName": "techpreviewnoupgrade-validation", |
|
0 commit comments