Skip to content

Commit 63c46a0

Browse files
ci: Update golang version for CLI tests
Signed-off-by: Luc Chmielowski <luc.chmielowski@nirmata.com>
1 parent c135a68 commit 63c46a0

File tree

10 files changed

+48
-40
lines changed

10 files changed

+48
-40
lines changed

.github/workflows/ci.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ jobs:
4747
- name: Set up Go
4848
uses: actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v6.0.0
4949
with:
50-
go-version: ~1.25.3
50+
go-version: ~1.25.8
5151
- name: Test Policy
5252
run: go run ./cmd/cli/kubectl-kyverno test ../policies
5353
working-directory: kyverno
@@ -69,7 +69,7 @@ jobs:
6969
- name: Set up Go
7070
uses: actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v6.0.0
7171
with:
72-
go-version: ~1.25.3
72+
go-version: ~1.25.8
7373
- name: Lint policies
7474
run: |
7575
set -e

other-mpol/replace-image-registry/artifacthub-pkg.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,4 +19,4 @@ annotations:
1919
kyverno/category: "Sample"
2020
kyverno/kubernetesVersion: "1.23"
2121
kyverno/subject: "Pod"
22-
digest: 2463c641a775bf52901516d24d5a6898298a630ed7b6ec981dcee3354e798a38
22+
digest: 2be43b9a23807316228e9e30b89c619113b84cf96cff589447b9219837d54562

other-mpol/replace-image-registry/replace-image-registry.yaml

Lines changed: 2 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,7 @@ spec:
2222
apiVersions: ["v1"]
2323
operations: ["CREATE", "UPDATE"]
2424
resources: ["pods"]
25-
26-
variables:
27-
- name: stripRegistry
28-
expression: |
29-
string(img) =>
30-
img.contains('/') && img.split('/')[0].contains('.') ?
31-
img.split('/', 2)[1] :
32-
img
33-
25+
3426
mutations:
3527
- patchType: ApplyConfiguration
3628
applyConfiguration:
@@ -64,4 +56,4 @@ spec:
6456
enabled: true
6557

6658
webhookConfiguration:
67-
timeoutSeconds: 10
59+
timeoutSeconds: 10

other/block-stale-images/.chainsaw-test/pods-good.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
spec:
77
containers:
88
- name: kyverno
9-
image: kyverno:latest
9+
image: ghcr.io/kyverno/kyverno:latest
1010
- name: kyverno02
1111
image: ghcr.io/kyverno/kyverno:latest
1212
---

other/block-stale-images/artifacthub-pkg.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,4 +19,4 @@ annotations:
1919
kyverno/category: "Other"
2020
kyverno/kubernetesVersion: "1.23"
2121
kyverno/subject: "Pod"
22-
digest: 4c840db89d0d4d8d79c3ef120d319a93d62638f3e6c82ccbdf863b4f3d60b7aa
22+
digest: 1eb8ff932d2d9b35a2eb6876bf2a2ff3522dc1840076a315ff2996cbb3ea21be

other/verify-image-ivpol/.chainsaw-test/bad.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,5 +5,5 @@ metadata:
55
spec:
66
containers:
77
- name: test-container
8-
image: 'docker.io/mohdcode/kyverno@sha256:b178bb94b508183cddda73829e007c7ae2c6996324b2fc1f1746f2281e635f7a'
8+
image: 'ghcr.io/kyverno/test-verify-image:unsigned'
99
imagePullPolicy: Always

other/verify-image-ivpol/.chainsaw-test/good.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,5 +5,5 @@ metadata:
55
spec:
66
containers:
77
- name: test-container
8-
image: 'docker.io/mohdcode/kyverno@sha256:2215deb786eb4039647d8d2881d1b5290ec2c200e14ba1535b0cdd58b69a1bcf'
8+
image: 'ghcr.io/kyverno/test-verify-image:signed'
99
imagePullPolicy: Always

other/verify-image-ivpol/.chainsaw-test/policy-ready.yaml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,13 @@ metadata:
44
name: verify-image-ivpol
55
status:
66
conditionStatus:
7-
(conditions[?type == 'RBACPermissionsGranted']):
8-
- message: Policy is ready for reporting.
9-
reason: Succeeded
10-
status: "True"
11-
(conditions[?type == 'WebhookConfigured']):
12-
- message: Webhook configured.
13-
reason: Succeeded
14-
status: "True"
15-
type: WebhookConfigured
7+
(conditions[?type == 'RBACPermissionsGranted']):
8+
- message: Policy is ready for reporting.
9+
reason: Succeeded
10+
status: "True"
11+
(conditions[?type == 'WebhookConfigured']):
12+
- message: Webhook configured.
13+
reason: Succeeded
14+
status: "True"
15+
type: WebhookConfigured
1616

other/verify-image-ivpol/artifacthub-pkg.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,4 +19,4 @@ readme: |
1919
annotations:
2020
kyverno/category: "Software Supply Chain Security, EKS Best Practices"
2121
kyverno/subject: "Pod"
22-
digest: c315f0db7538deb20debade15ceb0fcbbdf4e526512acac6af95048dd1ecb0e5
22+
digest: d15b7c6c473fd34424da705a54a27f2bd8d57c2ebf7dde140b8bed6199630c5f

other/verify-image-ivpol/verify-image-ivpol.yaml

Lines changed: 29 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ spec:
1919
webhookConfiguration:
2020
timeoutSeconds: 30
2121
evaluation:
22-
background:
23-
enabled: false
22+
background:
23+
enabled: false
2424
validationActions: [Deny]
2525
matchConstraints:
2626
resourceRules:
@@ -29,18 +29,34 @@ spec:
2929
operations: ["CREATE", "UPDATE"]
3030
resources: ["pods"]
3131
matchImageReferences:
32-
- glob : "docker.io/mohdcode/kyverno*"
32+
- glob : "ghcr.io/kyverno/test-verify-image*"
3333
attestors:
34-
- name: cosign
35-
cosign:
36-
key:
37-
data: |
38-
-----BEGIN PUBLIC KEY-----
39-
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE6QsNef3SKYhJVYSVj+ZfbPwJd0pv
40-
DLYNHXITZkhIzfE+apcxDjCCkDPcJ3A3zvhPATYOIsCxYPch7Q2JdJLsDQ==
41-
-----END PUBLIC KEY-----
34+
- name: notary
35+
notary:
36+
certs:
37+
value: |-
38+
-----BEGIN CERTIFICATE-----
39+
MIIDTTCCAjWgAwIBAgIJAPI+zAzn4s0xMA0GCSqGSIb3DQEBCwUAMEwxCzAJBgNV
40+
BAYTAlVTMQswCQYDVQQIDAJXQTEQMA4GA1UEBwwHU2VhdHRsZTEPMA0GA1UECgwG
41+
Tm90YXJ5MQ0wCwYDVQQDDAR0ZXN0MB4XDTIzMDUyMjIxMTUxOFoXDTMzMDUxOTIx
42+
MTUxOFowTDELMAkGA1UEBhMCVVMxCzAJBgNVBAgMAldBMRAwDgYDVQQHDAdTZWF0
43+
dGxlMQ8wDQYDVQQKDAZOb3RhcnkxDTALBgNVBAMMBHRlc3QwggEiMA0GCSqGSIb3
44+
DQEBAQUAA4IBDwAwggEKAoIBAQDNhTwv+QMk7jEHufFfIFlBjn2NiJaYPgL4eBS+
45+
b+o37ve5Zn9nzRppV6kGsa161r9s2KkLXmJrojNy6vo9a6g6RtZ3F6xKiWLUmbAL
46+
hVTCfYw/2n7xNlVMjyyUpE+7e193PF8HfQrfDFxe2JnX5LHtGe+X9vdvo2l41R6m
47+
Iia04DvpMdG4+da2tKPzXIuLUz/FDb6IODO3+qsqQLwEKmmUee+KX+3yw8I6G1y0
48+
Vp0mnHfsfutlHeG8gazCDlzEsuD4QJ9BKeRf2Vrb0ywqNLkGCbcCWF2H5Q80Iq/f
49+
ETVO9z88R7WheVdEjUB8UrY7ZMLdADM14IPhY2Y+tLaSzEVZAgMBAAGjMjAwMAkG
50+
A1UdEwQCMAAwDgYDVR0PAQH/BAQDAgeAMBMGA1UdJQQMMAoGCCsGAQUFBwMDMA0G
51+
CSqGSIb3DQEBCwUAA4IBAQBX7x4Ucre8AIUmXZ5PUK/zUBVOrZZzR1YE8w86J4X9
52+
kYeTtlijf9i2LTZMfGuG0dEVFN4ae3CCpBst+ilhIndnoxTyzP+sNy4RCRQ2Y/k8
53+
Zq235KIh7uucq96PL0qsF9s2RpTKXxyOGdtp9+HO0Ty5txJE2txtLDUIVPK5WNDF
54+
ByCEQNhtHgN6V20b8KU2oLBZ9vyB8V010dQz0NRTDLhkcvJig00535/LUylECYAJ
55+
5/jn6XKt6UYCQJbVNzBg/YPGc1RF4xdsGVDBben/JXpeGEmkdmXPILTKd9tZ5TC0
56+
uOKpF5rWAruB5PCIrquamOejpXV9aQA/K2JQDuc0mcKz
57+
-----END CERTIFICATE-----
4258
validations:
4359
- expression: >-
44-
images.containers.map(image, verifyImageSignatures(image, [attestors.cosign])).all(e ,e > 0)
60+
images.containers.map(image, verifyImageSignatures(image, [attestors.notary])).all(e ,e > 0)
4561
message: >-
46-
failed the verification
62+
failed the verification

0 commit comments

Comments
 (0)