From 026cee8ca34f9c6c66c52b2eb955efcd9a7ec34a Mon Sep 17 00:00:00 2001 From: Nikita Pivkin Date: Mon, 22 Jan 2024 16:22:16 +0700 Subject: [PATCH] feat(rego): migrate result function from Go --- .github/workflows/test-rego.yaml | 10 +++++----- Makefile | 9 +++++++-- .../cloud/aws/iam/filter_iam_pass_role.rego | 2 ++ .../cloud/aws/rds/disable_public_access.rego | 2 ++ .../enable_cluster_deletion_protection.rego | 2 ++ .../aws/rds/enable_deletion_protection.rego | 2 ++ checks/cloud/aws/rds/enable_iam_auth.rego | 2 ++ checks/cloud/aws/s3/dns_compliant_name.rego | 2 ++ checks/cloud/aws/s3/enable_logging.rego | 2 ++ checks/docker/add_instead_of_copy.rego | 1 + ...apt_get_missing_no_install_recommends.rego | 1 + ...issing_yes_flag_to_avoid_manual_input.rego | 1 + ...py_from_references_current_from_alias.rego | 1 + ...n_two_arguments_not_ending_with_slash.rego | 1 + checks/docker/latest_tag.rego | 1 + checks/docker/maintainer_is_deprecated.rego | 1 + checks/docker/missing_apk_no_cache.rego | 1 + checks/docker/missing_dnf_clean_all.rego | 1 + checks/docker/missing_microdnf_clean_all.rego | 1 + checks/docker/missing_zypper_clean.rego | 1 + .../multiple_cmd_instructions_listed.rego | 1 + ...ltiple_entrypoint_instructions_listed.rego | 1 + .../multiple_healthcheck_instructions.rego | 1 + checks/docker/no_healthcheck_instruction.rego | 1 + checks/docker/port22.rego | 1 + checks/docker/root_user.rego | 1 + checks/docker/root_user_test.rego | 1 + checks/docker/run_apt_get_dist_upgrade.rego | 1 + .../run_command_cd_instead_of_workdir.rego | 1 + checks/docker/run_using_sudo.rego | 1 + checks/docker/run_using_wget_and_curl.rego | 1 + .../docker/same_alias_in_different_froms.rego | 1 + checks/docker/unix_ports_out_of_range.rego | 1 + checks/docker/update_instruction_alone.rego | 1 + checks/docker/workdir_path_not_absolute.rego | 1 + checks/docker/yum_clean_all_missing.rego | 1 + .../default_namespace_should_not_be_used.rego | 1 + .../capabilities_no_drop_at_least_one.rego | 1 + .../advanced/optional/manages_etc_hosts.rego | 1 + .../advanced/optional/use_limit_range.rego | 1 + .../advanced/optional/use_resource_quota.rego | 1 + .../uses_untrusted_azure_registry.rego | 1 + .../optional/uses_untrusted_ecr_registry.rego | 1 + .../optional/uses_untrusted_gcr_registry.rego | 1 + .../uses_untrusted_public_registries.rego | 1 + .../protect_core_components_namespace.rego | 1 + ...protecting_pod_service_account_tokens.rego | 1 + .../selector_usage_in_network_policies.rego | 1 + .../configMap_with_secrets.rego | 1 + .../configmap_with_sensitive.rego | 1 + .../service_with_externalip.rego | 1 + .../apiserver/admin_conf_ownership.rego | 1 + .../apiserver/admin_conf_permission.rego | 1 + .../apiserver/always_admit_plugin.rego | 1 + .../apiserver/always_pull_images_plugin.rego | 1 + .../apiserver/anonymous_auth.rego | 1 + .../apiserver/audit_log_maxage.rego | 1 + .../apiserver/audit_log_maxbackup.rego | 1 + .../apiserver/audit_log_maxsize.rego | 1 + .../apiserver/audit_log_path.rego | 1 + .../apiserver/authorization_mode.rego | 1 + .../authorization_mode_includes_node.rego | 1 + .../authorization_mode_includes_rbac.rego | 1 + .../apiserver/client_ca_file.rego | 1 + .../deny_service_external_ips_plugin.rego | 1 + .../apiserver/encryption_provider_config.rego | 1 + .../cisbenchmarks/apiserver/etcd_cafile.rego | 1 + .../apiserver/etcd_certfile_and_keyfile.rego | 1 + .../apiserver/event_rate_limit_plugin.rego | 1 + .../kubelet_certificate_authority.rego | 1 + .../kubelet_client_certificate_and_key.rego | 1 + .../apiserver/kubelet_https.rego | 1 + .../kubernetes_pki_cert_permission.rego | 1 + .../kubernetes_pki_directory_ownership.rego | 1 + .../kubernetes_pki_key_permission.rego | 1 + .../apiserver/namespace_lifecycle_plugin.rego | 1 + .../apiserver/node_restriction_plugin.rego | 1 + .../apiserver/pod_spec_ownership.rego | 1 + .../apiserver/pod_spec_permission.rego | 1 + .../cisbenchmarks/apiserver/profiling.rego | 1 + .../cisbenchmarks/apiserver/secure_port.rego | 1 + .../security_context_deny_plugin.rego | 1 + .../apiserver/service_account_key_file.rego | 1 + .../apiserver/service_account_lookup.rego | 1 + .../apiserver/service_account_plugin.rego | 1 + .../tls_cert_file_and_private_key_file.rego | 1 + .../apiserver/token_auth_file.rego | 1 + .../cisbenchmarks/cni/pod_spec_ownership.rego | 1 + .../cni/pod_spec_permission.rego | 1 + .../controllermamager/bind_address.rego | 1 + .../controller_manager_conf_ownership.rego | 1 + .../controller_manager_conf_permission.rego | 1 + .../controllermamager/pod_spec_ownership.rego | 1 + .../pod_spec_permission.rego | 1 + .../controllermamager/profiling.rego | 1 + .../controllermamager/root_ca_file.rego | 1 + .../rotate_kubelet_server_certificate.rego | 1 + .../service_account_private_key_file.rego | 1 + .../terminated_pod_gc_threshold.rego | 1 + .../use_service_account_credentials.rego | 1 + .../cisbenchmarks/etcd/auto_tls.rego | 1 + .../etcd/cert_file_and_key_file.rego | 1 + .../cisbenchmarks/etcd/client_cert_auth.rego | 1 + .../etcd/data_directory_ownership.rego | 1 + .../etcd/data_directory_permission.rego | 1 + .../cisbenchmarks/etcd/peer_auto_tls.rego | 1 + .../etcd/peer_cert_file_and_key_file.rego | 1 + .../etcd/peer_client_cert_auth.rego | 1 + .../etcd/pod_spec_ownership.rego | 1 + .../etcd/pod_spec_permission.rego | 1 + ...ertificate_authorities_file_ownership.rego | 1 + ...rtificate_authorities_file_permission.rego | 1 + .../kubelet_anonymous_auth_argument.rego | 1 + .../kubelet_authorization_mode_argument.rego | 1 + .../kubelet_client_ca_file_argument.rego | 1 + .../kubelet_config_file_ownership.rego | 1 + .../kubelet_config_file_permission.rego | 1 + .../kubelet_config_yaml_ownership.rego | 1 + .../kubelet_config_yaml_permission.rego | 1 + .../kubelet/kubelet_event_qps.rego | 1 + .../kubelet/kubelet_hostname_override.rego | 1 + .../kubelet_make_iptables_util_chains.rego | 1 + ...kubelet_only_use_strong_cryptographic.rego | 1 + .../kubelet_protect_kernel_defaults.rego | 1 + .../kubelet_read_only_port_argument.rego | 1 + .../kubelet/kubelet_rotate_certificates.rego | 1 + ...let_rotate_kubelet_server_certificate.rego | 1 + ...kubelet_streaming_connection_argument.rego | 1 + .../kubelet/kubelet_tls_cert_file.rego | 1 + .../kubelet/kubelet_tls_key_file.rego | 1 + .../kublet_service_file_ownership.rego | 1 + .../kublet_service_file_permission.rego | 1 + .../proxy_kube_config_file_ownership.rego | 1 + .../proxy_kube_config_file_permission.rego | 1 + .../cisbenchmarks/scheduler/bind_address.rego | 1 + .../scheduler/pod_spec_ownership.rego | 1 + .../scheduler/pod_spec_permission.rego | 1 + .../cisbenchmarks/scheduler/profiling.rego | 1 + .../scheduler/scheduler_conf_ownership.rego | 1 + .../scheduler/scheduler_conf_permission.rego | 1 + checks/kubernetes/dynamic/outdated_api.rego | 1 + .../kubernetes/general/CPU_not_limited.rego | 1 + .../general/CPU_requests_not_specified.rego | 1 + .../general/SYS_ADMIN_capability.rego | 1 + .../general/SYS_MODULE_capability.rego | 1 + ..._and_associate_privileged_clusterrole.rego | 1 + ..._and_associate_privileged_clusterrole.rego | 1 + .../allowing_to_update_a_malicious_pod.rego | 1 + ...ebinding_add_other_users_rolebindings.rego | 1 + .../general/anonymous_user_bind.rego | 1 + checks/kubernetes/general/any_any.rego | 1 + checks/kubernetes/general/any_verb.rego | 1 + .../attaching_pod_view_logs_realtime.rego | 1 + .../general/capabilities_no_drop_all.rego | 1 + .../general/default_security_context.rego | 1 + .../kubernetes/general/delete_pod_logs.rego | 1 + .../general/file_system_not_read_only.rego | 1 + .../kubernetes/general/get_shell_on_pod.rego | 1 + .../impersonate_privileged_groups.rego | 1 + .../general/manage_all_resources.rego | 1 + .../manage_all_resources_at_namespace.rego | 1 + .../kubernetes/general/manage_configmaps.rego | 1 + .../manage_eks_iam_auth_configmap.rego | 1 + .../general/manage_kubernetes_networking.rego | 1 + .../manage_kubernetes_rbac_resources.rego | 1 + .../general/manage_namespace_secrets.rego | 1 + checks/kubernetes/general/manage_secrets.rego | 1 + .../manage_webhook_configurations.rego | 1 + .../general/memory_not_limited.rego | 1 + .../memory_requests_not_specified.rego | 1 + .../general/mounts_docker_socket.rego | 1 + .../general/net_raw_capability.rego | 1 + .../privilege_escalation_from_node_proxy.rego | 1 + .../general/runs_with_GID_le_10000.rego | 1 + .../general/runs_with_UID_le_10000.rego | 1 + ...h_a_root_primary_or_supplementary_GID.rego | 1 + .../general/tiller_is_deployed.rego | 1 + .../general/uses_image_tag_latest.rego | 1 + .../pss/baseline/10_windows_host_process.rego | 1 + .../11_seccomp_profile_unconfined.rego | 1 + .../baseline/12_privileged_ports_binding.rego | 1 + .../kubernetes/pss/baseline/1_host_ipc.rego | 1 + .../pss/baseline/1_host_network.rego | 1 + .../kubernetes/pss/baseline/1_host_pid.rego | 1 + .../kubernetes/pss/baseline/2_privileged.rego | 1 + .../3_specific_capabilities_added.rego | 1 + .../baseline/4_hostpath_volumes_mounted.rego | 1 + .../pss/baseline/5_access_to_host_ports.rego | 1 + .../baseline/6_apparmor_policy_disabled.rego | 1 + .../6_apparmor_policy_disabled_test.rego | 1 + .../7_selinux_custom_options_set.rego | 1 + .../8_non_default_proc_masks_set.rego | 1 + .../baseline/9_unsafe_sysctl_options_set.rego | 1 + .../restricted/1_non_core_volume_types.rego | 1 + .../2_can_elevate_its_own_privileges.rego | 1 + .../pss/restricted/3_runs_as_root.rego | 1 + .../restricted/4_runs_with_a_root_uid.rego | 1 + ...ntime_default_seccomp_profile_not_set.rego | 1 + ..._default_seccomp_profile_not_set_test.rego | 1 + ...apabilities_only_add_net_bind_service.rego | 1 + ...lities_only_add_net_bind_service_test.rego | 1 + ...ource_with_disallowed_volumes_mounted.rego | 1 + ...dmin_role_is_only_used_where_required.rego | 1 + lib/result/result.rego | 20 +++++++++++++++++++ 204 files changed, 240 insertions(+), 7 deletions(-) create mode 100644 lib/result/result.rego diff --git a/.github/workflows/test-rego.yaml b/.github/workflows/test-rego.yaml index 0289c5e5..e7eb2fc4 100644 --- a/.github/workflows/test-rego.yaml +++ b/.github/workflows/test-rego.yaml @@ -20,8 +20,10 @@ jobs: steps: - name: Checkout code uses: actions/checkout@v4 + - name: Setup OPA uses: ./.github/actions/setup-opa + - name: OPA Format run: | files=$(opa fmt --list . | grep -v vendor || true) @@ -30,8 +32,6 @@ jobs: echo "$files" exit 1 fi - - uses: actions/setup-go@v5 - with: - go-version-file: go.mod - cache: true - cache-dependency-path: go.sum \ No newline at end of file + + - name: OPA Test + run: make rego-test diff --git a/Makefile b/Makefile index 8c75f610..944780bc 100644 --- a/Makefile +++ b/Makefile @@ -4,12 +4,17 @@ DYNAMIC_REGO_FOLDER=./checks/kubernetes/policies/dynamic test: go test -v ./... + .PHONY: rego -rego: fmt-rego +rego: fmt-rego test-rego + +.PHONY: test-rego +test-rego: + opa test -v checks/ lib/ .PHONY: fmt-rego fmt-rego: - opa fmt -w checks/ + opa fmt -w checks/ lib/ .PHONY: bundle bundle: create-bundle verify-bundle diff --git a/checks/cloud/aws/iam/filter_iam_pass_role.rego b/checks/cloud/aws/iam/filter_iam_pass_role.rego index 9fcf7eac..8681ff6e 100644 --- a/checks/cloud/aws/iam/filter_iam_pass_role.rego +++ b/checks/cloud/aws/iam/filter_iam_pass_role.rego @@ -22,6 +22,8 @@ # provider: aws package builtin.aws.iam.aws0342 +import data.lib.result + allows_permission(statements, permission, effect) { statement := statements[_] statement.Effect == effect diff --git a/checks/cloud/aws/rds/disable_public_access.rego b/checks/cloud/aws/rds/disable_public_access.rego index b4fd6b81..32e9d2ac 100644 --- a/checks/cloud/aws/rds/disable_public_access.rego +++ b/checks/cloud/aws/rds/disable_public_access.rego @@ -26,6 +26,8 @@ package builtin.aws.rds.aws0180 +import data.lib.result + deny[res] { instance := input.aws.rds.instances[_] instance.publicaccess.value diff --git a/checks/cloud/aws/rds/enable_cluster_deletion_protection.rego b/checks/cloud/aws/rds/enable_cluster_deletion_protection.rego index aa36a0e9..4a05a36b 100644 --- a/checks/cloud/aws/rds/enable_cluster_deletion_protection.rego +++ b/checks/cloud/aws/rds/enable_cluster_deletion_protection.rego @@ -21,6 +21,8 @@ # provider: aws package builtin.aws.rds.aws0343 +import data.lib.result + deny[res] { cluster := input.aws.rds.clusters[_] not cluster.deletionprotection.value diff --git a/checks/cloud/aws/rds/enable_deletion_protection.rego b/checks/cloud/aws/rds/enable_deletion_protection.rego index 89227003..e2a48a68 100644 --- a/checks/cloud/aws/rds/enable_deletion_protection.rego +++ b/checks/cloud/aws/rds/enable_deletion_protection.rego @@ -21,6 +21,8 @@ # provider: aws package builtin.aws.rds.aws0177 +import data.lib.result + deny[res] { instance := input.aws.rds.instances[_] not instance.deletionprotection.value diff --git a/checks/cloud/aws/rds/enable_iam_auth.rego b/checks/cloud/aws/rds/enable_iam_auth.rego index 87f3789a..5a7bfa3d 100644 --- a/checks/cloud/aws/rds/enable_iam_auth.rego +++ b/checks/cloud/aws/rds/enable_iam_auth.rego @@ -21,6 +21,8 @@ # provider: aws package builtin.aws.rds.aws0176 +import data.lib.result + deny[res] { instance := input.aws.rds.instances[_] instance.engine.value == ["postgres", "mysql"][_] diff --git a/checks/cloud/aws/s3/dns_compliant_name.rego b/checks/cloud/aws/s3/dns_compliant_name.rego index 47bdc0b2..6c553634 100644 --- a/checks/cloud/aws/s3/dns_compliant_name.rego +++ b/checks/cloud/aws/s3/dns_compliant_name.rego @@ -22,6 +22,8 @@ # provider: aws package builtin.aws.s3.aws0320 +import data.lib.result + deny[res] { bucket := input.aws.s3.buckets[_] indexof(bucket.name.value, ".") != -1 diff --git a/checks/cloud/aws/s3/enable_logging.rego b/checks/cloud/aws/s3/enable_logging.rego index 9cf64e9a..80120334 100644 --- a/checks/cloud/aws/s3/enable_logging.rego +++ b/checks/cloud/aws/s3/enable_logging.rego @@ -27,6 +27,8 @@ # good_examples: "checks/cloud/aws/s3/enable_bucket_logging.cf.go" package builtin.aws.s3.aws0089 +import data.lib.result + deny[res] { bucket := input.aws.s3.buckets[_] not bucket.acl.value == "log-delivery-write" diff --git a/checks/docker/add_instead_of_copy.rego b/checks/docker/add_instead_of_copy.rego index f1782e74..ef129d96 100644 --- a/checks/docker/add_instead_of_copy.rego +++ b/checks/docker/add_instead_of_copy.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS005 import data.lib.docker +import data.lib.result get_add[output] { add := docker.add[_] diff --git a/checks/docker/apt_get_missing_no_install_recommends.rego b/checks/docker/apt_get_missing_no_install_recommends.rego index 2e831729..8b475a20 100644 --- a/checks/docker/apt_get_missing_no_install_recommends.rego +++ b/checks/docker/apt_get_missing_no_install_recommends.rego @@ -19,6 +19,7 @@ package builtin.dockerfile.DS029 import data.lib.docker +import data.lib.result deny[res] { output := get_apt_get[_] diff --git a/checks/docker/apt_get_missing_yes_flag_to_avoid_manual_input.rego b/checks/docker/apt_get_missing_yes_flag_to_avoid_manual_input.rego index 7645f11a..db73e32f 100644 --- a/checks/docker/apt_get_missing_yes_flag_to_avoid_manual_input.rego +++ b/checks/docker/apt_get_missing_yes_flag_to_avoid_manual_input.rego @@ -19,6 +19,7 @@ package builtin.dockerfile.DS021 import data.lib.docker +import data.lib.result deny[res] { output := get_apt_get[_] diff --git a/checks/docker/copy_from_references_current_from_alias.rego b/checks/docker/copy_from_references_current_from_alias.rego index c80f444d..ebf9eb10 100644 --- a/checks/docker/copy_from_references_current_from_alias.rego +++ b/checks/docker/copy_from_references_current_from_alias.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS006 import data.lib.docker +import data.lib.result get_alias_from_copy[output] { copies := docker.stage_copies[stage] diff --git a/checks/docker/copy_with_more_than_two_arguments_not_ending_with_slash.rego b/checks/docker/copy_with_more_than_two_arguments_not_ending_with_slash.rego index 96b5e50f..82166993 100644 --- a/checks/docker/copy_with_more_than_two_arguments_not_ending_with_slash.rego +++ b/checks/docker/copy_with_more_than_two_arguments_not_ending_with_slash.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS011 import data.lib.docker +import data.lib.result get_copy_arg[output] { copy := docker.copy[_] diff --git a/checks/docker/latest_tag.rego b/checks/docker/latest_tag.rego index 3aff03d6..49f41436 100644 --- a/checks/docker/latest_tag.rego +++ b/checks/docker/latest_tag.rego @@ -16,6 +16,7 @@ package builtin.dockerfile.DS001 import data.lib.docker +import data.lib.result # returns element after AS get_alias(values) = alias { diff --git a/checks/docker/maintainer_is_deprecated.rego b/checks/docker/maintainer_is_deprecated.rego index 762f05fc..ff398244 100644 --- a/checks/docker/maintainer_is_deprecated.rego +++ b/checks/docker/maintainer_is_deprecated.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS022 import data.lib.docker +import data.lib.result get_maintainer[mntnr] { mntnr := input.Stages[_].Commands[_] diff --git a/checks/docker/missing_apk_no_cache.rego b/checks/docker/missing_apk_no_cache.rego index 0f3841b2..cd49fc3f 100644 --- a/checks/docker/missing_apk_no_cache.rego +++ b/checks/docker/missing_apk_no_cache.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS025 import data.lib.docker +import data.lib.result get_apk[output] { run := docker.run[_] diff --git a/checks/docker/missing_dnf_clean_all.rego b/checks/docker/missing_dnf_clean_all.rego index 182c6806..29788bcd 100644 --- a/checks/docker/missing_dnf_clean_all.rego +++ b/checks/docker/missing_dnf_clean_all.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS019 import data.lib.docker +import data.lib.result install_regex := `(dnf install)|(dnf in)|(dnf reinstall)|(dnf rei)|(dnf install-n)|(dnf install-na)|(dnf install-nevra)` diff --git a/checks/docker/missing_microdnf_clean_all.rego b/checks/docker/missing_microdnf_clean_all.rego index 435c4277..0bff6a30 100644 --- a/checks/docker/missing_microdnf_clean_all.rego +++ b/checks/docker/missing_microdnf_clean_all.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS027 import data.lib.docker +import data.lib.result install_regex := `(microdnf install)|(microdnf reinstall)` diff --git a/checks/docker/missing_zypper_clean.rego b/checks/docker/missing_zypper_clean.rego index 657f2004..2af08494 100644 --- a/checks/docker/missing_zypper_clean.rego +++ b/checks/docker/missing_zypper_clean.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS020 import data.lib.docker +import data.lib.result install_regex := `(zypper in)|(zypper remove)|(zypper rm)|(zypper source-install)|(zypper si)|(zypper patch)|(zypper (-(-)?[a-zA-Z]+ *)*install)` diff --git a/checks/docker/multiple_cmd_instructions_listed.rego b/checks/docker/multiple_cmd_instructions_listed.rego index 2712590f..59bb38fe 100644 --- a/checks/docker/multiple_cmd_instructions_listed.rego +++ b/checks/docker/multiple_cmd_instructions_listed.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS016 import data.lib.docker +import data.lib.result deny[res] { cmds := docker.stage_cmd[name] diff --git a/checks/docker/multiple_entrypoint_instructions_listed.rego b/checks/docker/multiple_entrypoint_instructions_listed.rego index 89783d3d..c7f26be7 100644 --- a/checks/docker/multiple_entrypoint_instructions_listed.rego +++ b/checks/docker/multiple_entrypoint_instructions_listed.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS007 import data.lib.docker +import data.lib.result deny[res] { entrypoints := docker.stage_entrypoints[stage] diff --git a/checks/docker/multiple_healthcheck_instructions.rego b/checks/docker/multiple_healthcheck_instructions.rego index bb916d5c..11a3b1b9 100644 --- a/checks/docker/multiple_healthcheck_instructions.rego +++ b/checks/docker/multiple_healthcheck_instructions.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS023 import data.lib.docker +import data.lib.result deny[res] { healthchecks := docker.stage_healthcheck[name] diff --git a/checks/docker/no_healthcheck_instruction.rego b/checks/docker/no_healthcheck_instruction.rego index 22c74797..d81cfffa 100644 --- a/checks/docker/no_healthcheck_instruction.rego +++ b/checks/docker/no_healthcheck_instruction.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS026 import data.lib.docker +import data.lib.result deny[res] { count(docker.healthcheck) == 0 diff --git a/checks/docker/port22.rego b/checks/docker/port22.rego index 106866ac..14508481 100644 --- a/checks/docker/port22.rego +++ b/checks/docker/port22.rego @@ -16,6 +16,7 @@ package builtin.dockerfile.DS004 import data.lib.docker +import data.lib.result # deny_list contains the port numbers which needs to be denied. denied_ports := ["22", "22/tcp", "22/udp"] diff --git a/checks/docker/root_user.rego b/checks/docker/root_user.rego index 71eeb085..2e513d9b 100644 --- a/checks/docker/root_user.rego +++ b/checks/docker/root_user.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS002 import data.lib.docker +import data.lib.result # get_user returns all the usernames from # the USER command. diff --git a/checks/docker/root_user_test.rego b/checks/docker/root_user_test.rego index 7e2ffed2..40e84641 100644 --- a/checks/docker/root_user_test.rego +++ b/checks/docker/root_user_test.rego @@ -1,6 +1,7 @@ package builtin.dockerfile.DS002 import data.lib.docker +import data.lib.result test_not_root_allowed { r := deny with input as {"Stages": [{ diff --git a/checks/docker/run_apt_get_dist_upgrade.rego b/checks/docker/run_apt_get_dist_upgrade.rego index d92163f9..20950d50 100644 --- a/checks/docker/run_apt_get_dist_upgrade.rego +++ b/checks/docker/run_apt_get_dist_upgrade.rego @@ -16,6 +16,7 @@ package builtin.dockerfile.DS024 import data.lib.docker +import data.lib.result get_apt_get_dist_upgrade[run] { run := docker.run[_] diff --git a/checks/docker/run_command_cd_instead_of_workdir.rego b/checks/docker/run_command_cd_instead_of_workdir.rego index e9012490..0cc9afac 100644 --- a/checks/docker/run_command_cd_instead_of_workdir.rego +++ b/checks/docker/run_command_cd_instead_of_workdir.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS013 import data.lib.docker +import data.lib.result get_cd[output] { run := docker.run[_] diff --git a/checks/docker/run_using_sudo.rego b/checks/docker/run_using_sudo.rego index d4710013..35c8eaa9 100644 --- a/checks/docker/run_using_sudo.rego +++ b/checks/docker/run_using_sudo.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS010 import data.lib.docker +import data.lib.result has_sudo(commands) { parts = split(commands, "&&") diff --git a/checks/docker/run_using_wget_and_curl.rego b/checks/docker/run_using_wget_and_curl.rego index 2838de9a..2bb0b7a9 100644 --- a/checks/docker/run_using_wget_and_curl.rego +++ b/checks/docker/run_using_wget_and_curl.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS014 import data.lib.docker +import data.lib.result deny[res] { wget := get_tool_usage(docker.run[_], "wget") diff --git a/checks/docker/same_alias_in_different_froms.rego b/checks/docker/same_alias_in_different_froms.rego index a573dea8..1d5b0ea9 100644 --- a/checks/docker/same_alias_in_different_froms.rego +++ b/checks/docker/same_alias_in_different_froms.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS012 import data.lib.docker +import data.lib.result get_duplicate_alias[output] { output1 := get_aliased_name[_] diff --git a/checks/docker/unix_ports_out_of_range.rego b/checks/docker/unix_ports_out_of_range.rego index 0235406f..8090a461 100644 --- a/checks/docker/unix_ports_out_of_range.rego +++ b/checks/docker/unix_ports_out_of_range.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS008 import data.lib.docker +import data.lib.result invalid_ports[output] { expose := docker.expose[_] diff --git a/checks/docker/update_instruction_alone.rego b/checks/docker/update_instruction_alone.rego index 74a87253..fc5a583d 100644 --- a/checks/docker/update_instruction_alone.rego +++ b/checks/docker/update_instruction_alone.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS017 import data.lib.docker +import data.lib.result deny[res] { run := docker.run[_] diff --git a/checks/docker/workdir_path_not_absolute.rego b/checks/docker/workdir_path_not_absolute.rego index 4cabe688..a5523224 100644 --- a/checks/docker/workdir_path_not_absolute.rego +++ b/checks/docker/workdir_path_not_absolute.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS009 import data.lib.docker +import data.lib.result get_work_dir[output] { workdir := docker.workdir[_] diff --git a/checks/docker/yum_clean_all_missing.rego b/checks/docker/yum_clean_all_missing.rego index 8689e85b..f1791cfe 100644 --- a/checks/docker/yum_clean_all_missing.rego +++ b/checks/docker/yum_clean_all_missing.rego @@ -18,6 +18,7 @@ package builtin.dockerfile.DS015 import data.lib.docker +import data.lib.result get_yum[output] { run := docker.run[_] diff --git a/checks/kubernetes/advanced/default_namespace_should_not_be_used.rego b/checks/kubernetes/advanced/default_namespace_should_not_be_used.rego index 5960c5d0..046e1fb7 100644 --- a/checks/kubernetes/advanced/default_namespace_should_not_be_used.rego +++ b/checks/kubernetes/advanced/default_namespace_should_not_be_used.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV110 import data.lib.kubernetes +import data.lib.result default defaultNamespaceInUse = false diff --git a/checks/kubernetes/advanced/optional/capabilities_no_drop_at_least_one.rego b/checks/kubernetes/advanced/optional/capabilities_no_drop_at_least_one.rego index 58ac3b0c..8e48fa58 100644 --- a/checks/kubernetes/advanced/optional/capabilities_no_drop_at_least_one.rego +++ b/checks/kubernetes/advanced/optional/capabilities_no_drop_at_least_one.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV004 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failCapsDropAny = false diff --git a/checks/kubernetes/advanced/optional/manages_etc_hosts.rego b/checks/kubernetes/advanced/optional/manages_etc_hosts.rego index 0003b672..c6127ac8 100644 --- a/checks/kubernetes/advanced/optional/manages_etc_hosts.rego +++ b/checks/kubernetes/advanced/optional/manages_etc_hosts.rego @@ -25,6 +25,7 @@ package builtin.kubernetes.KSV007 import data.lib.kubernetes +import data.lib.result import data.lib.utils # failHostAliases is true if spec.hostAliases is set (on all controllers) diff --git a/checks/kubernetes/advanced/optional/use_limit_range.rego b/checks/kubernetes/advanced/optional/use_limit_range.rego index 23b4364c..4b0199f7 100644 --- a/checks/kubernetes/advanced/optional/use_limit_range.rego +++ b/checks/kubernetes/advanced/optional/use_limit_range.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV039 import data.lib.kubernetes +import data.lib.result import data.lib.utils limitRangeConfigure { diff --git a/checks/kubernetes/advanced/optional/use_resource_quota.rego b/checks/kubernetes/advanced/optional/use_resource_quota.rego index 926216f7..7eb71e5f 100644 --- a/checks/kubernetes/advanced/optional/use_resource_quota.rego +++ b/checks/kubernetes/advanced/optional/use_resource_quota.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV040 import data.lib.kubernetes +import data.lib.result import data.lib.utils resourceQuotaConfigure { diff --git a/checks/kubernetes/advanced/optional/uses_untrusted_azure_registry.rego b/checks/kubernetes/advanced/optional/uses_untrusted_azure_registry.rego index 04d3fd90..f16354e3 100644 --- a/checks/kubernetes/advanced/optional/uses_untrusted_azure_registry.rego +++ b/checks/kubernetes/advanced/optional/uses_untrusted_azure_registry.rego @@ -25,6 +25,7 @@ package builtin.kubernetes.KSV032 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failTrustedAzureRegistry = false diff --git a/checks/kubernetes/advanced/optional/uses_untrusted_ecr_registry.rego b/checks/kubernetes/advanced/optional/uses_untrusted_ecr_registry.rego index ac25b9b3..40fe2070 100644 --- a/checks/kubernetes/advanced/optional/uses_untrusted_ecr_registry.rego +++ b/checks/kubernetes/advanced/optional/uses_untrusted_ecr_registry.rego @@ -25,6 +25,7 @@ package builtin.kubernetes.KSV035 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failTrustedECRRegistry = false diff --git a/checks/kubernetes/advanced/optional/uses_untrusted_gcr_registry.rego b/checks/kubernetes/advanced/optional/uses_untrusted_gcr_registry.rego index a2d6607f..39d5019f 100644 --- a/checks/kubernetes/advanced/optional/uses_untrusted_gcr_registry.rego +++ b/checks/kubernetes/advanced/optional/uses_untrusted_gcr_registry.rego @@ -25,6 +25,7 @@ package builtin.kubernetes.KSV033 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failTrustedGCRRegistry = false diff --git a/checks/kubernetes/advanced/optional/uses_untrusted_public_registries.rego b/checks/kubernetes/advanced/optional/uses_untrusted_public_registries.rego index e04248b4..ed77c2ef 100644 --- a/checks/kubernetes/advanced/optional/uses_untrusted_public_registries.rego +++ b/checks/kubernetes/advanced/optional/uses_untrusted_public_registries.rego @@ -25,6 +25,7 @@ package builtin.kubernetes.KSV034 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failPublicRegistry = false diff --git a/checks/kubernetes/advanced/protect_core_components_namespace.rego b/checks/kubernetes/advanced/protect_core_components_namespace.rego index 0a7284e0..448ead5d 100644 --- a/checks/kubernetes/advanced/protect_core_components_namespace.rego +++ b/checks/kubernetes/advanced/protect_core_components_namespace.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV037 import data.lib.kubernetes +import data.lib.result import data.lib.utils systemNamespaceInUse(metadata, spec) { diff --git a/checks/kubernetes/advanced/protecting_pod_service_account_tokens.rego b/checks/kubernetes/advanced/protecting_pod_service_account_tokens.rego index a72c9560..97e8078c 100644 --- a/checks/kubernetes/advanced/protecting_pod_service_account_tokens.rego +++ b/checks/kubernetes/advanced/protecting_pod_service_account_tokens.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV036 import data.lib.kubernetes +import data.lib.result import data.lib.utils mountServiceAccountToken(spec) { diff --git a/checks/kubernetes/advanced/selector_usage_in_network_policies.rego b/checks/kubernetes/advanced/selector_usage_in_network_policies.rego index 92347fa6..cd22a479 100644 --- a/checks/kubernetes/advanced/selector_usage_in_network_policies.rego +++ b/checks/kubernetes/advanced/selector_usage_in_network_policies.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV038 import data.lib.kubernetes +import data.lib.result import data.lib.utils hasSelector(spec) { diff --git a/checks/kubernetes/aquacommercial/configMap_with_secrets.rego b/checks/kubernetes/aquacommercial/configMap_with_secrets.rego index 3926c084..9616af2c 100644 --- a/checks/kubernetes/aquacommercial/configMap_with_secrets.rego +++ b/checks/kubernetes/aquacommercial/configMap_with_secrets.rego @@ -19,6 +19,7 @@ package builtin.kubernetes.KSV0109 import data.lib.kubernetes +import data.lib.result # More patterns can be added here, adding more patterns may lead to performance issue patterns := [ diff --git a/checks/kubernetes/aquacommercial/configmap_with_sensitive.rego b/checks/kubernetes/aquacommercial/configmap_with_sensitive.rego index 5c734c23..4904291d 100644 --- a/checks/kubernetes/aquacommercial/configmap_with_sensitive.rego +++ b/checks/kubernetes/aquacommercial/configmap_with_sensitive.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV01010 import data.lib.kubernetes +import data.lib.result # More patterns can be added here, adding more patterns may lead to performance issue # some patterns are taken from https://github.com/americanexpress/earlybird/blob/d0b63538c1acbb5ab0cacf0541df5ea088d45d70/config/content.json diff --git a/checks/kubernetes/aquacommercial/service_with_externalip.rego b/checks/kubernetes/aquacommercial/service_with_externalip.rego index 3ea0f5a7..fd7dca31 100644 --- a/checks/kubernetes/aquacommercial/service_with_externalip.rego +++ b/checks/kubernetes/aquacommercial/service_with_externalip.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV0108 import data.lib.kubernetes +import data.lib.result allowedIPs = set() diff --git a/checks/kubernetes/cisbenchmarks/apiserver/admin_conf_ownership.rego b/checks/kubernetes/cisbenchmarks/apiserver/admin_conf_ownership.rego index 0dccd711..24b8cbb8 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/admin_conf_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/admin_conf_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0061 import data.lib.kubernetes +import data.lib.result validate_conf_ownership(sp) := {"adminConfFileOwnership": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/apiserver/admin_conf_permission.rego b/checks/kubernetes/cisbenchmarks/apiserver/admin_conf_permission.rego index cbc8018a..5adf017c 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/admin_conf_permission.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/admin_conf_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0060 import data.lib.kubernetes +import data.lib.result validate_conf_permission(sp) := {"adminConfFilePermissions": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/apiserver/always_admit_plugin.rego b/checks/kubernetes/cisbenchmarks/apiserver/always_admit_plugin.rego index 5914b736..13306e8b 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/always_admit_plugin.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/always_admit_plugin.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0011 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/always_pull_images_plugin.rego b/checks/kubernetes/cisbenchmarks/apiserver/always_pull_images_plugin.rego index b539a8bd..e5ca3b35 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/always_pull_images_plugin.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/always_pull_images_plugin.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0012 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/anonymous_auth.rego b/checks/kubernetes/cisbenchmarks/apiserver/anonymous_auth.rego index b10f89be..a66dc314 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/anonymous_auth.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/anonymous_auth.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0001 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/audit_log_maxage.rego b/checks/kubernetes/cisbenchmarks/apiserver/audit_log_maxage.rego index d9a68451..1a841f51 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/audit_log_maxage.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/audit_log_maxage.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0020 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/audit_log_maxbackup.rego b/checks/kubernetes/cisbenchmarks/apiserver/audit_log_maxbackup.rego index 044fdf27..3d88f994 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/audit_log_maxbackup.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/audit_log_maxbackup.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0021 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/audit_log_maxsize.rego b/checks/kubernetes/cisbenchmarks/apiserver/audit_log_maxsize.rego index 30954884..e85b35c3 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/audit_log_maxsize.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/audit_log_maxsize.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0022 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/audit_log_path.rego b/checks/kubernetes/cisbenchmarks/apiserver/audit_log_path.rego index 10d8a5c7..71f7237c 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/audit_log_path.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/audit_log_path.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0019 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/authorization_mode.rego b/checks/kubernetes/cisbenchmarks/apiserver/authorization_mode.rego index f1c776ba..40808de1 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/authorization_mode.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/authorization_mode.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0007 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/authorization_mode_includes_node.rego b/checks/kubernetes/cisbenchmarks/apiserver/authorization_mode_includes_node.rego index 200902e4..07a4013d 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/authorization_mode_includes_node.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/authorization_mode_includes_node.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0008 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/authorization_mode_includes_rbac.rego b/checks/kubernetes/cisbenchmarks/apiserver/authorization_mode_includes_rbac.rego index 00540238..e78c3319 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/authorization_mode_includes_rbac.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/authorization_mode_includes_rbac.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0009 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/client_ca_file.rego b/checks/kubernetes/cisbenchmarks/apiserver/client_ca_file.rego index cb0b158a..85d1f313 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/client_ca_file.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/client_ca_file.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0028 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/deny_service_external_ips_plugin.rego b/checks/kubernetes/cisbenchmarks/apiserver/deny_service_external_ips_plugin.rego index acf7e8c4..7aa91554 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/deny_service_external_ips_plugin.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/deny_service_external_ips_plugin.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0003 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/encryption_provider_config.rego b/checks/kubernetes/cisbenchmarks/apiserver/encryption_provider_config.rego index d46136b6..79026159 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/encryption_provider_config.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/encryption_provider_config.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0030 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/etcd_cafile.rego b/checks/kubernetes/cisbenchmarks/apiserver/etcd_cafile.rego index bea415f7..7b2e9e38 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/etcd_cafile.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/etcd_cafile.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0029 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/etcd_certfile_and_keyfile.rego b/checks/kubernetes/cisbenchmarks/apiserver/etcd_certfile_and_keyfile.rego index 5ab092fd..9ad92809 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/etcd_certfile_and_keyfile.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/etcd_certfile_and_keyfile.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0026 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/event_rate_limit_plugin.rego b/checks/kubernetes/cisbenchmarks/apiserver/event_rate_limit_plugin.rego index e24a07d9..a926865d 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/event_rate_limit_plugin.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/event_rate_limit_plugin.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0010 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/kubelet_certificate_authority.rego b/checks/kubernetes/cisbenchmarks/apiserver/kubelet_certificate_authority.rego index 09b65d3a..ed392eab 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/kubelet_certificate_authority.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/kubelet_certificate_authority.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0006 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/kubelet_client_certificate_and_key.rego b/checks/kubernetes/cisbenchmarks/apiserver/kubelet_client_certificate_and_key.rego index c494c558..ed538255 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/kubelet_client_certificate_and_key.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/kubelet_client_certificate_and_key.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0005 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/kubelet_https.rego b/checks/kubernetes/cisbenchmarks/apiserver/kubelet_https.rego index 53a69f4b..1c54498c 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/kubelet_https.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/kubelet_https.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0004 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/kubernetes_pki_cert_permission.rego b/checks/kubernetes/cisbenchmarks/apiserver/kubernetes_pki_cert_permission.rego index e9ad3e8d..258037e9 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/kubernetes_pki_cert_permission.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/kubernetes_pki_cert_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0068 import data.lib.kubernetes +import data.lib.result validate_pki_cert_permission(sp) := {"kubernetesPKICertificateFilePermissions": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/apiserver/kubernetes_pki_directory_ownership.rego b/checks/kubernetes/cisbenchmarks/apiserver/kubernetes_pki_directory_ownership.rego index 358e63fe..d1cd3393 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/kubernetes_pki_directory_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/kubernetes_pki_directory_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0066 import data.lib.kubernetes +import data.lib.result validate_pki_directory_ownership(sp) := {"kubePKIDirectoryFileOwnership": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/apiserver/kubernetes_pki_key_permission.rego b/checks/kubernetes/cisbenchmarks/apiserver/kubernetes_pki_key_permission.rego index 328d46c9..c54f5f35 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/kubernetes_pki_key_permission.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/kubernetes_pki_key_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0067 import data.lib.kubernetes +import data.lib.result validate_pki_key_permission(sp) := {"kubePKIKeyFilePermissions": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/apiserver/namespace_lifecycle_plugin.rego b/checks/kubernetes/cisbenchmarks/apiserver/namespace_lifecycle_plugin.rego index 10dd9c99..ffd59bbc 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/namespace_lifecycle_plugin.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/namespace_lifecycle_plugin.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0015 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/node_restriction_plugin.rego b/checks/kubernetes/cisbenchmarks/apiserver/node_restriction_plugin.rego index 5479d70f..4cdbd599 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/node_restriction_plugin.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/node_restriction_plugin.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0016 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/pod_spec_ownership.rego b/checks/kubernetes/cisbenchmarks/apiserver/pod_spec_ownership.rego index 0ea54ef1..9869fde5 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/pod_spec_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/pod_spec_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0049 import data.lib.kubernetes +import data.lib.result validate_spec_ownership(sp) := {"kubeAPIServerSpecFileOwnership": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/apiserver/pod_spec_permission.rego b/checks/kubernetes/cisbenchmarks/apiserver/pod_spec_permission.rego index 3bbd2be0..b1f549fb 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/pod_spec_permission.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/pod_spec_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0048 import data.lib.kubernetes +import data.lib.result validate_spec_permission(sp) := {"kubeAPIServerSpecFilePermission": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/apiserver/profiling.rego b/checks/kubernetes/cisbenchmarks/apiserver/profiling.rego index 87f8986d..5b2cfaef 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/profiling.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/profiling.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0018 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/secure_port.rego b/checks/kubernetes/cisbenchmarks/apiserver/secure_port.rego index 3a93d2fb..429dc889 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/secure_port.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/secure_port.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0017 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/security_context_deny_plugin.rego b/checks/kubernetes/cisbenchmarks/apiserver/security_context_deny_plugin.rego index 3dcb757e..580cc8ce 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/security_context_deny_plugin.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/security_context_deny_plugin.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0013 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/service_account_key_file.rego b/checks/kubernetes/cisbenchmarks/apiserver/service_account_key_file.rego index 32cf1e08..11f8611a 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/service_account_key_file.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/service_account_key_file.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0025 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/service_account_lookup.rego b/checks/kubernetes/cisbenchmarks/apiserver/service_account_lookup.rego index 4096c926..5ad5e091 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/service_account_lookup.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/service_account_lookup.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0024 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/service_account_plugin.rego b/checks/kubernetes/cisbenchmarks/apiserver/service_account_plugin.rego index ba50d2e2..1acd0ba3 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/service_account_plugin.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/service_account_plugin.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0014 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/tls_cert_file_and_private_key_file.rego b/checks/kubernetes/cisbenchmarks/apiserver/tls_cert_file_and_private_key_file.rego index 164092d8..90c1e428 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/tls_cert_file_and_private_key_file.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/tls_cert_file_and_private_key_file.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0027 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/apiserver/token_auth_file.rego b/checks/kubernetes/cisbenchmarks/apiserver/token_auth_file.rego index 56e4b7b3..4c7d6aa3 100644 --- a/checks/kubernetes/cisbenchmarks/apiserver/token_auth_file.rego +++ b/checks/kubernetes/cisbenchmarks/apiserver/token_auth_file.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0002 import data.lib.kubernetes +import data.lib.result check_flag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/cni/pod_spec_ownership.rego b/checks/kubernetes/cisbenchmarks/cni/pod_spec_ownership.rego index 2ccc771c..1cb9e0d7 100644 --- a/checks/kubernetes/cisbenchmarks/cni/pod_spec_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/cni/pod_spec_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0057 import data.lib.kubernetes +import data.lib.result validate_spec_ownership(sp) := {"containerNetworkInterfaceFileOwnership": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/cni/pod_spec_permission.rego b/checks/kubernetes/cisbenchmarks/cni/pod_spec_permission.rego index 281f4fe8..a2278545 100644 --- a/checks/kubernetes/cisbenchmarks/cni/pod_spec_permission.rego +++ b/checks/kubernetes/cisbenchmarks/cni/pod_spec_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0056 import data.lib.kubernetes +import data.lib.result validate_cni_permission(sp) := {"containerNetworkInterfaceFilePermissions": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/controllermamager/bind_address.rego b/checks/kubernetes/cisbenchmarks/controllermamager/bind_address.rego index 822ea716..bc897d48 100644 --- a/checks/kubernetes/cisbenchmarks/controllermamager/bind_address.rego +++ b/checks/kubernetes/cisbenchmarks/controllermamager/bind_address.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0039 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/controllermamager/controller_manager_conf_ownership.rego b/checks/kubernetes/cisbenchmarks/controllermamager/controller_manager_conf_ownership.rego index 93640071..f6b7aa88 100644 --- a/checks/kubernetes/cisbenchmarks/controllermamager/controller_manager_conf_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/controllermamager/controller_manager_conf_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0065 import data.lib.kubernetes +import data.lib.result validate_conf_ownership(sp) := {"controllerManagerConfFileOwnership": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/controllermamager/controller_manager_conf_permission.rego b/checks/kubernetes/cisbenchmarks/controllermamager/controller_manager_conf_permission.rego index 38411446..1a4c4430 100644 --- a/checks/kubernetes/cisbenchmarks/controllermamager/controller_manager_conf_permission.rego +++ b/checks/kubernetes/cisbenchmarks/controllermamager/controller_manager_conf_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0064 import data.lib.kubernetes +import data.lib.result validate_conf_permission(sp) := {"controllerManagerConfFilePermissions": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/controllermamager/pod_spec_ownership.rego b/checks/kubernetes/cisbenchmarks/controllermamager/pod_spec_ownership.rego index c9a0397a..9bede10d 100644 --- a/checks/kubernetes/cisbenchmarks/controllermamager/pod_spec_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/controllermamager/pod_spec_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0051 import data.lib.kubernetes +import data.lib.result validate_spec_ownership(sp) := {"kubeControllerManagerSpecFileOwnership": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/controllermamager/pod_spec_permission.rego b/checks/kubernetes/cisbenchmarks/controllermamager/pod_spec_permission.rego index 185315b1..da615dd4 100644 --- a/checks/kubernetes/cisbenchmarks/controllermamager/pod_spec_permission.rego +++ b/checks/kubernetes/cisbenchmarks/controllermamager/pod_spec_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0050 import data.lib.kubernetes +import data.lib.result validate_spec_permission(sp) := {"kubeControllerManagerSpecFilePermission": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/controllermamager/profiling.rego b/checks/kubernetes/cisbenchmarks/controllermamager/profiling.rego index d7b5708a..3ba7298e 100644 --- a/checks/kubernetes/cisbenchmarks/controllermamager/profiling.rego +++ b/checks/kubernetes/cisbenchmarks/controllermamager/profiling.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0034 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/controllermamager/root_ca_file.rego b/checks/kubernetes/cisbenchmarks/controllermamager/root_ca_file.rego index 3fdc9010..c436b6c5 100644 --- a/checks/kubernetes/cisbenchmarks/controllermamager/root_ca_file.rego +++ b/checks/kubernetes/cisbenchmarks/controllermamager/root_ca_file.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0037 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/controllermamager/rotate_kubelet_server_certificate.rego b/checks/kubernetes/cisbenchmarks/controllermamager/rotate_kubelet_server_certificate.rego index cc45b24d..4bf9bfb9 100644 --- a/checks/kubernetes/cisbenchmarks/controllermamager/rotate_kubelet_server_certificate.rego +++ b/checks/kubernetes/cisbenchmarks/controllermamager/rotate_kubelet_server_certificate.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0038 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/controllermamager/service_account_private_key_file.rego b/checks/kubernetes/cisbenchmarks/controllermamager/service_account_private_key_file.rego index 167a2c5d..851a770b 100644 --- a/checks/kubernetes/cisbenchmarks/controllermamager/service_account_private_key_file.rego +++ b/checks/kubernetes/cisbenchmarks/controllermamager/service_account_private_key_file.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0036 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/controllermamager/terminated_pod_gc_threshold.rego b/checks/kubernetes/cisbenchmarks/controllermamager/terminated_pod_gc_threshold.rego index 2405da59..4b1d8012 100644 --- a/checks/kubernetes/cisbenchmarks/controllermamager/terminated_pod_gc_threshold.rego +++ b/checks/kubernetes/cisbenchmarks/controllermamager/terminated_pod_gc_threshold.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0033 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/controllermamager/use_service_account_credentials.rego b/checks/kubernetes/cisbenchmarks/controllermamager/use_service_account_credentials.rego index 3aacb6ef..7b45e555 100644 --- a/checks/kubernetes/cisbenchmarks/controllermamager/use_service_account_credentials.rego +++ b/checks/kubernetes/cisbenchmarks/controllermamager/use_service_account_credentials.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0035 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/etcd/auto_tls.rego b/checks/kubernetes/cisbenchmarks/etcd/auto_tls.rego index 42d4a974..f1dee1b4 100644 --- a/checks/kubernetes/cisbenchmarks/etcd/auto_tls.rego +++ b/checks/kubernetes/cisbenchmarks/etcd/auto_tls.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0044 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/etcd/cert_file_and_key_file.rego b/checks/kubernetes/cisbenchmarks/etcd/cert_file_and_key_file.rego index 19e19981..41273e34 100644 --- a/checks/kubernetes/cisbenchmarks/etcd/cert_file_and_key_file.rego +++ b/checks/kubernetes/cisbenchmarks/etcd/cert_file_and_key_file.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0042 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/etcd/client_cert_auth.rego b/checks/kubernetes/cisbenchmarks/etcd/client_cert_auth.rego index 3355dacf..d28308c7 100644 --- a/checks/kubernetes/cisbenchmarks/etcd/client_cert_auth.rego +++ b/checks/kubernetes/cisbenchmarks/etcd/client_cert_auth.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0043 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/etcd/data_directory_ownership.rego b/checks/kubernetes/cisbenchmarks/etcd/data_directory_ownership.rego index 03b9689c..3d47f4bc 100644 --- a/checks/kubernetes/cisbenchmarks/etcd/data_directory_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/etcd/data_directory_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0059 import data.lib.kubernetes +import data.lib.result validate_data_dir_ownership(sp) := {"etcdDataDirectoryOwnership": ownership} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/etcd/data_directory_permission.rego b/checks/kubernetes/cisbenchmarks/etcd/data_directory_permission.rego index 0dbcfc6f..024ed3eb 100644 --- a/checks/kubernetes/cisbenchmarks/etcd/data_directory_permission.rego +++ b/checks/kubernetes/cisbenchmarks/etcd/data_directory_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0058 import data.lib.kubernetes +import data.lib.result validate_spec_permission(sp) := {"etcdDataDirectoryPermissions": permission} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/etcd/peer_auto_tls.rego b/checks/kubernetes/cisbenchmarks/etcd/peer_auto_tls.rego index 22b2cb79..ad0745d9 100644 --- a/checks/kubernetes/cisbenchmarks/etcd/peer_auto_tls.rego +++ b/checks/kubernetes/cisbenchmarks/etcd/peer_auto_tls.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0047 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/etcd/peer_cert_file_and_key_file.rego b/checks/kubernetes/cisbenchmarks/etcd/peer_cert_file_and_key_file.rego index 11396947..ca7ecf93 100644 --- a/checks/kubernetes/cisbenchmarks/etcd/peer_cert_file_and_key_file.rego +++ b/checks/kubernetes/cisbenchmarks/etcd/peer_cert_file_and_key_file.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0045 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/etcd/peer_client_cert_auth.rego b/checks/kubernetes/cisbenchmarks/etcd/peer_client_cert_auth.rego index 90a8cf80..1c534a0d 100644 --- a/checks/kubernetes/cisbenchmarks/etcd/peer_client_cert_auth.rego +++ b/checks/kubernetes/cisbenchmarks/etcd/peer_client_cert_auth.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0046 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/etcd/pod_spec_ownership.rego b/checks/kubernetes/cisbenchmarks/etcd/pod_spec_ownership.rego index 042da05e..9f047f42 100644 --- a/checks/kubernetes/cisbenchmarks/etcd/pod_spec_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/etcd/pod_spec_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0055 import data.lib.kubernetes +import data.lib.result validate_spec_ownership(sp) := {"kubeEtcdSpecFileOwnership": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/etcd/pod_spec_permission.rego b/checks/kubernetes/cisbenchmarks/etcd/pod_spec_permission.rego index d78d771a..952eeae6 100644 --- a/checks/kubernetes/cisbenchmarks/etcd/pod_spec_permission.rego +++ b/checks/kubernetes/cisbenchmarks/etcd/pod_spec_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0054 import data.lib.kubernetes +import data.lib.result validate_spec_permission(sp) := {"kubeEtcdSpecFilePermission": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/kubelet/certificate_authorities_file_ownership.rego b/checks/kubernetes/cisbenchmarks/kubelet/certificate_authorities_file_ownership.rego index 534dac9c..f6658f3d 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/certificate_authorities_file_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/certificate_authorities_file_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0076 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/certificate_authorities_file_permission.rego b/checks/kubernetes/cisbenchmarks/kubelet/certificate_authorities_file_permission.rego index ee7062e4..7648d61f 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/certificate_authorities_file_permission.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/certificate_authorities_file_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0075 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_anonymous_auth_argument.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_anonymous_auth_argument.rego index 86eea8f6..8744aec4 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_anonymous_auth_argument.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_anonymous_auth_argument.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0079 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_authorization_mode_argument.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_authorization_mode_argument.rego index 46003142..d46d9b49 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_authorization_mode_argument.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_authorization_mode_argument.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0080 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_client_ca_file_argument.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_client_ca_file_argument.rego index e78a1bf6..35db1f46 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_client_ca_file_argument.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_client_ca_file_argument.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0081 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_file_ownership.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_file_ownership.rego index 7fcaa32c..0be759b7 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_file_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_file_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0074 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_file_permission.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_file_permission.rego index d163d4e8..e92bb08a 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_file_permission.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_file_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0073 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_yaml_ownership.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_yaml_ownership.rego index 7adc075a..ccfd0b4e 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_yaml_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_yaml_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0078 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_yaml_permission.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_yaml_permission.rego index 9d475f12..bc3a8567 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_yaml_permission.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_config_yaml_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0077 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_event_qps.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_event_qps.rego index e493c347..bcd3d038 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_event_qps.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_event_qps.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0087 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_hostname_override.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_hostname_override.rego index bff1a2f8..de7ad304 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_hostname_override.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_hostname_override.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0086 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_make_iptables_util_chains.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_make_iptables_util_chains.rego index 805fd079..2351ee42 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_make_iptables_util_chains.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_make_iptables_util_chains.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0084 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_only_use_strong_cryptographic.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_only_use_strong_cryptographic.rego index a44cd300..40ef1044 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_only_use_strong_cryptographic.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_only_use_strong_cryptographic.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0092 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_protect_kernel_defaults.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_protect_kernel_defaults.rego index a52ecc7b..6e5f2436 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_protect_kernel_defaults.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_protect_kernel_defaults.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0083 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_read_only_port_argument.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_read_only_port_argument.rego index ee37d607..e27bdec5 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_read_only_port_argument.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_read_only_port_argument.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0082 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_rotate_certificates.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_rotate_certificates.rego index ea97d407..cb90b73a 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_rotate_certificates.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_rotate_certificates.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0090 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_rotate_kubelet_server_certificate.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_rotate_kubelet_server_certificate.rego index 0b9e24dc..7763e924 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_rotate_kubelet_server_certificate.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_rotate_kubelet_server_certificate.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0091 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_streaming_connection_argument.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_streaming_connection_argument.rego index 3344d3ac..caba8526 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_streaming_connection_argument.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_streaming_connection_argument.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0085 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_tls_cert_file.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_tls_cert_file.rego index 469b16fb..d1fa75dc 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_tls_cert_file.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_tls_cert_file.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0088 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_tls_key_file.rego b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_tls_key_file.rego index 58e44da4..4d6991b0 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kubelet_tls_key_file.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kubelet_tls_key_file.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0089 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kublet_service_file_ownership.rego b/checks/kubernetes/cisbenchmarks/kubelet/kublet_service_file_ownership.rego index 11073b45..1aee7da7 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kublet_service_file_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kublet_service_file_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0070 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/kublet_service_file_permission.rego b/checks/kubernetes/cisbenchmarks/kubelet/kublet_service_file_permission.rego index d6505197..cfd5fcb2 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/kublet_service_file_permission.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/kublet_service_file_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0069 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/proxy_kube_config_file_ownership.rego b/checks/kubernetes/cisbenchmarks/kubelet/proxy_kube_config_file_ownership.rego index f992f957..0042d74e 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/proxy_kube_config_file_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/proxy_kube_config_file_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0072 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/kubelet/proxy_kube_config_file_permission.rego b/checks/kubernetes/cisbenchmarks/kubelet/proxy_kube_config_file_permission.rego index 4ead7ab2..ffe3fe97 100644 --- a/checks/kubernetes/cisbenchmarks/kubelet/proxy_kube_config_file_permission.rego +++ b/checks/kubernetes/cisbenchmarks/kubelet/proxy_kube_config_file_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0071 import data.lib.kubernetes +import data.lib.result types := ["master", "worker"] diff --git a/checks/kubernetes/cisbenchmarks/scheduler/bind_address.rego b/checks/kubernetes/cisbenchmarks/scheduler/bind_address.rego index c6f2d035..6c80cb4a 100644 --- a/checks/kubernetes/cisbenchmarks/scheduler/bind_address.rego +++ b/checks/kubernetes/cisbenchmarks/scheduler/bind_address.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0041 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/scheduler/pod_spec_ownership.rego b/checks/kubernetes/cisbenchmarks/scheduler/pod_spec_ownership.rego index 997428df..d47b8e85 100644 --- a/checks/kubernetes/cisbenchmarks/scheduler/pod_spec_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/scheduler/pod_spec_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0053 import data.lib.kubernetes +import data.lib.result validate_spec_ownership(sp) := {"kubeSchedulerSpecFileOwnership": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/scheduler/pod_spec_permission.rego b/checks/kubernetes/cisbenchmarks/scheduler/pod_spec_permission.rego index b077d029..6e067bd4 100644 --- a/checks/kubernetes/cisbenchmarks/scheduler/pod_spec_permission.rego +++ b/checks/kubernetes/cisbenchmarks/scheduler/pod_spec_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0052 import data.lib.kubernetes +import data.lib.result validate_spec_permission(sp) := {"kubeSchedulerSpecFilePermission": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/scheduler/profiling.rego b/checks/kubernetes/cisbenchmarks/scheduler/profiling.rego index 84a7ffbf..de907879 100644 --- a/checks/kubernetes/cisbenchmarks/scheduler/profiling.rego +++ b/checks/kubernetes/cisbenchmarks/scheduler/profiling.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0040 import data.lib.kubernetes +import data.lib.result checkFlag[container] { container := kubernetes.containers[_] diff --git a/checks/kubernetes/cisbenchmarks/scheduler/scheduler_conf_ownership.rego b/checks/kubernetes/cisbenchmarks/scheduler/scheduler_conf_ownership.rego index 5d5ce091..d50e4102 100644 --- a/checks/kubernetes/cisbenchmarks/scheduler/scheduler_conf_ownership.rego +++ b/checks/kubernetes/cisbenchmarks/scheduler/scheduler_conf_ownership.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0063 import data.lib.kubernetes +import data.lib.result validate_conf_ownership(sp) := {"schedulerConfFileOwnership": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/cisbenchmarks/scheduler/scheduler_conf_permission.rego b/checks/kubernetes/cisbenchmarks/scheduler/scheduler_conf_permission.rego index 945c0361..4d25da38 100644 --- a/checks/kubernetes/cisbenchmarks/scheduler/scheduler_conf_permission.rego +++ b/checks/kubernetes/cisbenchmarks/scheduler/scheduler_conf_permission.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KCV0062 import data.lib.kubernetes +import data.lib.result validate_conf_permission(sp) := {"schedulerConfFilePermissions": violation} { sp.kind == "NodeInfo" diff --git a/checks/kubernetes/dynamic/outdated_api.rego b/checks/kubernetes/dynamic/outdated_api.rego index ca83ba44..1724593d 100644 --- a/checks/kubernetes/dynamic/outdated_api.rego +++ b/checks/kubernetes/dynamic/outdated_api.rego @@ -2,6 +2,7 @@ package defsec.kubernetes.KSV107 import data.k8s import data.lib.kubernetes +import data.lib.result import data.lib.utils __rego_metadata__ := { diff --git a/checks/kubernetes/general/CPU_not_limited.rego b/checks/kubernetes/general/CPU_not_limited.rego index 244cfdd4..03c66146 100644 --- a/checks/kubernetes/general/CPU_not_limited.rego +++ b/checks/kubernetes/general/CPU_not_limited.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV011 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failLimitsCPU = false diff --git a/checks/kubernetes/general/CPU_requests_not_specified.rego b/checks/kubernetes/general/CPU_requests_not_specified.rego index d5a7160f..42a02a32 100644 --- a/checks/kubernetes/general/CPU_requests_not_specified.rego +++ b/checks/kubernetes/general/CPU_requests_not_specified.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV015 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failRequestsCPU = false diff --git a/checks/kubernetes/general/SYS_ADMIN_capability.rego b/checks/kubernetes/general/SYS_ADMIN_capability.rego index a1f35a2c..7d5dc908 100644 --- a/checks/kubernetes/general/SYS_ADMIN_capability.rego +++ b/checks/kubernetes/general/SYS_ADMIN_capability.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV005 import data.lib.kubernetes +import data.lib.result default failCapsSysAdmin = false diff --git a/checks/kubernetes/general/SYS_MODULE_capability.rego b/checks/kubernetes/general/SYS_MODULE_capability.rego index d7854c62..7fd4307b 100644 --- a/checks/kubernetes/general/SYS_MODULE_capability.rego +++ b/checks/kubernetes/general/SYS_MODULE_capability.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV120 import data.lib.kubernetes +import data.lib.result default failCapsSysModule = false diff --git a/checks/kubernetes/general/allowing_create_role_binding_and_associate_privileged_clusterrole.rego b/checks/kubernetes/general/allowing_create_role_binding_and_associate_privileged_clusterrole.rego index b14b2345..cdc6ae7a 100644 --- a/checks/kubernetes/general/allowing_create_role_binding_and_associate_privileged_clusterrole.rego +++ b/checks/kubernetes/general/allowing_create_role_binding_and_associate_privileged_clusterrole.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV051 import data.lib.kubernetes +import data.lib.result import data.lib.utils readKinds := ["Role", "ClusterRole"] diff --git a/checks/kubernetes/general/allowing_create_role_clusterrolebinding_and_associate_privileged_clusterrole.rego b/checks/kubernetes/general/allowing_create_role_clusterrolebinding_and_associate_privileged_clusterrole.rego index 5e5ef6d6..810d8972 100644 --- a/checks/kubernetes/general/allowing_create_role_clusterrolebinding_and_associate_privileged_clusterrole.rego +++ b/checks/kubernetes/general/allowing_create_role_clusterrolebinding_and_associate_privileged_clusterrole.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV052 import data.lib.kubernetes +import data.lib.result import data.lib.utils readKinds := ["Role", "ClusterRole"] diff --git a/checks/kubernetes/general/allowing_to_update_a_malicious_pod.rego b/checks/kubernetes/general/allowing_to_update_a_malicious_pod.rego index 6958bd40..30f43e3b 100644 --- a/checks/kubernetes/general/allowing_to_update_a_malicious_pod.rego +++ b/checks/kubernetes/general/allowing_to_update_a_malicious_pod.rego @@ -21,6 +21,7 @@ package builtin.kubernetes.KSV048 import data.lib.kubernetes +import data.lib.result import data.lib.utils workloads := ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] diff --git a/checks/kubernetes/general/allowing_users_rolebinding_add_other_users_rolebindings.rego b/checks/kubernetes/general/allowing_users_rolebinding_add_other_users_rolebindings.rego index ebd39d63..bf5df6ef 100644 --- a/checks/kubernetes/general/allowing_users_rolebinding_add_other_users_rolebindings.rego +++ b/checks/kubernetes/general/allowing_users_rolebinding_add_other_users_rolebindings.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV055 import data.lib.kubernetes +import data.lib.result import data.lib.utils readKinds := ["Role", "ClusterRole"] diff --git a/checks/kubernetes/general/anonymous_user_bind.rego b/checks/kubernetes/general/anonymous_user_bind.rego index f5eb2215..ba71b680 100644 --- a/checks/kubernetes/general/anonymous_user_bind.rego +++ b/checks/kubernetes/general/anonymous_user_bind.rego @@ -22,6 +22,7 @@ package appshield.kubernetes.KSV122 import data.lib.kubernetes +import data.lib.result readRoleRefs := ["system:unauthenticated", "system:anonymous"] diff --git a/checks/kubernetes/general/any_any.rego b/checks/kubernetes/general/any_any.rego index 2dc99c16..f76cf648 100644 --- a/checks/kubernetes/general/any_any.rego +++ b/checks/kubernetes/general/any_any.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV044 import data.lib.kubernetes +import data.lib.result import data.lib.utils readKinds := ["Role", "ClusterRole"] diff --git a/checks/kubernetes/general/any_verb.rego b/checks/kubernetes/general/any_verb.rego index 70c5bbc2..ff940cf3 100644 --- a/checks/kubernetes/general/any_verb.rego +++ b/checks/kubernetes/general/any_verb.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV045 import data.lib.kubernetes +import data.lib.result import data.lib.utils resourceRead := ["secrets", "pods", "deployments", "daemonsets", "statefulsets", "replicationcontrollers", "replicasets", "cronjobs", "jobs", "roles", "clusterroles", "rolebindings", "clusterrolebindings", "users", "groups"] diff --git a/checks/kubernetes/general/attaching_pod_view_logs_realtime.rego b/checks/kubernetes/general/attaching_pod_view_logs_realtime.rego index 522ec583..da7c7cc2 100644 --- a/checks/kubernetes/general/attaching_pod_view_logs_realtime.rego +++ b/checks/kubernetes/general/attaching_pod_view_logs_realtime.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV054 import data.lib.kubernetes +import data.lib.result import data.lib.utils readKinds := ["Role", "ClusterRole"] diff --git a/checks/kubernetes/general/capabilities_no_drop_all.rego b/checks/kubernetes/general/capabilities_no_drop_all.rego index 04d7dbd7..e6d3cd21 100644 --- a/checks/kubernetes/general/capabilities_no_drop_all.rego +++ b/checks/kubernetes/general/capabilities_no_drop_all.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV003 import data.lib.kubernetes +import data.lib.result default checkCapsDropAll = false diff --git a/checks/kubernetes/general/default_security_context.rego b/checks/kubernetes/general/default_security_context.rego index 662d39f3..cc422660 100644 --- a/checks/kubernetes/general/default_security_context.rego +++ b/checks/kubernetes/general/default_security_context.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV118 import data.lib.kubernetes +import data.lib.result default failCapsDefaultSecurityContext = false diff --git a/checks/kubernetes/general/delete_pod_logs.rego b/checks/kubernetes/general/delete_pod_logs.rego index 187a3bec..d065b68b 100644 --- a/checks/kubernetes/general/delete_pod_logs.rego +++ b/checks/kubernetes/general/delete_pod_logs.rego @@ -21,6 +21,7 @@ package builtin.kubernetes.KSV042 import data.lib.kubernetes +import data.lib.result import data.lib.utils readVerbs := ["delete", "deletecollection", "*"] diff --git a/checks/kubernetes/general/file_system_not_read_only.rego b/checks/kubernetes/general/file_system_not_read_only.rego index cc8afa4e..8decaf0a 100644 --- a/checks/kubernetes/general/file_system_not_read_only.rego +++ b/checks/kubernetes/general/file_system_not_read_only.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV014 import data.lib.kubernetes +import data.lib.result default failReadOnlyRootFilesystem = false diff --git a/checks/kubernetes/general/get_shell_on_pod.rego b/checks/kubernetes/general/get_shell_on_pod.rego index 6304b1bb..cafb5f14 100644 --- a/checks/kubernetes/general/get_shell_on_pod.rego +++ b/checks/kubernetes/general/get_shell_on_pod.rego @@ -21,6 +21,7 @@ package builtin.kubernetes.KSV053 import data.lib.kubernetes +import data.lib.result import data.lib.utils workloads := ["pods/exec"] diff --git a/checks/kubernetes/general/impersonate_privileged_groups.rego b/checks/kubernetes/general/impersonate_privileged_groups.rego index 3086b1bf..56029e1d 100644 --- a/checks/kubernetes/general/impersonate_privileged_groups.rego +++ b/checks/kubernetes/general/impersonate_privileged_groups.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV043 import data.lib.kubernetes +import data.lib.result import data.lib.utils readKinds := ["Role", "ClusterRole"] diff --git a/checks/kubernetes/general/manage_all_resources.rego b/checks/kubernetes/general/manage_all_resources.rego index 9668b5e4..15cb1cca 100644 --- a/checks/kubernetes/general/manage_all_resources.rego +++ b/checks/kubernetes/general/manage_all_resources.rego @@ -20,6 +20,7 @@ package builtin.kubernetes.KSV046 import data.lib.kubernetes +import data.lib.result import data.lib.utils readVerbs := ["create", "update", "delete", "deletecollection", "impersonate", "*", "list", "get"] diff --git a/checks/kubernetes/general/manage_all_resources_at_namespace.rego b/checks/kubernetes/general/manage_all_resources_at_namespace.rego index b62c674b..49560637 100644 --- a/checks/kubernetes/general/manage_all_resources_at_namespace.rego +++ b/checks/kubernetes/general/manage_all_resources_at_namespace.rego @@ -20,6 +20,7 @@ package builtin.kubernetes.KSV112 import data.lib.kubernetes +import data.lib.result import data.lib.utils readVerbs := ["create", "update", "delete", "deletecollection", "impersonate", "*", "list", "get"] diff --git a/checks/kubernetes/general/manage_configmaps.rego b/checks/kubernetes/general/manage_configmaps.rego index d3c36fc4..8dbd11a6 100644 --- a/checks/kubernetes/general/manage_configmaps.rego +++ b/checks/kubernetes/general/manage_configmaps.rego @@ -21,6 +21,7 @@ package builtin.kubernetes.KSV049 import data.lib.kubernetes +import data.lib.result import data.lib.utils readVerbs := ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] diff --git a/checks/kubernetes/general/manage_eks_iam_auth_configmap.rego b/checks/kubernetes/general/manage_eks_iam_auth_configmap.rego index 3d575f92..da64f462 100644 --- a/checks/kubernetes/general/manage_eks_iam_auth_configmap.rego +++ b/checks/kubernetes/general/manage_eks_iam_auth_configmap.rego @@ -21,6 +21,7 @@ package builtin.kubernetes.KSV115 import data.lib.kubernetes +import data.lib.result import data.lib.utils readVerbs := ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] diff --git a/checks/kubernetes/general/manage_kubernetes_networking.rego b/checks/kubernetes/general/manage_kubernetes_networking.rego index ae9d7e7e..a0ff0160 100644 --- a/checks/kubernetes/general/manage_kubernetes_networking.rego +++ b/checks/kubernetes/general/manage_kubernetes_networking.rego @@ -21,6 +21,7 @@ package builtin.kubernetes.KSV056 import data.lib.kubernetes +import data.lib.result import data.lib.utils readKinds := ["Role", "ClusterRole"] diff --git a/checks/kubernetes/general/manage_kubernetes_rbac_resources.rego b/checks/kubernetes/general/manage_kubernetes_rbac_resources.rego index 17d61fe3..fd6b1bae 100644 --- a/checks/kubernetes/general/manage_kubernetes_rbac_resources.rego +++ b/checks/kubernetes/general/manage_kubernetes_rbac_resources.rego @@ -21,6 +21,7 @@ package builtin.kubernetes.KSV050 import data.lib.kubernetes +import data.lib.result import data.lib.utils readVerbs := ["create", "update", "delete", "deletecollection", "impersonate", "*"] diff --git a/checks/kubernetes/general/manage_namespace_secrets.rego b/checks/kubernetes/general/manage_namespace_secrets.rego index 17170bf6..3c971b0c 100644 --- a/checks/kubernetes/general/manage_namespace_secrets.rego +++ b/checks/kubernetes/general/manage_namespace_secrets.rego @@ -20,6 +20,7 @@ package builtin.kubernetes.KSV113 import data.lib.kubernetes +import data.lib.result import data.lib.utils readVerbs := ["get", "list", "watch", "create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] diff --git a/checks/kubernetes/general/manage_secrets.rego b/checks/kubernetes/general/manage_secrets.rego index e10fbdba..6e7c150f 100644 --- a/checks/kubernetes/general/manage_secrets.rego +++ b/checks/kubernetes/general/manage_secrets.rego @@ -20,6 +20,7 @@ package builtin.kubernetes.KSV041 import data.lib.kubernetes +import data.lib.result import data.lib.utils readVerbs := ["get", "list", "watch", "create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] diff --git a/checks/kubernetes/general/manage_webhook_configurations.rego b/checks/kubernetes/general/manage_webhook_configurations.rego index 81d28084..5c13e9b5 100644 --- a/checks/kubernetes/general/manage_webhook_configurations.rego +++ b/checks/kubernetes/general/manage_webhook_configurations.rego @@ -21,6 +21,7 @@ package builtin.kubernetes.KSV114 import data.lib.kubernetes +import data.lib.result import data.lib.utils readVerbs := ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] diff --git a/checks/kubernetes/general/memory_not_limited.rego b/checks/kubernetes/general/memory_not_limited.rego index 3c3aa12c..febeae71 100644 --- a/checks/kubernetes/general/memory_not_limited.rego +++ b/checks/kubernetes/general/memory_not_limited.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV018 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failLimitsMemory = false diff --git a/checks/kubernetes/general/memory_requests_not_specified.rego b/checks/kubernetes/general/memory_requests_not_specified.rego index 95c1ccaf..79f99861 100644 --- a/checks/kubernetes/general/memory_requests_not_specified.rego +++ b/checks/kubernetes/general/memory_requests_not_specified.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV016 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failRequestsMemory = false diff --git a/checks/kubernetes/general/mounts_docker_socket.rego b/checks/kubernetes/general/mounts_docker_socket.rego index 2024dd8e..9b15e483 100644 --- a/checks/kubernetes/general/mounts_docker_socket.rego +++ b/checks/kubernetes/general/mounts_docker_socket.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV006 import data.lib.kubernetes +import data.lib.result name = input.metadata.name diff --git a/checks/kubernetes/general/net_raw_capability.rego b/checks/kubernetes/general/net_raw_capability.rego index 1d684bc3..3990ea21 100644 --- a/checks/kubernetes/general/net_raw_capability.rego +++ b/checks/kubernetes/general/net_raw_capability.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV119 import data.lib.kubernetes +import data.lib.result default failCapsNetRaw = false diff --git a/checks/kubernetes/general/privilege_escalation_from_node_proxy.rego b/checks/kubernetes/general/privilege_escalation_from_node_proxy.rego index ecd61519..282f3798 100644 --- a/checks/kubernetes/general/privilege_escalation_from_node_proxy.rego +++ b/checks/kubernetes/general/privilege_escalation_from_node_proxy.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV047 import data.lib.kubernetes +import data.lib.result import data.lib.utils readVerbs := ["get", "create"] diff --git a/checks/kubernetes/general/runs_with_GID_le_10000.rego b/checks/kubernetes/general/runs_with_GID_le_10000.rego index 697ea98d..e3509395 100644 --- a/checks/kubernetes/general/runs_with_GID_le_10000.rego +++ b/checks/kubernetes/general/runs_with_GID_le_10000.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV021 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failRunAsGroup = false diff --git a/checks/kubernetes/general/runs_with_UID_le_10000.rego b/checks/kubernetes/general/runs_with_UID_le_10000.rego index fb7a66ba..d2b1597a 100644 --- a/checks/kubernetes/general/runs_with_UID_le_10000.rego +++ b/checks/kubernetes/general/runs_with_UID_le_10000.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV020 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failRunAsUser = false diff --git a/checks/kubernetes/general/runs_with_a_root_primary_or_supplementary_GID.rego b/checks/kubernetes/general/runs_with_a_root_primary_or_supplementary_GID.rego index ce2b6af5..e9bc07a8 100644 --- a/checks/kubernetes/general/runs_with_a_root_primary_or_supplementary_GID.rego +++ b/checks/kubernetes/general/runs_with_a_root_primary_or_supplementary_GID.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV116 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failRootGroupId = false diff --git a/checks/kubernetes/general/tiller_is_deployed.rego b/checks/kubernetes/general/tiller_is_deployed.rego index 92841518..f0ecd8ac 100644 --- a/checks/kubernetes/general/tiller_is_deployed.rego +++ b/checks/kubernetes/general/tiller_is_deployed.rego @@ -16,6 +16,7 @@ package builtin.kubernetes.KSV102 import data.lib.kubernetes +import data.lib.result # Get all containers and check kubernetes metadata for tiller tillerDeployed[container] { diff --git a/checks/kubernetes/general/uses_image_tag_latest.rego b/checks/kubernetes/general/uses_image_tag_latest.rego index 74cca5e3..386abf5f 100644 --- a/checks/kubernetes/general/uses_image_tag_latest.rego +++ b/checks/kubernetes/general/uses_image_tag_latest.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV013 import data.lib.kubernetes +import data.lib.result default checkUsingLatestTag = false diff --git a/checks/kubernetes/pss/baseline/10_windows_host_process.rego b/checks/kubernetes/pss/baseline/10_windows_host_process.rego index b74eb6e4..e1c4ed49 100644 --- a/checks/kubernetes/pss/baseline/10_windows_host_process.rego +++ b/checks/kubernetes/pss/baseline/10_windows_host_process.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV103 import data.lib.kubernetes +import data.lib.result import data.lib.utils failHostProcess[spec] { diff --git a/checks/kubernetes/pss/baseline/11_seccomp_profile_unconfined.rego b/checks/kubernetes/pss/baseline/11_seccomp_profile_unconfined.rego index 9e0606b7..d782b4c5 100644 --- a/checks/kubernetes/pss/baseline/11_seccomp_profile_unconfined.rego +++ b/checks/kubernetes/pss/baseline/11_seccomp_profile_unconfined.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV104 import data.lib.kubernetes +import data.lib.result import data.lib.utils # getSeccompContainers returns all containers which have a seccomp diff --git a/checks/kubernetes/pss/baseline/12_privileged_ports_binding.rego b/checks/kubernetes/pss/baseline/12_privileged_ports_binding.rego index ff102fdd..0c95318d 100644 --- a/checks/kubernetes/pss/baseline/12_privileged_ports_binding.rego +++ b/checks/kubernetes/pss/baseline/12_privileged_ports_binding.rego @@ -28,6 +28,7 @@ package builtin.kubernetes.KSV117 import data.lib.kubernetes +import data.lib.result default failPrivilegedPort = false diff --git a/checks/kubernetes/pss/baseline/1_host_ipc.rego b/checks/kubernetes/pss/baseline/1_host_ipc.rego index 3fbd3184..5b2cebad 100644 --- a/checks/kubernetes/pss/baseline/1_host_ipc.rego +++ b/checks/kubernetes/pss/baseline/1_host_ipc.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV008 import data.lib.kubernetes +import data.lib.result default failHostIPC = false diff --git a/checks/kubernetes/pss/baseline/1_host_network.rego b/checks/kubernetes/pss/baseline/1_host_network.rego index 1ee29768..5753da49 100644 --- a/checks/kubernetes/pss/baseline/1_host_network.rego +++ b/checks/kubernetes/pss/baseline/1_host_network.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV009 import data.lib.kubernetes +import data.lib.result default failHostNetwork = false diff --git a/checks/kubernetes/pss/baseline/1_host_pid.rego b/checks/kubernetes/pss/baseline/1_host_pid.rego index e64739e7..3ea6c951 100644 --- a/checks/kubernetes/pss/baseline/1_host_pid.rego +++ b/checks/kubernetes/pss/baseline/1_host_pid.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV010 import data.lib.kubernetes +import data.lib.result default failHostPID = false diff --git a/checks/kubernetes/pss/baseline/2_privileged.rego b/checks/kubernetes/pss/baseline/2_privileged.rego index bab45239..352c9c7a 100644 --- a/checks/kubernetes/pss/baseline/2_privileged.rego +++ b/checks/kubernetes/pss/baseline/2_privileged.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV017 import data.lib.kubernetes +import data.lib.result default failPrivileged = false diff --git a/checks/kubernetes/pss/baseline/3_specific_capabilities_added.rego b/checks/kubernetes/pss/baseline/3_specific_capabilities_added.rego index efe90b15..f024f7a6 100644 --- a/checks/kubernetes/pss/baseline/3_specific_capabilities_added.rego +++ b/checks/kubernetes/pss/baseline/3_specific_capabilities_added.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV022 import data.lib.kubernetes +import data.lib.result default failAdditionalCaps = false diff --git a/checks/kubernetes/pss/baseline/4_hostpath_volumes_mounted.rego b/checks/kubernetes/pss/baseline/4_hostpath_volumes_mounted.rego index 1faef701..4b4a3a64 100644 --- a/checks/kubernetes/pss/baseline/4_hostpath_volumes_mounted.rego +++ b/checks/kubernetes/pss/baseline/4_hostpath_volumes_mounted.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV023 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failHostPathVolume = false diff --git a/checks/kubernetes/pss/baseline/5_access_to_host_ports.rego b/checks/kubernetes/pss/baseline/5_access_to_host_ports.rego index f6e2420d..1c840c3b 100644 --- a/checks/kubernetes/pss/baseline/5_access_to_host_ports.rego +++ b/checks/kubernetes/pss/baseline/5_access_to_host_ports.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV024 import data.lib.kubernetes +import data.lib.result default failHostPorts = false diff --git a/checks/kubernetes/pss/baseline/6_apparmor_policy_disabled.rego b/checks/kubernetes/pss/baseline/6_apparmor_policy_disabled.rego index 4fcdbe91..6fc41613 100644 --- a/checks/kubernetes/pss/baseline/6_apparmor_policy_disabled.rego +++ b/checks/kubernetes/pss/baseline/6_apparmor_policy_disabled.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV002 import data.lib.kubernetes +import data.lib.result default failAppArmor = false diff --git a/checks/kubernetes/pss/baseline/6_apparmor_policy_disabled_test.rego b/checks/kubernetes/pss/baseline/6_apparmor_policy_disabled_test.rego index 5158a7e5..84c0b966 100644 --- a/checks/kubernetes/pss/baseline/6_apparmor_policy_disabled_test.rego +++ b/checks/kubernetes/pss/baseline/6_apparmor_policy_disabled_test.rego @@ -1,6 +1,7 @@ package builtin.kubernetes.KSV002 import data.lib.kubernetes +import data.lib.result test_custom_deny { r := deny with input as { diff --git a/checks/kubernetes/pss/baseline/7_selinux_custom_options_set.rego b/checks/kubernetes/pss/baseline/7_selinux_custom_options_set.rego index 6a7a208c..bda235de 100644 --- a/checks/kubernetes/pss/baseline/7_selinux_custom_options_set.rego +++ b/checks/kubernetes/pss/baseline/7_selinux_custom_options_set.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV025 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failSELinux = false diff --git a/checks/kubernetes/pss/baseline/8_non_default_proc_masks_set.rego b/checks/kubernetes/pss/baseline/8_non_default_proc_masks_set.rego index 6a8310b0..3a3c525f 100644 --- a/checks/kubernetes/pss/baseline/8_non_default_proc_masks_set.rego +++ b/checks/kubernetes/pss/baseline/8_non_default_proc_masks_set.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV027 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failProcMount = false diff --git a/checks/kubernetes/pss/baseline/9_unsafe_sysctl_options_set.rego b/checks/kubernetes/pss/baseline/9_unsafe_sysctl_options_set.rego index b6397962..dd21b714 100644 --- a/checks/kubernetes/pss/baseline/9_unsafe_sysctl_options_set.rego +++ b/checks/kubernetes/pss/baseline/9_unsafe_sysctl_options_set.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV026 import data.lib.kubernetes +import data.lib.result import data.lib.utils default failSysctls = false diff --git a/checks/kubernetes/pss/restricted/1_non_core_volume_types.rego b/checks/kubernetes/pss/restricted/1_non_core_volume_types.rego index fa7b2cfd..cca17f62 100644 --- a/checks/kubernetes/pss/restricted/1_non_core_volume_types.rego +++ b/checks/kubernetes/pss/restricted/1_non_core_volume_types.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV028 import data.lib.kubernetes +import data.lib.result import data.lib.utils # Add disallowed volume type diff --git a/checks/kubernetes/pss/restricted/2_can_elevate_its_own_privileges.rego b/checks/kubernetes/pss/restricted/2_can_elevate_its_own_privileges.rego index b358f56a..fdde9dbb 100644 --- a/checks/kubernetes/pss/restricted/2_can_elevate_its_own_privileges.rego +++ b/checks/kubernetes/pss/restricted/2_can_elevate_its_own_privileges.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV001 import data.lib.kubernetes +import data.lib.result import data.lib.utils default checkAllowPrivilegeEscalation = false diff --git a/checks/kubernetes/pss/restricted/3_runs_as_root.rego b/checks/kubernetes/pss/restricted/3_runs_as_root.rego index b4bb37c0..9f7980f9 100644 --- a/checks/kubernetes/pss/restricted/3_runs_as_root.rego +++ b/checks/kubernetes/pss/restricted/3_runs_as_root.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV012 import data.lib.kubernetes +import data.lib.result import data.lib.utils default checkRunAsNonRoot = false diff --git a/checks/kubernetes/pss/restricted/4_runs_with_a_root_uid.rego b/checks/kubernetes/pss/restricted/4_runs_with_a_root_uid.rego index c87a9086..d012e51f 100644 --- a/checks/kubernetes/pss/restricted/4_runs_with_a_root_uid.rego +++ b/checks/kubernetes/pss/restricted/4_runs_with_a_root_uid.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV105 import data.lib.kubernetes +import data.lib.result import data.lib.utils failRootUserId[securityContext] { diff --git a/checks/kubernetes/pss/restricted/5_runtime_default_seccomp_profile_not_set.rego b/checks/kubernetes/pss/restricted/5_runtime_default_seccomp_profile_not_set.rego index 4a336cb6..de8d14fe 100644 --- a/checks/kubernetes/pss/restricted/5_runtime_default_seccomp_profile_not_set.rego +++ b/checks/kubernetes/pss/restricted/5_runtime_default_seccomp_profile_not_set.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV030 import data.lib.kubernetes +import data.lib.result import data.lib.utils getType(target) = type { diff --git a/checks/kubernetes/pss/restricted/5_runtime_default_seccomp_profile_not_set_test.rego b/checks/kubernetes/pss/restricted/5_runtime_default_seccomp_profile_not_set_test.rego index 6981051e..c1bcb5f9 100644 --- a/checks/kubernetes/pss/restricted/5_runtime_default_seccomp_profile_not_set_test.rego +++ b/checks/kubernetes/pss/restricted/5_runtime_default_seccomp_profile_not_set_test.rego @@ -1,6 +1,7 @@ package builtin.kubernetes.KSV030 import data.lib.kubernetes +import data.lib.result test_pod_context_custom_profile_denied { r := deny with input as { diff --git a/checks/kubernetes/pss/restricted/6_drop_all_capabilities_only_add_net_bind_service.rego b/checks/kubernetes/pss/restricted/6_drop_all_capabilities_only_add_net_bind_service.rego index 2c7eaf15..1e41909d 100644 --- a/checks/kubernetes/pss/restricted/6_drop_all_capabilities_only_add_net_bind_service.rego +++ b/checks/kubernetes/pss/restricted/6_drop_all_capabilities_only_add_net_bind_service.rego @@ -18,6 +18,7 @@ package builtin.kubernetes.KSV106 import data.lib.kubernetes +import data.lib.result import data.lib.utils hasDropAll(container) { diff --git a/checks/kubernetes/pss/restricted/6_drop_all_capabilities_only_add_net_bind_service_test.rego b/checks/kubernetes/pss/restricted/6_drop_all_capabilities_only_add_net_bind_service_test.rego index 8c2ee45c..59aae4eb 100644 --- a/checks/kubernetes/pss/restricted/6_drop_all_capabilities_only_add_net_bind_service_test.rego +++ b/checks/kubernetes/pss/restricted/6_drop_all_capabilities_only_add_net_bind_service_test.rego @@ -1,6 +1,7 @@ package builtin.kubernetes.KSV106 import data.lib.kubernetes +import data.lib.result test_drop_all_allowed { r := deny with input as { diff --git a/checks/kubernetes/pss/restricted/7_Kubernetes_resource_with_disallowed_volumes_mounted.rego b/checks/kubernetes/pss/restricted/7_Kubernetes_resource_with_disallowed_volumes_mounted.rego index ffffec58..bc170188 100644 --- a/checks/kubernetes/pss/restricted/7_Kubernetes_resource_with_disallowed_volumes_mounted.rego +++ b/checks/kubernetes/pss/restricted/7_Kubernetes_resource_with_disallowed_volumes_mounted.rego @@ -27,6 +27,7 @@ package builtin.kubernetes.KSV121 import data.lib.kubernetes +import data.lib.result import data.lib.utils # Add disallowed volume type diff --git a/checks/kubernetes/rolebinding/cluster_admin_role_is_only_used_where_required.rego b/checks/kubernetes/rolebinding/cluster_admin_role_is_only_used_where_required.rego index 011a928d..fb97b99f 100644 --- a/checks/kubernetes/rolebinding/cluster_admin_role_is_only_used_where_required.rego +++ b/checks/kubernetes/rolebinding/cluster_admin_role_is_only_used_where_required.rego @@ -21,6 +21,7 @@ package builtin.kubernetes.KSV111 import data.lib.kubernetes +import data.lib.result readRoleRefs := ["cluster-admin", "admin", "edit"] diff --git a/lib/result/result.rego b/lib/result/result.rego new file mode 100644 index 00000000..9ab6cce8 --- /dev/null +++ b/lib/result/result.rego @@ -0,0 +1,20 @@ +# METADATA +# custom: +# library: true +package lib.result + +new(message, metadata) = result { + result := { + "metadata": metadata, + "msg": message, + } +} + +is_managed(cause) = res { + metadata := get_metadata(cause) + res := metadata.managed +} + +get_metadata(cause) = metadata { + metadata := object.get(cause, "__defsec_metadata", cause) +}