Add Kyverno policy for scoped external secrets#2269
Conversation
586cfe2 to
7e0d5b9
Compare
|
Claude finished @siutsin's task in 2m 54s —— View job Review: Kyverno policy for scoped external secretsFindings1. Inherited
dataFrom:
- find:
name:
regexp: ".*"The explicit-override path ( Recommend either denying deny:
conditions:
any:
- key: "{{ `{{ element.find || '' | to_string(@) }}` }}"
operator: NotEquals
value: ""
- key: "{{ `{{ element.extract.key || '' }}` }}"
operator: AnyNotIn
value: [...]2. Empty-list footgun in per-namespace policies ( If a namespace is added to 3. Redundant
4. Placeholder Chart descriptions ( Both still say 5. Operator nit — Looks good
|
|
Claude finished @siutsin's task in 1m 56s —— View job Re-review: latest commit addresses prior feedbackVerified fixes
RemainingStray - key: "{{ `{{ element.remoteRef.key || '' }}` }}"
operator: AnyNotIn # ← change to NotIn for consistencyOtherwise looks good — LGTM once the nit above is addressed.
Branch: |
|
Claude finished @siutsin's task in 47s —— View job Re-review: operator alignment ✅Verified
LGTM — nothing else to flag.
Branch: |
Summary
Test plan