
CEL Policy
This policy is a meta-policy that allows to run CEL expressions
against Kubernetes resources.
A meta-policy is a policy that can be configured via settings, and does not require to be recompiled to change its behavior, acting as a DSL.
The settings of the policy are compliant with the ValidatingAdmissionPolicy Kubernetes resource,
please refer to writing a policy for more information on what fields are supported.
Under the hood, the policy uses CEL and Kubernetes CEL libraries,
this allows to use the same CEL syntax and functions that are available in Kubernetes.
Writing a policy
Both validations and variables fields are supported.
The policy provides the following variables:
request: the admission request
object: the Kubernetes resource being validated
oldObject: the Kubernetes resource before the update, nil if the request is not an update
namespaceObject: the namespace of the resource being validated
params: the parameters found when paramKind and paramRef is defined.
The policy will be evaluated as allowed if all the CEL expressions are evaluated as true.
It is required that the validations expression is a boolean, otherwise the policy will not pass the settings validation phase.
A message or a messageExpression can be specified to provide a custom message when the policy is evaluated as false.
The messageExpression will be evaluated as a CEL expression, and the result will be used as the message.
It is required that the message expression is a string, otherwise the policy will not pass the settings validation phase.
For more information about variables and validation expressions, please refer to the ValidatingAdmissionPolicy Kubernetes resource.
Parameters
This policy can read parameters from other cluster resources to separate
validation logic from its values, much like Kubernetes' native
ValidatingAdmissionPolicy.
The policy uses two fields for this purpose:
paramKind: Defines the resource type to use as a parameter, such as a
ConfigMap.
paramRef: Specifies how to find the parameter resource by its name or a
label selector. time.
Unlike in native Kubernetes where these are separate, both fields are defined
directly within this policy's settings.
The paramRef.parameterNotFoundAction setting controls behavior when a parameter
resource is not found. If set to Deny, the outcome depends on the failurePolicy
setting, which defaults to Fail.
If paramRef matches multiple resources, the incoming request is validated
against all of them. The request will only be accepted if it is valid against
every matched parameter.
Example
Given the following ValidatingAdmissionPolicy:
apiVersion: admissionregistration.k8s.io/v1beta1
kind: ValidatingAdmissionPolicy
metadata:
name: "demo-policy.example.com"
spec:
failurePolicy: Fail
paramKind:
apiVersion: v1
kind: ConfigMap
matchConstraints:
resourceRules:
- apiGroups: ["apps"]
apiVersions: ["v1"]
operations: ["CREATE", "UPDATE"]
resources: ["deployments"]
variables:
- name: replicas
expression: "object.spec.replicas"
validations:
- expression: "variables.replicas <= params.data.maxreplicas"
message: "The number of replicas must be less than or equal to 5"
Let's consider the following example ValidatingAdmissionPolicyBinding with
paramRef:
apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingAdmissionPolicyBinding
metadata:
name: "demo-policy-binding.example.com"
spec:
policyName: "demo-policy.example.com"
validationActions: [Deny]
paramRef:
name: "my-params"
namespace: "default"
parameterNotFoundAction: Deny
matchResources:
namespaceSelector:
matchLabels:
environment: test
The ConfigMap used as parameter resource is:
apiVersion: v1
kind: ConfigMap
metadata:
name: my-params
namespace: default
data:
maxreplicas: "5"
The Kubewarden CEL policy can be written as follows:
apiVersion: policies.kubewarden.io/v1
kind: AdmissionPolicy
metadata:
annotations:
io.kubewarden.policy.category: Resource validation
io.kubewarden.policy.severity: low
name: "demo-policy.example.com"
spec:
module: registry://ghcr.io/kubewarden/policies/cel-policy:latest
settings:
failurePolicy: Fail # this settings is optional. When not defined, the default value is `Fail`
paramKind:
apiVersion: v1
kind: ConfigMap
paramRef:
name: "my-params"
namespace: "default"
parameterNotFoundAction: Deny
variables:
- name: "replicas"
expression: "object.spec.replicas"
validations:
- expression: "variables.replicas <= params.data.maxreplicas"
message: "The number of replicas must be less than or equal to 5"
rules:
- apiGroups: ["apps"]
apiVersions: ["v1"]
operations: ["CREATE", "UPDATE"]
resources: ["deployments"]
mutating: false
backgroundAudit: false
Host capabilities
Kubewarden's host capabilities can be accessed by CEL extension libraries available in the policy environment.
The following host capabilities are available:
Extensions
CEL policy has some extensions that add extra functionality to the language that are not defined in the language definition. The CEL policy has the following extensions enabled:
| Extension |
Description |
Documentation |
| Base64 Encoders |
Allows users to encode/decode base64 strings |
Encoder extension |
Known limitations
At the moment the policy does not support the following Kubernetes extensions: