From 244a76c05fccb6a6e0484d523f65b3db25b80da9 Mon Sep 17 00:00:00 2001 From: ack-bot Date: Sat, 12 Oct 2024 00:20:58 +0000 Subject: [PATCH] ack-cloudtrail-controller artifacts for version 1.0.15 Signed-off-by: ack-bot --- .../1.0.15/bundle.Dockerfile | 21 ++ ...rail-controller.clusterserviceversion.yaml | 278 ++++++++++++++++++ ...cloudtrail-metrics-service_v1_service.yaml | 16 + ...der_rbac.authorization.k8s.io_v1_role.yaml | 15 + ...ter_rbac.authorization.k8s.io_v1_role.yaml | 28 ++ ...rail.services.k8s.aws_eventdatastores.yaml | 246 ++++++++++++++++ .../cloudtrail.services.k8s.aws_trails.yaml | 246 ++++++++++++++++ .../1.0.15/metadata/annotations.yaml | 15 + .../1.0.15/tests/scorecard/config.yaml | 50 ++++ 9 files changed, 915 insertions(+) create mode 100644 operators/ack-cloudtrail-controller/1.0.15/bundle.Dockerfile create mode 100644 operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-controller.clusterserviceversion.yaml create mode 100644 operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-metrics-service_v1_service.yaml create mode 100644 operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-reader_rbac.authorization.k8s.io_v1_role.yaml create mode 100644 operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-writer_rbac.authorization.k8s.io_v1_role.yaml create mode 100644 operators/ack-cloudtrail-controller/1.0.15/manifests/cloudtrail.services.k8s.aws_eventdatastores.yaml create mode 100644 operators/ack-cloudtrail-controller/1.0.15/manifests/cloudtrail.services.k8s.aws_trails.yaml create mode 100644 operators/ack-cloudtrail-controller/1.0.15/metadata/annotations.yaml create mode 100644 operators/ack-cloudtrail-controller/1.0.15/tests/scorecard/config.yaml diff --git a/operators/ack-cloudtrail-controller/1.0.15/bundle.Dockerfile b/operators/ack-cloudtrail-controller/1.0.15/bundle.Dockerfile new file mode 100644 index 00000000000..62512dfa71a --- /dev/null +++ b/operators/ack-cloudtrail-controller/1.0.15/bundle.Dockerfile @@ -0,0 +1,21 @@ +FROM scratch + +# Core bundle labels. +LABEL operators.operatorframework.io.bundle.mediatype.v1=registry+v1 +LABEL operators.operatorframework.io.bundle.manifests.v1=manifests/ +LABEL operators.operatorframework.io.bundle.metadata.v1=metadata/ +LABEL operators.operatorframework.io.bundle.package.v1=ack-cloudtrail-controller +LABEL operators.operatorframework.io.bundle.channels.v1=alpha +LABEL operators.operatorframework.io.bundle.channel.default.v1=alpha +LABEL operators.operatorframework.io.metrics.builder=operator-sdk-v1.28.0 +LABEL operators.operatorframework.io.metrics.mediatype.v1=metrics+v1 +LABEL operators.operatorframework.io.metrics.project_layout=unknown + +# Labels for testing. +LABEL operators.operatorframework.io.test.mediatype.v1=scorecard+v1 +LABEL operators.operatorframework.io.test.config.v1=tests/scorecard/ + +# Copy files to locations specified by labels. +COPY bundle/manifests /manifests/ +COPY bundle/metadata /metadata/ +COPY bundle/tests/scorecard /tests/scorecard/ diff --git a/operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-controller.clusterserviceversion.yaml b/operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-controller.clusterserviceversion.yaml new file mode 100644 index 00000000000..cf7c1467572 --- /dev/null +++ b/operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-controller.clusterserviceversion.yaml @@ -0,0 +1,278 @@ +apiVersion: operators.coreos.com/v1alpha1 +kind: ClusterServiceVersion +metadata: + annotations: + alm-examples: |- + [ + { + "apiVersion": "cloudtrail.services.k8s.aws/v1alpha1", + "kind": "EventDataStore", + "metadata": { + "name": "example" + }, + "spec": {} + }, + { + "apiVersion": "cloudtrail.services.k8s.aws/v1alpha1", + "kind": "Trail", + "metadata": { + "name": "example" + }, + "spec": {} + } + ] + capabilities: Basic Install + categories: Cloud Provider + certified: "false" + containerImage: public.ecr.aws/aws-controllers-k8s/cloudtrail-controller:1.0.15 + createdAt: "2024-10-12T00:19:53Z" + description: AWS CloudTrail controller is a service controller for managing CloudTrail + resources in Kubernetes + operatorframework.io/suggested-namespace: ack-system + operators.operatorframework.io/builder: operator-sdk-v1.28.0 + operators.operatorframework.io/project_layout: unknown + repository: https://github.com/aws-controllers-k8s + support: Community + labels: + operatorframework.io/arch.amd64: supported + operatorframework.io/arch.arm64: supported + operatorframework.io/os.linux: supported + name: ack-cloudtrail-controller.v1.0.15 + namespace: placeholder +spec: + apiservicedefinitions: {} + customresourcedefinitions: + owned: + - description: EventDataStore represents the state of an AWS cloudtrail EventDataStore + resource. + displayName: EventDataStore + kind: EventDataStore + name: eventdatastores.cloudtrail.services.k8s.aws + version: v1alpha1 + - description: Trail represents the state of an AWS cloudtrail Trail resource. + displayName: Trail + kind: Trail + name: trails.cloudtrail.services.k8s.aws + version: v1alpha1 + description: |- + Manage Elastic Compute Cloud (CloudTrail) resources in AWS from within your Kubernetes cluster. + + **About Amazon CloudTrail** + + AWS CloudTrail is an AWS service that helps you enable operational and risk auditing, governance, and compliance of your AWS account. Actions taken by a user, role, or an AWS service are recorded as events in CloudTrail. Events include actions taken in the AWS Management Console, AWS Command Line Interface, and AWS SDKs and APIs. + + **About the AWS Controllers for Kubernetes** + + This controller is a component of the [AWS Controller for Kubernetes](https://github.com/aws/aws-controllers-k8s) project. + + **Pre-Installation Steps** + + Please follow the following link: [Red Hat OpenShift](https://aws-controllers-k8s.github.io/community/docs/user-docs/openshift/) + displayName: AWS Controllers for Kubernetes - Amazon CloudTrail + icon: + - base64data: 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 + mediatype: image/svg+xml + install: + spec: + clusterPermissions: + - rules: + - apiGroups: + - "" + resources: + - configmaps + - secrets + verbs: + - get + - list + - patch + - watch + - apiGroups: + - "" + resources: + - namespaces + verbs: + - get + - list + - watch + - apiGroups: + - cloudtrail.services.k8s.aws + resources: + - eventdatastores + - trails + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + - apiGroups: + - cloudtrail.services.k8s.aws + resources: + - eventdatastores/status + - trails/status + verbs: + - get + - patch + - update + - apiGroups: + - services.k8s.aws + resources: + - adoptedresources + - fieldexports + verbs: + - create + - delete + - get + - list + - patch + - update + - watch + - apiGroups: + - services.k8s.aws + resources: + - adoptedresources/status + - fieldexports/status + verbs: + - get + - patch + - update + serviceAccountName: ack-cloudtrail-controller + deployments: + - label: + app.kubernetes.io/name: ack-cloudtrail-controller + app.kubernetes.io/part-of: ack-system + name: ack-cloudtrail-controller + spec: + replicas: 1 + selector: + matchLabels: + app.kubernetes.io/name: ack-cloudtrail-controller + strategy: {} + template: + metadata: + labels: + app.kubernetes.io/name: ack-cloudtrail-controller + spec: + containers: + - args: + - --aws-region + - $(AWS_REGION) + - --aws-endpoint-url + - $(AWS_ENDPOINT_URL) + - --enable-development-logging=$(ACK_ENABLE_DEVELOPMENT_LOGGING) + - --log-level + - $(ACK_LOG_LEVEL) + - --resource-tags + - $(ACK_RESOURCE_TAGS) + - --watch-namespace + - $(ACK_WATCH_NAMESPACE) + - --enable-leader-election=$(ENABLE_LEADER_ELECTION) + - --leader-election-namespace + - $(LEADER_ELECTION_NAMESPACE) + - --reconcile-default-max-concurrent-syncs + - $(RECONCILE_DEFAULT_MAX_CONCURRENT_SYNCS) + command: + - ./bin/controller + env: + - name: ACK_SYSTEM_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + envFrom: + - configMapRef: + name: ack-cloudtrail-user-config + optional: false + - secretRef: + name: ack-cloudtrail-user-secrets + optional: true + image: public.ecr.aws/aws-controllers-k8s/cloudtrail-controller:1.0.15 + livenessProbe: + httpGet: + path: /healthz + port: 8081 + initialDelaySeconds: 15 + periodSeconds: 20 + name: controller + ports: + - containerPort: 8080 + name: http + readinessProbe: + httpGet: + path: /readyz + port: 8081 + initialDelaySeconds: 5 + periodSeconds: 10 + resources: + limits: + cpu: 100m + memory: 300Mi + requests: + cpu: 100m + memory: 200Mi + securityContext: + allowPrivilegeEscalation: false + capabilities: + drop: + - ALL + privileged: false + runAsNonRoot: true + dnsPolicy: ClusterFirst + securityContext: + seccompProfile: + type: RuntimeDefault + serviceAccountName: ack-cloudtrail-controller + terminationGracePeriodSeconds: 10 + permissions: + - rules: + - apiGroups: + - coordination.k8s.io + resources: + - leases + verbs: + - get + - list + - watch + - create + - update + - patch + - delete + - apiGroups: + - "" + resources: + - events + verbs: + - create + - patch + serviceAccountName: ack-cloudtrail-controller + strategy: deployment + installModes: + - supported: true + type: OwnNamespace + - supported: true + type: SingleNamespace + - supported: true + type: MultiNamespace + - supported: true + type: AllNamespaces + keywords: + - cloudtrail + - aws + - amazon + - ack + links: + - name: AWS Controllers for Kubernetes + url: https://github.com/aws-controllers-k8s/community + - name: Documentation + url: https://aws-controllers-k8s.github.io/community/ + - name: Amazon CloudTrail Developer Resources + url: https://aws.amazon.com/cloudtrail/resources/ + maintainers: + - email: ack-maintainers@amazon.com + name: cloudtrail maintainer team + maturity: alpha + provider: + name: Amazon, Inc. + url: https://aws.amazon.com + version: 1.0.15 diff --git a/operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-metrics-service_v1_service.yaml b/operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-metrics-service_v1_service.yaml new file mode 100644 index 00000000000..61fe08d6663 --- /dev/null +++ b/operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-metrics-service_v1_service.yaml @@ -0,0 +1,16 @@ +apiVersion: v1 +kind: Service +metadata: + creationTimestamp: null + name: ack-cloudtrail-metrics-service +spec: + ports: + - name: metricsport + port: 8080 + protocol: TCP + targetPort: http + selector: + app.kubernetes.io/name: ack-cloudtrail-controller + type: NodePort +status: + loadBalancer: {} diff --git a/operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-reader_rbac.authorization.k8s.io_v1_role.yaml b/operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-reader_rbac.authorization.k8s.io_v1_role.yaml new file mode 100644 index 00000000000..ab6f393e92a --- /dev/null +++ b/operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-reader_rbac.authorization.k8s.io_v1_role.yaml @@ -0,0 +1,15 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + creationTimestamp: null + name: ack-cloudtrail-reader +rules: +- apiGroups: + - cloudtrail.services.k8s.aws + resources: + - eventdatastores + - trails + verbs: + - get + - list + - watch diff --git a/operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-writer_rbac.authorization.k8s.io_v1_role.yaml b/operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-writer_rbac.authorization.k8s.io_v1_role.yaml new file mode 100644 index 00000000000..8030bfe8c8f --- /dev/null +++ b/operators/ack-cloudtrail-controller/1.0.15/manifests/ack-cloudtrail-writer_rbac.authorization.k8s.io_v1_role.yaml @@ -0,0 +1,28 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + creationTimestamp: null + name: ack-cloudtrail-writer +rules: +- apiGroups: + - cloudtrail.services.k8s.aws + resources: + - eventdatastores + - trails + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +- apiGroups: + - cloudtrail.services.k8s.aws + resources: + - eventdatastores + - trails + verbs: + - get + - patch + - update diff --git a/operators/ack-cloudtrail-controller/1.0.15/manifests/cloudtrail.services.k8s.aws_eventdatastores.yaml b/operators/ack-cloudtrail-controller/1.0.15/manifests/cloudtrail.services.k8s.aws_eventdatastores.yaml new file mode 100644 index 00000000000..db9d858814e --- /dev/null +++ b/operators/ack-cloudtrail-controller/1.0.15/manifests/cloudtrail.services.k8s.aws_eventdatastores.yaml @@ -0,0 +1,246 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + controller-gen.kubebuilder.io/version: v0.16.2 + creationTimestamp: null + name: eventdatastores.cloudtrail.services.k8s.aws +spec: + group: cloudtrail.services.k8s.aws + names: + kind: EventDataStore + listKind: EventDataStoreList + plural: eventdatastores + singular: eventdatastore + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: EventDataStore is the Schema for the EventDataStores API + properties: + apiVersion: + description: |- + APIVersion defines the versioned schema of this representation of an object. + Servers should convert recognized schemas to the latest internal value, and + may reject unrecognized values. + More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources + type: string + kind: + description: |- + Kind is a string value representing the REST resource this object represents. + Servers may infer this from the endpoint the client submits requests to. + Cannot be updated. + In CamelCase. + More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds + type: string + metadata: + type: object + spec: + description: |- + EventDataStoreSpec defines the desired state of EventDataStore. + + A storage lake of event data against which you can run complex SQL-based + queries. An event data store can include events that you have logged on your + account from the last 90 to 2555 days (about three months to up to seven + years). To select events for an event data store, use advanced event selectors + (https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#creating-data-event-selectors-advanced). + properties: + advancedEventSelectors: + description: |- + The advanced event selectors to use to select the events for the data store. + For more information about how to use advanced event selectors, see Log events + by using advanced event selectors (https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#creating-data-event-selectors-advanced) + in the CloudTrail User Guide. + items: + description: |- + Advanced event selectors let you create fine-grained selectors for the following + CloudTrail event record fields. They help you control costs by logging only + those events that are important to you. For more information about advanced + event selectors, see Logging data events for trails (https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html) + in the CloudTrail User Guide. + + * readOnly + + * eventSource + + * eventName + + * eventCategory + + * resources.type + + * resources.ARN + + You cannot apply both event selectors and advanced event selectors to a trail. + properties: + fieldSelectors: + items: + description: A single selector statement in an advanced event + selector. + properties: + endsWith: + items: + type: string + type: array + equals: + items: + type: string + type: array + field: + type: string + notEndsWith: + items: + type: string + type: array + notEquals: + items: + type: string + type: array + notStartsWith: + items: + type: string + type: array + startsWith: + items: + type: string + type: array + type: object + type: array + name: + type: string + type: object + type: array + multiRegionEnabled: + description: |- + Specifies whether the event data store includes events from all regions, + or only from the region in which the event data store is created. + type: boolean + name: + description: The name of the event data store. + type: string + organizationEnabled: + description: |- + Specifies whether an event data store collects events logged for an organization + in Organizations. + type: boolean + retentionPeriod: + description: |- + The retention period of the event data store, in days. You can set a retention + period of up to 2555 days, the equivalent of seven years. + format: int64 + type: integer + tags: + items: + description: A custom key-value pair associated with a resource + such as a CloudTrail trail. + properties: + key: + type: string + value: + type: string + type: object + type: array + terminationProtectionEnabled: + description: |- + Specifies whether termination protection is enabled for the event data store. + If termination protection is enabled, you cannot delete the event data store + until termination protection is disabled. + type: boolean + required: + - name + type: object + status: + description: EventDataStoreStatus defines the observed state of EventDataStore + properties: + ackResourceMetadata: + description: |- + All CRs managed by ACK have a common `Status.ACKResourceMetadata` member + that is used to contain resource sync state, account ownership, + constructed ARN for the resource + properties: + arn: + description: |- + ARN is the Amazon Resource Name for the resource. This is a + globally-unique identifier and is set only by the ACK service controller + once the controller has orchestrated the creation of the resource OR + when it has verified that an "adopted" resource (a resource where the + ARN annotation was set by the Kubernetes user on the CR) exists and + matches the supplied CR's Spec field values. + https://github.com/aws/aws-controllers-k8s/issues/270 + type: string + ownerAccountID: + description: |- + OwnerAccountID is the AWS Account ID of the account that owns the + backend AWS service API resource. + type: string + region: + description: Region is the AWS region in which the resource exists + or will exist. + type: string + required: + - ownerAccountID + - region + type: object + conditions: + description: |- + All CRS managed by ACK have a common `Status.Conditions` member that + contains a collection of `ackv1alpha1.Condition` objects that describe + the various terminal states of the CR and its backend AWS service API + resource + items: + description: |- + Condition is the common struct used by all CRDs managed by ACK service + controllers to indicate terminal states of the CR and its backend AWS + service API resource + properties: + lastTransitionTime: + description: Last time the condition transitioned from one status + to another. + format: date-time + type: string + message: + description: A human readable message indicating details about + the transition. + type: string + reason: + description: The reason for the condition's last transition. + type: string + status: + description: Status of the condition, one of True, False, Unknown. + type: string + type: + description: Type is the type of the Condition + type: string + required: + - status + - type + type: object + type: array + createdTimestamp: + description: The timestamp that shows when the event data store was + created. + format: date-time + type: string + status: + description: The status of event data store creation. + type: string + updatedTimestamp: + description: |- + The timestamp that shows when an event data store was updated, if applicable. + UpdatedTimestamp is always either the same or newer than the time shown in + CreatedTimestamp. + format: date-time + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} +status: + acceptedNames: + kind: "" + plural: "" + conditions: null + storedVersions: null diff --git a/operators/ack-cloudtrail-controller/1.0.15/manifests/cloudtrail.services.k8s.aws_trails.yaml b/operators/ack-cloudtrail-controller/1.0.15/manifests/cloudtrail.services.k8s.aws_trails.yaml new file mode 100644 index 00000000000..d2e455fd13c --- /dev/null +++ b/operators/ack-cloudtrail-controller/1.0.15/manifests/cloudtrail.services.k8s.aws_trails.yaml @@ -0,0 +1,246 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + annotations: + controller-gen.kubebuilder.io/version: v0.16.2 + creationTimestamp: null + name: trails.cloudtrail.services.k8s.aws +spec: + group: cloudtrail.services.k8s.aws + names: + kind: Trail + listKind: TrailList + plural: trails + singular: trail + scope: Namespaced + versions: + - name: v1alpha1 + schema: + openAPIV3Schema: + description: Trail is the Schema for the Trails API + properties: + apiVersion: + description: |- + APIVersion defines the versioned schema of this representation of an object. + Servers should convert recognized schemas to the latest internal value, and + may reject unrecognized values. + More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources + type: string + kind: + description: |- + Kind is a string value representing the REST resource this object represents. + Servers may infer this from the endpoint the client submits requests to. + Cannot be updated. + In CamelCase. + More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds + type: string + metadata: + type: object + spec: + description: |- + TrailSpec defines the desired state of Trail. + + The settings for a trail. + properties: + cloudWatchLogsLogGroupARN: + description: |- + Specifies a log group name using an Amazon Resource Name (ARN), a unique + identifier that represents the log group to which CloudTrail logs will be + delivered. Not required unless you specify CloudWatchLogsRoleArn. + type: string + cloudWatchLogsRoleARN: + description: |- + Specifies the role for the CloudWatch Logs endpoint to assume to write to + a user's log group. + type: string + enableLogFileValidation: + description: |- + Specifies whether log file integrity validation is enabled. The default is + false. + + When you disable log file integrity validation, the chain of digest files + is broken after one hour. CloudTrail does not create digest files for log + files that were delivered during a period in which log file integrity validation + was disabled. For example, if you enable log file integrity validation at + noon on January 1, disable it at noon on January 2, and re-enable it at noon + on January 10, digest files will not be created for the log files delivered + from noon on January 2 to noon on January 10. The same applies whenever you + stop CloudTrail logging or delete a trail. + type: boolean + includeGlobalServiceEvents: + description: |- + Specifies whether the trail is publishing events from global services such + as IAM to the log files. + type: boolean + isMultiRegionTrail: + description: |- + Specifies whether the trail is created in the current region or in all regions. + The default is false, which creates a trail only in the region where you + are signed in. As a best practice, consider creating trails that log events + in all regions. + type: boolean + isOrganizationTrail: + description: |- + Specifies whether the trail is created for all accounts in an organization + in Organizations, or only for the current Amazon Web Services account. The + default is false, and cannot be true unless the call is made on behalf of + an Amazon Web Services account that is the management account for an organization + in Organizations. + type: boolean + kmsKeyID: + description: |- + Specifies the KMS key ID to use to encrypt the logs delivered by CloudTrail. + The value can be an alias name prefixed by "alias/", a fully specified ARN + to an alias, a fully specified ARN to a key, or a globally unique identifier. + + CloudTrail also supports KMS multi-Region keys. For more information about + multi-Region keys, see Using multi-Region keys (https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html) + in the Key Management Service Developer Guide. + + Examples: + + * alias/MyAliasName + + * arn:aws:kms:us-east-2:123456789012:alias/MyAliasName + + * arn:aws:kms:us-east-2:123456789012:key/12345678-1234-1234-1234-123456789012 + + * 12345678-1234-1234-1234-123456789012 + type: string + name: + description: |- + Specifies the name of the trail. The name must meet the following requirements: + + * Contain only ASCII letters (a-z, A-Z), numbers (0-9), periods (.), underscores + (_), or dashes (-) + + * Start with a letter or number, and end with a letter or number + + * Be between 3 and 128 characters + + * Have no adjacent periods, underscores or dashes. Names like my-_namespace + and my--namespace are not valid. + + * Not be in IP address format (for example, 192.168.5.4) + type: string + s3BucketName: + description: |- + Specifies the name of the Amazon S3 bucket designated for publishing log + files. See Amazon S3 Bucket Naming Requirements (https://docs.aws.amazon.com/awscloudtrail/latest/userguide/create_trail_naming_policy.html). + type: string + s3KeyPrefix: + description: |- + Specifies the Amazon S3 key prefix that comes after the name of the bucket + you have designated for log file delivery. For more information, see Finding + Your CloudTrail Log Files (https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-find-log-files.html). + The maximum length is 200 characters. + type: string + snsTopicName: + description: |- + Specifies the name of the Amazon SNS topic defined for notification of log + file delivery. The maximum length is 256 characters. + type: string + tags: + items: + description: A custom key-value pair associated with a resource + such as a CloudTrail trail. + properties: + key: + type: string + value: + type: string + type: object + type: array + required: + - name + - s3BucketName + type: object + status: + description: TrailStatus defines the observed state of Trail + properties: + ackResourceMetadata: + description: |- + All CRs managed by ACK have a common `Status.ACKResourceMetadata` member + that is used to contain resource sync state, account ownership, + constructed ARN for the resource + properties: + arn: + description: |- + ARN is the Amazon Resource Name for the resource. This is a + globally-unique identifier and is set only by the ACK service controller + once the controller has orchestrated the creation of the resource OR + when it has verified that an "adopted" resource (a resource where the + ARN annotation was set by the Kubernetes user on the CR) exists and + matches the supplied CR's Spec field values. + https://github.com/aws/aws-controllers-k8s/issues/270 + type: string + ownerAccountID: + description: |- + OwnerAccountID is the AWS Account ID of the account that owns the + backend AWS service API resource. + type: string + region: + description: Region is the AWS region in which the resource exists + or will exist. + type: string + required: + - ownerAccountID + - region + type: object + conditions: + description: |- + All CRS managed by ACK have a common `Status.Conditions` member that + contains a collection of `ackv1alpha1.Condition` objects that describe + the various terminal states of the CR and its backend AWS service API + resource + items: + description: |- + Condition is the common struct used by all CRDs managed by ACK service + controllers to indicate terminal states of the CR and its backend AWS + service API resource + properties: + lastTransitionTime: + description: Last time the condition transitioned from one status + to another. + format: date-time + type: string + message: + description: A human readable message indicating details about + the transition. + type: string + reason: + description: The reason for the condition's last transition. + type: string + status: + description: Status of the condition, one of True, False, Unknown. + type: string + type: + description: Type is the type of the Condition + type: string + required: + - status + - type + type: object + type: array + logFileValidationEnabled: + description: Specifies whether log file integrity validation is enabled. + type: boolean + snsTopicARN: + description: |- + Specifies the ARN of the Amazon SNS topic that CloudTrail uses to send notifications + when log files are delivered. The format of a topic ARN is: + + arn:aws:sns:us-east-2:123456789012:MyTopic + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} +status: + acceptedNames: + kind: "" + plural: "" + conditions: null + storedVersions: null diff --git a/operators/ack-cloudtrail-controller/1.0.15/metadata/annotations.yaml b/operators/ack-cloudtrail-controller/1.0.15/metadata/annotations.yaml new file mode 100644 index 00000000000..0e06f9558a1 --- /dev/null +++ b/operators/ack-cloudtrail-controller/1.0.15/metadata/annotations.yaml @@ -0,0 +1,15 @@ +annotations: + # Core bundle annotations. + operators.operatorframework.io.bundle.mediatype.v1: registry+v1 + operators.operatorframework.io.bundle.manifests.v1: manifests/ + operators.operatorframework.io.bundle.metadata.v1: metadata/ + operators.operatorframework.io.bundle.package.v1: ack-cloudtrail-controller + operators.operatorframework.io.bundle.channels.v1: alpha + operators.operatorframework.io.bundle.channel.default.v1: alpha + operators.operatorframework.io.metrics.builder: operator-sdk-v1.28.0 + operators.operatorframework.io.metrics.mediatype.v1: metrics+v1 + operators.operatorframework.io.metrics.project_layout: unknown + + # Annotations for testing. + operators.operatorframework.io.test.mediatype.v1: scorecard+v1 + operators.operatorframework.io.test.config.v1: tests/scorecard/ diff --git a/operators/ack-cloudtrail-controller/1.0.15/tests/scorecard/config.yaml b/operators/ack-cloudtrail-controller/1.0.15/tests/scorecard/config.yaml new file mode 100644 index 00000000000..382ddefd156 --- /dev/null +++ b/operators/ack-cloudtrail-controller/1.0.15/tests/scorecard/config.yaml @@ -0,0 +1,50 @@ +apiVersion: scorecard.operatorframework.io/v1alpha3 +kind: Configuration +metadata: + name: config +stages: +- parallel: true + tests: + - entrypoint: + - scorecard-test + - basic-check-spec + image: quay.io/operator-framework/scorecard-test:v1.7.1 + labels: + suite: basic + test: basic-check-spec-test + storage: + spec: + mountPath: {} + - entrypoint: + - scorecard-test + - olm-bundle-validation + image: quay.io/operator-framework/scorecard-test:v1.7.1 + labels: + suite: olm + test: olm-bundle-validation-test + storage: + spec: + mountPath: {} + - entrypoint: + - scorecard-test + - olm-crds-have-validation + image: quay.io/operator-framework/scorecard-test:v1.7.1 + labels: + suite: olm + test: olm-crds-have-validation-test + storage: + spec: + mountPath: {} + - entrypoint: + - scorecard-test + - olm-spec-descriptors + image: quay.io/operator-framework/scorecard-test:v1.7.1 + labels: + suite: olm + test: olm-spec-descriptors-test + storage: + spec: + mountPath: {} +storage: + spec: + mountPath: {}