diff --git a/pkg/policy/validate.go b/pkg/policy/validate.go index cb7af29a62..cdd5b1d1da 100644 --- a/pkg/policy/validate.go +++ b/pkg/policy/validate.go @@ -32,7 +32,9 @@ func Validate(p kyverno.ClusterPolicy) error { // policy.spec.background -> "true" // - cannot use variables with request.userInfo // - cannot define userInfo(roles, cluserRoles, subjects) for filtering (match & exclude) - return fmt.Errorf("userInfo not allowed in background policy mode. Failure path %s", err) + return fmt.Errorf("failed at %v. User info related conditions are not allowed in background mode. "+ + "If you would like to use user info related conditions kindly disable background mode for this policy by "+ + "setting spec/background to false", err) } } diff --git a/pkg/webhooks/common.go b/pkg/webhooks/common.go index f19cfd699e..a6a2682476 100644 --- a/pkg/webhooks/common.go +++ b/pkg/webhooks/common.go @@ -114,7 +114,7 @@ func processResourceWithPatches(patch []byte, resource []byte) []byte { func containRBACinfo(policies []kyverno.ClusterPolicy) bool { for _, policy := range policies { for _, rule := range policy.Spec.Rules { - if len(rule.MatchResources.Roles) > 0 || len(rule.MatchResources.ClusterRoles) > 0 { + if len(rule.MatchResources.Roles) > 0 || len(rule.MatchResources.ClusterRoles) > 0 || len(rule.ExcludeResources.Roles) > 0 || len(rule.ExcludeResources.ClusterRoles) > 0 { return true } }