From 75313b74625a95fcfdea2a840399d75905fca6d7 Mon Sep 17 00:00:00 2001 From: Shuting Zhao Date: Wed, 9 Dec 2020 14:41:20 -0800 Subject: [PATCH] update message --- pkg/engine/mutation.go | 2 +- pkg/engine/validation.go | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/pkg/engine/mutation.go b/pkg/engine/mutation.go index a87b0f0f4c..f60bbbbb9e 100644 --- a/pkg/engine/mutation.go +++ b/pkg/engine/mutation.go @@ -39,7 +39,7 @@ func Mutate(policyContext PolicyContext) (resp response.EngineResponse) { defer endMutateResultResponse(logger, &resp, startTime) if SkipPolicyApplication(policy, patchedResource) { - logger.V(5).Info("Skip applying policy, Pod has ownerRef set", "policy", policy.GetName()) + logger.V(5).Info("skip applying policy as direct changes to pods managed by workload controllers are not allowed", "policy", policy.GetName()) resp.PatchedResource = patchedResource return } diff --git a/pkg/engine/validation.go b/pkg/engine/validation.go index 572956bd9d..545a69ab81 100644 --- a/pkg/engine/validation.go +++ b/pkg/engine/validation.go @@ -109,7 +109,7 @@ func incrementAppliedCount(resp *response.EngineResponse) { func isRequestDenied(log logr.Logger, ctx context.EvalInterface, policy kyverno.ClusterPolicy, resource unstructured.Unstructured, admissionInfo kyverno.RequestInfo, excludeGroupRole []string, resCache resourcecache.ResourceCacheIface, jsonContext *context.Context) *response.EngineResponse { resp := &response.EngineResponse{} if SkipPolicyApplication(policy, resource) { - log.V(5).Info("Skip applying policy, Pod has ownerRef set", "policy", policy.GetName()) + log.V(5).Info("skip applying policy as direct changes to pods managed by workload controllers are not allowed", "policy", policy.GetName()) return resp } excludeResource := []string{} @@ -161,7 +161,7 @@ func validateResource(log logr.Logger, ctx context.EvalInterface, policy kyverno resp := &response.EngineResponse{} if SkipPolicyApplication(policy, resource) { - log.V(5).Info("Skip applying policy, Pod has ownerRef set", "policy", policy.GetName()) + log.V(5).Info("skip applying policy as direct changes to pods managed by workload controllers are not allowed", "policy", policy.GetName()) return resp }