1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-31 03:45:17 +00:00

add report in cli

This commit is contained in:
Yuvraj 2020-08-25 22:44:29 +05:30
parent 513f5ec898
commit 91c45b408b
4 changed files with 23 additions and 23 deletions

View file

@ -104,7 +104,6 @@ func main() {
setupLog.Error(err, "Failed to create client")
os.Exit(1)
}
// CRD CHECK
// - verify if the CRD for Policy & PolicyViolation are available
if !utils.CRDInstalled(client.DiscoveryClient, log.Log) {

View file

@ -42,13 +42,12 @@ import (
log "sigs.k8s.io/controller-runtime/pkg/log"
)
type resultCounts struct {
pass int
fail int
warn int
pass int
fail int
warn int
error int
skip int
skip int
}
func Command() *cobra.Command {

View file

@ -2,6 +2,7 @@ package kyverno
import (
"flag"
"github.com/nirmata/kyverno/pkg/kyverno/report"
"os"
"github.com/nirmata/kyverno/pkg/kyverno/validate"
@ -27,6 +28,7 @@ func CLI() {
commands := []*cobra.Command{
version.Command(),
apply.Command(),
report.Command(),
validate.Command(),
}

View file

@ -28,7 +28,7 @@ func Validate(policyRaw []byte, client *dclient.Client, mock bool, openAPIContro
return fmt.Errorf("failed to unmarshal policy admission request err %v", err)
}
if common.PolicyHasVariables(p) && common.PolicyHasNonAllowedVariables(p){
if common.PolicyHasVariables(p) && common.PolicyHasNonAllowedVariables(p) {
return fmt.Errorf("policy contains non allowed variables")
}
@ -55,27 +55,27 @@ func Validate(policyRaw []byte, client *dclient.Client, mock bool, openAPIContro
// validate Cluster Resources in namespaced cluster policy
// For namespaced cluster policy, ClusterResource type field and values are not allowed in match and exclude
if !mock && p.ObjectMeta.Namespace != "" {
var Empty struct{}
clusterResourcesMap := make(map[string]*struct{})
// Get all the cluster type kind supported by cluster
res, _ := client.GetDiscoveryCache().ServerPreferredResources()
for _, resList := range res {
for _, r := range resList.APIResources {
if r.Namespaced == false {
if clusterResourcesMap[r.Kind] != nil {
clusterResourcesMap[r.Kind] = &Empty
}
var Empty struct{}
clusterResourcesMap := make(map[string]*struct{})
// Get all the cluster type kind supported by cluster
res, _ := client.GetDiscoveryCache().ServerPreferredResources()
for _, resList := range res {
for _, r := range resList.APIResources {
if r.Namespaced == false {
if clusterResourcesMap[r.Kind] != nil {
clusterResourcesMap[r.Kind] = &Empty
}
}
}
clusterResources := make([]string, 0, len(clusterResourcesMap))
for k := range clusterResourcesMap {
clusterResources = append(clusterResources, k)
}
return checkClusterResourceInMatchAndExclude(rule, clusterResources)
}
clusterResources := make([]string, 0, len(clusterResourcesMap))
for k := range clusterResourcesMap {
clusterResources = append(clusterResources, k)
}
return checkClusterResourceInMatchAndExclude(rule, clusterResources)
}
if doesMatchAndExcludeConflict(rule) {
return fmt.Errorf("path: spec.rules[%v]: rule is matching an empty set", rule.Name)
}