mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-31 03:45:17 +00:00
add report in cli
This commit is contained in:
parent
513f5ec898
commit
91c45b408b
4 changed files with 23 additions and 23 deletions
|
@ -104,7 +104,6 @@ func main() {
|
|||
setupLog.Error(err, "Failed to create client")
|
||||
os.Exit(1)
|
||||
}
|
||||
|
||||
// CRD CHECK
|
||||
// - verify if the CRD for Policy & PolicyViolation are available
|
||||
if !utils.CRDInstalled(client.DiscoveryClient, log.Log) {
|
||||
|
|
|
@ -42,13 +42,12 @@ import (
|
|||
log "sigs.k8s.io/controller-runtime/pkg/log"
|
||||
)
|
||||
|
||||
|
||||
type resultCounts struct {
|
||||
pass int
|
||||
fail int
|
||||
warn int
|
||||
pass int
|
||||
fail int
|
||||
warn int
|
||||
error int
|
||||
skip int
|
||||
skip int
|
||||
}
|
||||
|
||||
func Command() *cobra.Command {
|
||||
|
|
|
@ -2,6 +2,7 @@ package kyverno
|
|||
|
||||
import (
|
||||
"flag"
|
||||
"github.com/nirmata/kyverno/pkg/kyverno/report"
|
||||
"os"
|
||||
|
||||
"github.com/nirmata/kyverno/pkg/kyverno/validate"
|
||||
|
@ -27,6 +28,7 @@ func CLI() {
|
|||
commands := []*cobra.Command{
|
||||
version.Command(),
|
||||
apply.Command(),
|
||||
report.Command(),
|
||||
validate.Command(),
|
||||
}
|
||||
|
||||
|
|
|
@ -28,7 +28,7 @@ func Validate(policyRaw []byte, client *dclient.Client, mock bool, openAPIContro
|
|||
return fmt.Errorf("failed to unmarshal policy admission request err %v", err)
|
||||
}
|
||||
|
||||
if common.PolicyHasVariables(p) && common.PolicyHasNonAllowedVariables(p){
|
||||
if common.PolicyHasVariables(p) && common.PolicyHasNonAllowedVariables(p) {
|
||||
return fmt.Errorf("policy contains non allowed variables")
|
||||
}
|
||||
|
||||
|
@ -55,27 +55,27 @@ func Validate(policyRaw []byte, client *dclient.Client, mock bool, openAPIContro
|
|||
// validate Cluster Resources in namespaced cluster policy
|
||||
// For namespaced cluster policy, ClusterResource type field and values are not allowed in match and exclude
|
||||
if !mock && p.ObjectMeta.Namespace != "" {
|
||||
var Empty struct{}
|
||||
clusterResourcesMap := make(map[string]*struct{})
|
||||
// Get all the cluster type kind supported by cluster
|
||||
res, _ := client.GetDiscoveryCache().ServerPreferredResources()
|
||||
for _, resList := range res {
|
||||
for _, r := range resList.APIResources {
|
||||
if r.Namespaced == false {
|
||||
if clusterResourcesMap[r.Kind] != nil {
|
||||
clusterResourcesMap[r.Kind] = &Empty
|
||||
}
|
||||
var Empty struct{}
|
||||
clusterResourcesMap := make(map[string]*struct{})
|
||||
// Get all the cluster type kind supported by cluster
|
||||
res, _ := client.GetDiscoveryCache().ServerPreferredResources()
|
||||
for _, resList := range res {
|
||||
for _, r := range resList.APIResources {
|
||||
if r.Namespaced == false {
|
||||
if clusterResourcesMap[r.Kind] != nil {
|
||||
clusterResourcesMap[r.Kind] = &Empty
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
clusterResources := make([]string, 0, len(clusterResourcesMap))
|
||||
for k := range clusterResourcesMap {
|
||||
clusterResources = append(clusterResources, k)
|
||||
}
|
||||
return checkClusterResourceInMatchAndExclude(rule, clusterResources)
|
||||
}
|
||||
|
||||
clusterResources := make([]string, 0, len(clusterResourcesMap))
|
||||
for k := range clusterResourcesMap {
|
||||
clusterResources = append(clusterResources, k)
|
||||
}
|
||||
return checkClusterResourceInMatchAndExclude(rule, clusterResources)
|
||||
}
|
||||
|
||||
if doesMatchAndExcludeConflict(rule) {
|
||||
return fmt.Errorf("path: spec.rules[%v]: rule is matching an empty set", rule.Name)
|
||||
}
|
||||
|
|
Loading…
Add table
Reference in a new issue