1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-31 03:45:17 +00:00

change flag field

This commit is contained in:
shivkumar dudhani 2019-07-23 18:29:44 -04:00
parent 2ea5a5e39d
commit b839d4f134
3 changed files with 6 additions and 6 deletions

View file

@ -26,8 +26,8 @@ spec:
validationFailureAction:
type: string
enum:
- block
- report
- enforce # blocks the resorce api-reques if a rule fails. Default behavior
- audit # allows resource creationg and reports the failed validation rules as violations
rules:
type: array
items:

View file

@ -92,8 +92,8 @@ func getApplicableKindsForPolicy(p *v1alpha1.Policy) []string {
// Policy Reporting Modes
const (
BlockChanges = "block"
ReportViolation = "report"
BlockChanges = "enforce"
ReportViolation = "audit"
)
// returns true -> if there is even one policy that blocks resource requst

View file

@ -101,7 +101,7 @@ func (ws *WebhookServer) HandleValidation(request *v1beta1.AdmissionRequest) *v1
if len(policyInfos) > 0 && len(policyInfos[0].Rules) != 0 {
eventsInfo, violations := newEventInfoFromPolicyInfo(policyInfos, (request.Operation == v1beta1.Update), info.Validation)
// If the validationFailureAction flag is set "report",
// If the validationFailureAction flag is set "audit",
// then we dont block the request and report the violations
ws.violationBuilder.Add(violations...)
ws.eventController.Add(eventsInfo...)
@ -112,7 +112,7 @@ func (ws *WebhookServer) HandleValidation(request *v1beta1.AdmissionRequest) *v1
}
// If Validation fails then reject the request
ok, msg := isAdmSuccesful(policyInfos)
// violations are created if "report" flag is set
// violations are created if "audit" flag is set
// and if there are any then we dont bock the resource creation
// Even if one the policy being applied