diff --git a/pkg/policy/validate.go b/pkg/policy/validate.go index be43b2c3f1..73c0235d8f 100644 --- a/pkg/policy/validate.go +++ b/pkg/policy/validate.go @@ -165,20 +165,6 @@ func Validate(policy kyvernov1.PolicyInterface, client dclient.Interface, mock b return nil, fmt.Errorf("path: spec.rules[%d]: %v", i, err) } - // validate Cluster Resources in namespaced policy - // For namespaced policy, ClusterResource type field and values are not allowed in match and exclude - if namespaced { - return nil, checkClusterResourceInMatchAndExclude(rule, clusterResources, mock, res) - } - - // validate rule actions - // - Mutate - // - Validate - // - Generate - if err := validateActions(i, &rules[i], client, mock); err != nil { - return nil, err - } - // If a rule's match block does not match any kind, // we should only allow it to have metadata in its overlay if len(rule.MatchResources.Any) > 0 { @@ -199,6 +185,20 @@ func Validate(policy kyvernov1.PolicyInterface, client dclient.Interface, mock b } } + // validate Cluster Resources in namespaced policy + // For namespaced policy, ClusterResource type field and values are not allowed in match and exclude + if namespaced { + return nil, checkClusterResourceInMatchAndExclude(rule, clusterResources, mock, res) + } + + // validate rule actions + // - Mutate + // - Validate + // - Generate + if err := validateActions(i, &rules[i], client, mock); err != nil { + return nil, err + } + if utils.ContainsString(rule.MatchResources.Kinds, "*") && spec.BackgroundProcessingEnabled() { return nil, fmt.Errorf("wildcard policy not allowed in background mode. Set spec.background=false to disable background mode for this policy rule ") }