1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-31 03:45:17 +00:00

Added more exit codes and update Readme

This commit is contained in:
NoSkillGirl 2020-06-08 17:01:56 +05:30
parent 2d74937bd6
commit e267757d30
2 changed files with 33 additions and 10 deletions

View file

@ -1,5 +1,4 @@
<small>*[documentation](/README.md#documentation) / kyverno-cli*</small>
<small>_[documentation](/README.md#documentation) / kyverno-cli_</small>
# Kyverno CLI
@ -40,39 +39,58 @@ yay -S kyverno-git
Prints the version of kyverno used by the CLI.
Example:
Example:
```
kyverno version
```
#### Validate
Validates a policy, can validate multiple policy resource description files or even an entire folder containing policy resource description
Validates a policy, can validate multiple policy resource description files or even an entire folder containing policy resource description
files. Currently supports files with resource description in yaml.
Example:
```
kyverno validate /path/to/policy1.yaml /path/to/policy2.yaml /path/to/folderFullOfPolicies
```
#### Apply
Applies policies on resources, and supports applying multiple policies on multiple resources in a single command.
Also supports applying the given policies to an entire cluster. The current kubectl context will be used to access the cluster.
Will return results to stdout.
Will return results to stdout.
Apply to a resource:
```
```bash
kyverno apply /path/to/policy.yaml --resource /path/to/resource.yaml
```
Apply to all matching resources in a cluster:
```
```bash
kyverno apply /path/to/policy.yaml --cluster > policy-results.txt
```
Apply multiple policies to multiple resources:
```
```bash
kyverno apply /path/to/policy1.yaml /path/to/folderFullOfPolicies --resource /path/to/resource1.yaml --resource /path/to/resource2.yaml --cluster
```
##### Exit Codes
<small>*Read Next >> [Sample Policies](/samples/README.md)*</small>
When CLI executes successfully, it returns exit code 0.
The CLI exits with diffenent exit codes depending on the type of error:
| Message | Exit Code |
| ---------------------------------------------- | --------- |
| Failed to validate atleast one of the Policies | 3 |
| Failed to apply Mutation | 4 |
| Failed to validate Resource | 5 |
| Failed to generate Resource | 6 |
<small>_Read Next >> [Sample Policies](/samples/README.md)_</small>

View file

@ -5,6 +5,7 @@ import (
"errors"
"fmt"
"io/ioutil"
"os"
"regexp"
"time"
@ -68,7 +69,8 @@ func Command() *cobra.Command {
for _, policy := range policies {
err := policy2.Validate(utils.MarshalPolicy(*policy), nil, true, openAPIController)
if err != nil {
return sanitizedError.New(fmt.Sprintf("Policy %v is not valid", policy.Name))
fmt.Printf("Policy %v is not valid\n", policy.Name)
os.Exit(3)
}
if policyHasVariables(*policy) {
return sanitizedError.New(fmt.Sprintf("Policy %v is not valid - 'apply' does not support policies with variables", policy.Name))
@ -252,6 +254,7 @@ func applyPolicyOnResource(policy *v1.ClusterPolicy, resource *unstructured.Unst
fmt.Printf("\n%d. %s", i+1, r.Message)
}
fmt.Printf("\n\n")
os.Exit(4)
} else {
if len(mutateResponse.PolicyResponse.Rules) > 0 {
fmt.Printf("\n\nMutation:")
@ -274,6 +277,7 @@ func applyPolicyOnResource(policy *v1.ClusterPolicy, resource *unstructured.Unst
fmt.Printf("\n%d. %s", i+1, r.Message)
}
fmt.Printf("\n\n")
os.Exit(5)
} else {
if len(validateResponse.PolicyResponse.Rules) > 0 {
fmt.Printf("\n\nValidation:")
@ -302,6 +306,7 @@ func applyPolicyOnResource(policy *v1.ClusterPolicy, resource *unstructured.Unst
fmt.Printf("\n%d. %s", i+1, r.Message)
}
fmt.Printf("\n\n")
os.Exit(6)
}
}