mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-30 19:35:06 +00:00
correct misspelled words
This commit is contained in:
parent
c52f07b615
commit
e985ee4031
22 changed files with 27 additions and 26 deletions
1
go.sum
1
go.sum
|
@ -108,6 +108,7 @@ github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e/go.mod h1:nSuG5e5P
|
|||
github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1/go.mod h1:Q3SI9o4m/ZMnBNeIyt5eFwwo7qiLfzFZmjNmxjkiQlU=
|
||||
github.com/circonus-labs/circonus-gometrics v2.3.1+incompatible/go.mod h1:nmEj6Dob7S7YxXgwXpfOuvO54S+tGdZdw9fuRZt25Ag=
|
||||
github.com/circonus-labs/circonusllhist v0.1.3/go.mod h1:kMXHVDlOchFAehlya5ePtbp5jckzBHf4XRpQvBOLI+I=
|
||||
github.com/client9/misspell v0.3.4 h1:ta993UF76GwbvJcIo3Y68y/M3WxlpEHPWIGDkJYwzJI=
|
||||
github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=
|
||||
github.com/cockroachdb/datadriven v0.0.0-20190809214429-80d97fb3cbaa/go.mod h1:zn76sxSg3SzpJ0PPJaLDCu+Bu0Lg3sKTORVIj19EIF8=
|
||||
github.com/containerd/fifo v0.0.0-20200410184934-f15a3290365b/go.mod h1:jPQ2IAeZRCYxpS/Cm1495vGFww6ecHmMk1YJH2Q5ln0=
|
||||
|
|
|
@ -94,7 +94,7 @@ func ProcessStrategicMergePatch(ruleName string, overlay interface{}, resource u
|
|||
|
||||
resp.Success = true
|
||||
resp.Patches = jsonPatches
|
||||
resp.Message = fmt.Sprintf("successfully processed stragetic merge patch")
|
||||
resp.Message = fmt.Sprintf("successfully processed strategic merge patch")
|
||||
return resp, patchedResource
|
||||
}
|
||||
|
||||
|
|
|
@ -96,7 +96,7 @@ func checkSelector(labelSelector *metav1.LabelSelector, resourceLabels map[strin
|
|||
// To filter out the targeted resources with ResourceDescription, the check
|
||||
// should be: AND across attibutes but an OR inside attributes that of type list
|
||||
// To filter out the targeted resources with UserInfo, the check
|
||||
// should be: OR (accross & inside) attributes
|
||||
// should be: OR (across & inside) attributes
|
||||
func doesResourceMatchConditionBlock(conditionBlock kyverno.ResourceDescription, userInfo kyverno.UserInfo, admissionInfo kyverno.RequestInfo, resource unstructured.Unstructured, dynamicConfig []string) []error {
|
||||
var errs []error
|
||||
if len(conditionBlock.Kinds) > 0 {
|
||||
|
|
|
@ -77,7 +77,7 @@ func TestMatchesResourceDescription(t *testing.T) {
|
|||
}
|
||||
} else {
|
||||
if tc.areErrorsExpected {
|
||||
t.Errorf("Testcase %d Expected Error but recieved no error", i+1)
|
||||
t.Errorf("Testcase %d Expected Error but received no error", i+1)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -477,6 +477,6 @@ func TestResourceDescriptionExclude_Label_Expression_Match(t *testing.T) {
|
|||
ExcludeResources: kyverno.ExcludeResources{ResourceDescription: resourceDescriptionExclude}}
|
||||
|
||||
if err := MatchesResourceDescription(*resource, rule, kyverno.RequestInfo{}, []string{}); err == nil {
|
||||
t.Errorf("Testcase has failed due to the following:\n Function has returned no error, even though it was suposed to fail")
|
||||
t.Errorf("Testcase has failed due to the following:\n Function has returned no error, even though it was supposed to fail")
|
||||
}
|
||||
}
|
||||
|
|
|
@ -49,7 +49,7 @@ func ValidateValueWithPattern(log logr.Logger, value, pattern interface{}) bool
|
|||
log.Info("arrays as patterns is not supported")
|
||||
return false
|
||||
default:
|
||||
log.Info("Unkown type", "type", fmt.Sprintf("%T", typedPattern), "value", typedPattern)
|
||||
log.Info("Unknown type", "type", fmt.Sprintf("%T", typedPattern), "value", typedPattern)
|
||||
return false
|
||||
}
|
||||
}
|
||||
|
|
|
@ -53,7 +53,7 @@ func Validate(policyContext PolicyContext) (resp response.EngineResponse) {
|
|||
for i := range resp.PolicyResponse.Rules {
|
||||
messageInterface, err := variables.SubstituteVars(logger, ctx, resp.PolicyResponse.Rules[i].Message)
|
||||
if err != nil {
|
||||
logger.V(4).Info("failed to substitue JMES value", "error", err.Error())
|
||||
logger.V(4).Info("failed to substitute JMES value", "error", err.Error())
|
||||
continue
|
||||
}
|
||||
resp.PolicyResponse.Rules[i].Message, _ = messageInterface.(string)
|
||||
|
|
|
@ -309,7 +309,7 @@ func applyPolicyOnResource(policy *v1.ClusterPolicy, resource *unstructured.Unst
|
|||
if err != nil {
|
||||
return sanitizedError.NewWithError("failed to print mutated result", err)
|
||||
}
|
||||
fmt.Printf("\n\nMutation:\nMutation has been applied succesfully. Check the files.")
|
||||
fmt.Printf("\n\nMutation:\nMutation has been applied successfully. Check the files.")
|
||||
}
|
||||
|
||||
}
|
||||
|
@ -408,7 +408,7 @@ func createFileOrFolder(mutateLogPath string, mutateLogPathIsDir bool) error {
|
|||
if err != nil {
|
||||
if os.IsNotExist(err) {
|
||||
if !mutateLogPathIsDir {
|
||||
// check the folder existance, then create the file
|
||||
// check the folder existence, then create the file
|
||||
var folderPath string
|
||||
s := strings.Split(mutateLogPath, "/")
|
||||
|
||||
|
|
|
@ -45,7 +45,7 @@ func (l Listener) Send(s statusUpdater) {
|
|||
|
||||
// Sync is the object which is used to initialize
|
||||
//the policyStatus sync, can be considered the parent object
|
||||
//since it contains access to all the persistant data present
|
||||
//since it contains access to all the persistent data present
|
||||
//in this package.
|
||||
type Sync struct {
|
||||
cache *cache
|
||||
|
|
|
@ -82,7 +82,7 @@ func (g *Generator) Run(workers int) {
|
|||
func (g *Generator) processApply() {
|
||||
logger := g.log
|
||||
for r := range g.ch {
|
||||
logger.V(4).Info("recieved generate request", "request", r)
|
||||
logger.V(4).Info("received generate request", "request", r)
|
||||
if err := g.generate(r.spec, r.action); err != nil {
|
||||
logger.Error(err, "failed to generate request CR")
|
||||
}
|
||||
|
|
|
@ -19,7 +19,7 @@ func generateEvents(engineResponses []response.EngineResponse, blocked, onUpdate
|
|||
|
||||
for _, er := range engineResponses {
|
||||
if er.IsSuccessful() {
|
||||
// do not create event on rules that were succesful
|
||||
// do not create event on rules that were successful
|
||||
continue
|
||||
}
|
||||
// Rules that failed
|
||||
|
|
|
@ -377,7 +377,7 @@ func (ws *WebhookServer) ResourceMutation(request *v1beta1.AdmissionRequest) *v1
|
|||
go ws.HandleGenerate(request.DeepCopy(), generatePolicies, ctx, userRequestInfo, ws.configHandler)
|
||||
}
|
||||
|
||||
// Succesful processing of mutation & validation rules in policy
|
||||
// Successful processing of mutation & validation rules in policy
|
||||
patchType := v1beta1.PatchTypeJSONPatch
|
||||
return &v1beta1.AdmissionResponse{
|
||||
Allowed: true,
|
||||
|
@ -594,7 +594,7 @@ func (ws *WebhookServer) excludeKyvernoResources(request *v1beta1.AdmissionReque
|
|||
if labels["app.kubernetes.io/managed-by"] == "kyverno" && labels["policy.kyverno.io/synchronize"] == "enable" {
|
||||
isAuthorized, err := userinfo.IsRoleAuthorize(ws.rbLister, ws.crbLister, ws.rLister, ws.crLister, request, ws.configHandler)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to get RBAC infromation for request %v", err)
|
||||
return fmt.Errorf("failed to get RBAC information for request %v", err)
|
||||
}
|
||||
if !isAuthorized {
|
||||
// convert RAW to unstructured
|
||||
|
|
|
@ -100,7 +100,7 @@ func HandleValidation(
|
|||
continue
|
||||
}
|
||||
|
||||
logger.Info("validation rules from policy applied succesfully", "policy", policy.Name)
|
||||
logger.Info("validation rules from policy applied successfully", "policy", policy.Name)
|
||||
}
|
||||
// If Validation fails then reject the request
|
||||
// no violations will be created on "enforce"
|
||||
|
@ -114,7 +114,7 @@ func HandleValidation(
|
|||
// some/all policies failed to apply on the resource. a policy volation is generated.
|
||||
// create an event on the resource and the policy that failed
|
||||
// Scenario 3:
|
||||
// all policies were applied succesfully.
|
||||
// all policies were applied successfully.
|
||||
// create an event on the resource
|
||||
events := generateEvents(engineResponses, blocked, (request.Operation == v1beta1.Update), logger)
|
||||
eventGen.Add(events...)
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
# Disallow Helm Tiller
|
||||
|
||||
Tiller, in the [now-deprecated Helm v2](https://helm.sh/blog/helm-v2-deprecation-timeline/), has known security challenges. It requires adminstrative privileges and acts as a shared resource accessible to any authenticated user. Tiller can lead to privilge escalation as restricted users can impact other users.
|
||||
Tiller, in the [now-deprecated Helm v2](https://helm.sh/blog/helm-v2-deprecation-timeline/), has known security challenges. It requires administrative privileges and acts as a shared resource accessible to any authenticated user. Tiller can lead to privilge escalation as restricted users can impact other users.
|
||||
|
||||
## Policy YAML
|
||||
|
||||
|
|
|
@ -24,7 +24,7 @@ spec:
|
|||
kinds:
|
||||
- Pod
|
||||
validate:
|
||||
message: "Changes to kernel paramaters are not allowed"
|
||||
message: "Changes to kernel parameters are not allowed"
|
||||
pattern:
|
||||
spec:
|
||||
securityContext:
|
||||
|
|
|
@ -4,7 +4,7 @@ metadata:
|
|||
name: disallow-helm-tiller
|
||||
annotations:
|
||||
policies.kyverno.io/category: Security
|
||||
policies.kyverno.io/description: Tiller has known security challenges. It requires adminstrative privileges and acts as a shared
|
||||
policies.kyverno.io/description: Tiller has known security challenges. It requires administrative privileges and acts as a shared
|
||||
resource accessible to any authenticated user. Tiller can lead to privilge escalation as restricted users can impact other users.
|
||||
spec:
|
||||
validationFailureAction: audit
|
||||
|
|
|
@ -16,7 +16,7 @@ spec:
|
|||
kinds:
|
||||
- Pod
|
||||
validate:
|
||||
message: "Changes to kernel paramaters are not allowed"
|
||||
message: "Changes to kernel parameters are not allowed"
|
||||
pattern:
|
||||
spec:
|
||||
=(securityContext):
|
||||
|
|
|
@ -131,7 +131,7 @@ func Test_ClusterRole_ClusterRoleBinding_Sets(t *testing.T) {
|
|||
Expect(rbRes.GetName()).To(Equal(tests.ClusterRoleBindingName))
|
||||
// ============================================
|
||||
|
||||
// If Sync=true, Verify that an Error will occour on deletion of created resources
|
||||
// If Sync=true, Verify that an Error will occur on deletion of created resources
|
||||
if tests.Sync {
|
||||
// Delete generated ClusterRoleBinding and It'll Fail
|
||||
err = e2eClient.DeleteClusteredResource(crbGVR, tests.ClusterRoleBindingName)
|
||||
|
@ -251,7 +251,7 @@ func Test_Role_RoleBinding_Sets(t *testing.T) {
|
|||
Expect(rbRes.GetName()).To(Equal(tests.RoleBindingName))
|
||||
// ============================================
|
||||
|
||||
// If Sync=true, Verify that an Error will occour on deletion of created resources
|
||||
// If Sync=true, Verify that an Error will occur on deletion of created resources
|
||||
if tests.Sync {
|
||||
|
||||
// Delete generated RoleBinding and It'll Fail
|
||||
|
|
|
@ -41,7 +41,7 @@ spec:
|
|||
template:
|
||||
spec:
|
||||
containers:
|
||||
# match all contianers
|
||||
# match all containers
|
||||
- (name): "*"
|
||||
resources:
|
||||
limits:
|
||||
|
|
|
@ -16,4 +16,4 @@ expected:
|
|||
- name: disable-servicelink-and-token
|
||||
type: Mutation
|
||||
success: true
|
||||
message: successfully processed stragetic merge patch
|
||||
message: successfully processed strategic merge patch
|
|
@ -16,7 +16,7 @@ expected:
|
|||
- name: add-memory-limit
|
||||
type: Mutation
|
||||
success: true
|
||||
message: successfully processed stragetic merge patch
|
||||
message: successfully processed strategic merge patch
|
||||
validation:
|
||||
policyresponse:
|
||||
policy: policy-qos
|
||||
|
|
|
@ -16,4 +16,4 @@ expected:
|
|||
- name: annotate-empty-dir
|
||||
type: Mutation
|
||||
success: true
|
||||
message: "successfully processed stragetic merge patch"
|
||||
message: "successfully processed strategic merge patch"
|
|
@ -16,4 +16,4 @@ expected:
|
|||
- name: annotate-host-path
|
||||
type: Mutation
|
||||
success: true
|
||||
message: "successfully processed stragetic merge patch"
|
||||
message: "successfully processed strategic merge patch"
|
Loading…
Add table
Reference in a new issue