From ffe3bdb677ce264abd98dcd600733d0d6f014201 Mon Sep 17 00:00:00 2001 From: Shivkumar Dudhani Date: Wed, 4 Dec 2019 18:04:42 -0800 Subject: [PATCH] remove newline from engine response strings (#537) * remove newline from engine response strings * add scenario file updates * cr: remove . in trailing msg string --- pkg/engine/pattern.go | 2 +- pkg/engine/validation.go | 6 +++--- pkg/engine/validation_test.go | 12 ++++++------ pkg/testrunner/scenario.go | 3 +-- ...rio_validate_disallow_default_serviceaccount.yaml | 2 +- .../other/scenario_validate_selinux_context.yaml | 2 +- .../best_practices/disallow_docker_sock_mount.yaml | 2 +- .../scenario_validate_disallow_helm_tiller.yaml | 2 +- 8 files changed, 15 insertions(+), 16 deletions(-) diff --git a/pkg/engine/pattern.go b/pkg/engine/pattern.go index 421398509f..6e3ae0039e 100644 --- a/pkg/engine/pattern.go +++ b/pkg/engine/pattern.go @@ -60,7 +60,7 @@ func ValidateValueWithPattern(value, pattern interface{}) bool { glog.Warning("Arrays as patterns are not supported") return false default: - glog.Warningf("Unknown type as pattern: %T\n", pattern) + glog.Warningf("Unknown type as pattern: %v", typedPattern) return false } } diff --git a/pkg/engine/validation.go b/pkg/engine/validation.go index bc5bcdca23..6770d83341 100644 --- a/pkg/engine/validation.go +++ b/pkg/engine/validation.go @@ -172,7 +172,7 @@ func validatePatterns(resource unstructured.Unstructured, rule kyverno.Rule) (re // rule application failed glog.V(4).Infof("Validation rule '%s' failed at '%s' for resource %s/%s/%s. %s: %v", rule.Name, path, resource.GetKind(), resource.GetNamespace(), resource.GetName(), rule.Validation.Message, err) response.Success = false - response.Message = fmt.Sprintf("Validation error: %s\nValidation rule '%s' failed at path '%s'.", + response.Message = fmt.Sprintf("Validation error: %s; Validation rule '%s' failed at path '%s'", rule.Validation.Message, rule.Name, path) return response } @@ -197,7 +197,7 @@ func validatePatterns(resource unstructured.Unstructured, rule kyverno.Rule) (re return response } if err != nil { - glog.V(4).Infof("Validation error: %s\nValidation rule %s anyPattern[%d] failed at path %s for %s/%s/%s", + glog.V(4).Infof("Validation error: %s; Validation rule %s anyPattern[%d] failed at path %s for %s/%s/%s", rule.Validation.Message, rule.Name, index, path, resource.GetKind(), resource.GetNamespace(), resource.GetName()) errs = append(errs, err) failedPaths = append(failedPaths, path) @@ -213,7 +213,7 @@ func validatePatterns(resource unstructured.Unstructured, rule kyverno.Rule) (re str := fmt.Sprintf("Validation rule %s anyPattern[%d] failed at path %s.", rule.Name, index, failedPaths[index]) errorStr = append(errorStr, str) } - response.Message = fmt.Sprintf("Validation error: %s\n%s", rule.Validation.Message, strings.Join(errorStr, "\n")) + response.Message = fmt.Sprintf("Validation error: %s; %s", rule.Validation.Message, strings.Join(errorStr, ";")) return response } diff --git a/pkg/engine/validation_test.go b/pkg/engine/validation_test.go index e3f4c8b2c8..4f9255455f 100644 --- a/pkg/engine/validation_test.go +++ b/pkg/engine/validation_test.go @@ -1819,7 +1819,7 @@ func TestValidate_image_tag_fail(t *testing.T) { assert.NilError(t, err) msgs := []string{ "Validation rule 'validate-tag' succeeded.", - "Validation error: imagePullPolicy 'Always' required with tag 'latest'\nValidation rule 'validate-latest' failed at path '/spec/containers/0/imagePullPolicy/'.", + "Validation error: imagePullPolicy 'Always' required with tag 'latest'; Validation rule 'validate-latest' failed at path '/spec/containers/0/imagePullPolicy/'", } er := Validate(PolicyContext{Policy: policy, NewResource: *resourceUnstructured}) for index, r := range er.PolicyResponse.Rules { @@ -1993,7 +1993,7 @@ func TestValidate_Fail_anyPattern(t *testing.T) { resourceUnstructured, err := ConvertToUnstructured(rawResource) assert.NilError(t, err) er := Validate(PolicyContext{Policy: policy, NewResource: *resourceUnstructured}) - msgs := []string{"Validation error: A namespace is required\nValidation rule check-default-namespace anyPattern[0] failed at path /metadata/namespace/.\nValidation rule check-default-namespace anyPattern[1] failed at path /metadata/namespace/."} + msgs := []string{"Validation error: A namespace is required; Validation rule check-default-namespace anyPattern[0] failed at path /metadata/namespace/.;Validation rule check-default-namespace anyPattern[1] failed at path /metadata/namespace/."} for index, r := range er.PolicyResponse.Rules { assert.Equal(t, r.Message, msgs[index]) } @@ -2074,7 +2074,7 @@ func TestValidate_host_network_port(t *testing.T) { resourceUnstructured, err := ConvertToUnstructured(rawResource) assert.NilError(t, err) er := Validate(PolicyContext{Policy: policy, NewResource: *resourceUnstructured}) - msgs := []string{"Validation error: Host network and port are not allowed\nValidation rule 'validate-host-network-port' failed at path '/spec/containers/0/ports/0/hostPort/'."} + msgs := []string{"Validation error: Host network and port are not allowed; Validation rule 'validate-host-network-port' failed at path '/spec/containers/0/ports/0/hostPort/'"} for index, r := range er.PolicyResponse.Rules { assert.Equal(t, r.Message, msgs[index]) @@ -2251,7 +2251,7 @@ func TestValidate_anchor_arraymap_fail(t *testing.T) { resourceUnstructured, err := ConvertToUnstructured(rawResource) assert.NilError(t, err) er := Validate(PolicyContext{Policy: policy, NewResource: *resourceUnstructured}) - msgs := []string{"Validation error: Host path '/var/lib/' is not allowed\nValidation rule 'validate-host-path' failed at path '/spec/volumes/0/hostPath/path/'."} + msgs := []string{"Validation error: Host path '/var/lib/' is not allowed; Validation rule 'validate-host-path' failed at path '/spec/volumes/0/hostPath/path/'"} for index, r := range er.PolicyResponse.Rules { assert.Equal(t, r.Message, msgs[index]) @@ -2464,7 +2464,7 @@ func TestValidate_anchor_map_found_invalid(t *testing.T) { resourceUnstructured, err := ConvertToUnstructured(rawResource) assert.NilError(t, err) er := Validate(PolicyContext{Policy: policy, NewResource: *resourceUnstructured}) - msgs := []string{"Validation error: pod: validate run as non root user\nValidation rule 'pod rule 2' failed at path '/spec/securityContext/runAsNonRoot/'."} + msgs := []string{"Validation error: pod: validate run as non root user; Validation rule 'pod rule 2' failed at path '/spec/securityContext/runAsNonRoot/'"} for index, r := range er.PolicyResponse.Rules { assert.Equal(t, r.Message, msgs[index]) @@ -2848,7 +2848,7 @@ func TestValidate_negationAnchor_deny(t *testing.T) { resourceUnstructured, err := ConvertToUnstructured(rawResource) assert.NilError(t, err) er := Validate(PolicyContext{Policy: policy, NewResource: *resourceUnstructured}) - msgs := []string{"Validation error: Host path is not allowed\nValidation rule 'validate-host-path' failed at path '/spec/volumes/0/hostPath/'."} + msgs := []string{"Validation error: Host path is not allowed; Validation rule 'validate-host-path' failed at path '/spec/volumes/0/hostPath/'"} for index, r := range er.PolicyResponse.Rules { assert.Equal(t, r.Message, msgs[index]) diff --git a/pkg/testrunner/scenario.go b/pkg/testrunner/scenario.go index 752989bef9..3fbd606d56 100644 --- a/pkg/testrunner/scenario.go +++ b/pkg/testrunner/scenario.go @@ -367,12 +367,11 @@ func loadResource(t *testing.T, path string) []*unstructured.Unstructured { rBytes := bytes.Split(data, []byte("---")) for _, r := range rBytes { decode := scheme.Codecs.UniversalDeserializer().Decode - obj, gvk, err := decode(r, nil, nil) + obj, _, err := decode(r, nil, nil) if err != nil { t.Logf("failed to decode resource: %v", err) continue } - glog.Info(gvk) data, err := runtime.DefaultUnstructuredConverter.ToUnstructured(&obj) if err != nil { diff --git a/test/scenarios/other/scenario_validate_disallow_default_serviceaccount.yaml b/test/scenarios/other/scenario_validate_disallow_default_serviceaccount.yaml index 883c03b791..9d69addcaf 100644 --- a/test/scenarios/other/scenario_validate_disallow_default_serviceaccount.yaml +++ b/test/scenarios/other/scenario_validate_disallow_default_serviceaccount.yaml @@ -14,5 +14,5 @@ expected: rules: - name: prevent-mounting-default-serviceaccount type: Validation - message: "Validation error: Prevent mounting of default service account\nValidation rule 'prevent-mounting-default-serviceaccount' failed at path '/spec/serviceAccountName/'." + message: "Validation error: Prevent mounting of default service account; Validation rule 'prevent-mounting-default-serviceaccount' failed at path '/spec/serviceAccountName/'" success: false \ No newline at end of file diff --git a/test/scenarios/other/scenario_validate_selinux_context.yaml b/test/scenarios/other/scenario_validate_selinux_context.yaml index a851a6523b..8847a64980 100644 --- a/test/scenarios/other/scenario_validate_selinux_context.yaml +++ b/test/scenarios/other/scenario_validate_selinux_context.yaml @@ -15,5 +15,5 @@ expected: rules: - name: validate-selinux-options type: Validation - message: "Validation error: SELinux level is required\nValidation rule 'validate-selinux-options' failed at path '/spec/containers/0/securityContext/seLinuxOptions/'." + message: "Validation error: SELinux level is required; Validation rule 'validate-selinux-options' failed at path '/spec/containers/0/securityContext/seLinuxOptions/'" success: false \ No newline at end of file diff --git a/test/scenarios/samples/best_practices/disallow_docker_sock_mount.yaml b/test/scenarios/samples/best_practices/disallow_docker_sock_mount.yaml index a437578f5b..17dd05baa5 100644 --- a/test/scenarios/samples/best_practices/disallow_docker_sock_mount.yaml +++ b/test/scenarios/samples/best_practices/disallow_docker_sock_mount.yaml @@ -14,5 +14,5 @@ expected: rules: - name: validate-docker-sock-mount type: Validation - message: "Validation error: Use of the Docker Unix socket is not allowed\nValidation rule 'validate-docker-sock-mount' failed at path '/spec/volumes/'." + message: "Validation error: Use of the Docker Unix socket is not allowed; Validation rule 'validate-docker-sock-mount' failed at path '/spec/volumes/'" success: false \ No newline at end of file diff --git a/test/scenarios/samples/best_practices/scenario_validate_disallow_helm_tiller.yaml b/test/scenarios/samples/best_practices/scenario_validate_disallow_helm_tiller.yaml index 1279a17bd3..ecadd7dca5 100644 --- a/test/scenarios/samples/best_practices/scenario_validate_disallow_helm_tiller.yaml +++ b/test/scenarios/samples/best_practices/scenario_validate_disallow_helm_tiller.yaml @@ -12,5 +12,5 @@ expected: rules: - name: validate-helm-tiller type: Validation - message: "Validation error: Helm Tiller is not allowed\nValidation rule 'validate-helm-tiller' failed at path '/spec/containers/0/image/'." + message: "Validation error: Helm Tiller is not allowed; Validation rule 'validate-helm-tiller' failed at path '/spec/containers/0/image/'" success: false