1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-06 07:57:07 +00:00
kyverno/test/conformance/chainsaw/webhook-configurations/match-conditions-standard
shuting 5f0d53fe34
feat: apply .matchConditions when generating reports (#9599)
* enable matchconditions for reports

Signed-off-by: ShutingZhao <shuting@nirmata.com>

* update

Signed-off-by: ShutingZhao <shuting@nirmata.com>

* add chainsaw tests

Signed-off-by: ShutingZhao <shuting@nirmata.com>

* fix: linter issues

Signed-off-by: ShutingZhao <shuting@nirmata.com>

* chore: move files

Signed-off-by: ShutingZhao <shuting@nirmata.com>

---------

Signed-off-by: ShutingZhao <shuting@nirmata.com>
2024-02-02 08:32:28 +00:00
..
chainsaw-test.yaml feat: apply .matchConditions when generating reports (#9599) 2024-02-02 08:32:28 +00:00
ns.yaml feat: apply .matchConditions when generating reports (#9599) 2024-02-02 08:32:28 +00:00
pod.yaml feat: apply .matchConditions when generating reports (#9599) 2024-02-02 08:32:28 +00:00
policy-assert.yaml feat: apply .matchConditions when generating reports (#9599) 2024-02-02 08:32:28 +00:00
policy.yaml feat: apply .matchConditions when generating reports (#9599) 2024-02-02 08:32:28 +00:00
README.md feat: apply .matchConditions when generating reports (#9599) 2024-02-02 08:32:28 +00:00
report-assert.yaml feat: apply .matchConditions when generating reports (#9599) 2024-02-02 08:32:28 +00:00
report-error.yaml feat: apply .matchConditions when generating reports (#9599) 2024-02-02 08:32:28 +00:00

Description

This test creates a policy with matchConditions and two pods, it then expects a background scan report to be created for the pod in the selected namespace match-conditions-standard-ns other than default.

Steps

    • Create the testing namespace match-conditions-standard-ns
    • Create pods in match-conditions-standard-ns and default namespaces
    • Create a cluster policy
    • Assert the policy becomes ready
    • Assert a policy report is created for the pod in match-conditions-standard-ns
    • Assert a policy report is not created for the pod in default