Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat: Feature to select namespaces (match or exclude), resources with…
…in a namespace, and nodes in ClusterIntentBinding (5GSEC#108) * - Changing the types * - Modified deepcopy functions * - Predicate functions is defined * - make run * - Sample csib yamls * - Add of the csib is working * - Add subcase - of cases 1, 2, 3 - done * - Add/Update/Delete of the Nimbus policies in the reconcile functionality done * - Changes for kubeArmor, NetPol adapter * - Kyverno adapter watches for NimbusPolicy generated from SecurityIntentBinding only * - Fixes * - Copying the matchNames/excludeNames to the Kyverno Cluster Policy * - Renamed v1alpha to v1alpha1 * - Modified the version in the scheme * - chainsaw test controllers/nimbuspolicy/delete/ - working * - Tests are passing individually - Errors when run together * - For a cluster SIB, cluster nimbus policy is created - Also, one nimbus policy per ns is being created - There is a reconciler error for update. - Potential fix is to backoff for some time * - Add of a csib, creates np in multiple ns - Equality function added but not used - Equality function can be used to add eliminate unnecessary updates * - Nimbus Policies are not updated if the expected and actual is same * - First chainsaw test running * - Updated the test * - Test case for matchNames case * - Test case for excludeName passing * - Example yamls - A given CSIB cannot contain both match and exclude parameters * - Rebased the kcpbuilder.go * - Rebased the kpbuilder.go * - Changing the types * - Modified deepcopy functions * - Predicate functions is defined * - Rebase * - Sample csib yamls * - Add of the csib is working * - Add subcase - of cases 1, 2, 3 - done * - Add/Update/Delete of the Nimbus policies in the reconcile functionality done * - Changes for kubeArmor, NetPol adapter * - Kyverno adapter watches for NimbusPolicy generated from SecurityIntentBinding only * - Fixes * - Copying the matchNames/excludeNames to the Kyverno Cluster Policy * - Renamed v1alpha to v1alpha1 * - Modified the version in the scheme * - chainsaw test controllers/nimbuspolicy/delete/ - working * - Tests are passing individually - Errors when run together * - For a cluster SIB, cluster nimbus policy is created - Also, one nimbus policy per ns is being created - There is a reconciler error for update. - Potential fix is to backoff for some time * - Add of a csib, creates np in multiple ns - Equality function added but not used - Equality function can be used to add eliminate unnecessary updates * - Nimbus Policies are not updated if the expected and actual is same * - First chainsaw test running * - Updated the test * - Test case for matchNames case * - Test case for excludeName passing * - Example yamls - A given CSIB cannot contain both match and exclude parameters * - Rebased the kcpbuilder.go * - Rebased the kpbuilder.go * - e2e/dns-manipulation successfull * - Changes for e2e/escape-to-host - Getting build issues in kyverno adapter - Test failing for now * - chainsaw test test/controllers/ passing with these changes * - kyverno adapter compile * - e2e tests passing - $ chainsaw test --test-dir=tests/e2e --config tests/chainsaw-config.yaml Tests Summary... - Passed tests 6 - Failed tests 0 - Skipped tests 0 Done. * - Latest crds * - Adding a dependency on jobs * - Debug logs * - Testing * - Added testing yaml * - $ make integration-test PASS Tests Summary... - Passed tests 12 - Failed tests 0 - Skipped tests 0 Done. * - Review feedback * - Review feedback * - Review feedback * - fixing the static check fail * - To create csib for all ns, use "*" in matchNames - If csib is invalid, status ValidationFail is set - slices.Contain() is used to reduce code - A blacklist is introduced, to avoid creation of Nimbus Policies in those ns * - Fixed issue related to excludeNames path * - test-doc * - Comments * - Review feedback * - Fix for lint check fail --------- Signed-off-by: shivaccuknox <[email protected]> Co-authored-by: Ved Ratan <[email protected]>
- Loading branch information