-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
strict mode: missing type "number,string" for keyword "format" at "#" (strictTypes) #13
Comments
hi @jeraldsm, Could you post the raw output of Just a couple of comments regarding the usage. You can pass the kustimoze directory or kustomization.yaml file directly as an input without calling kustomize and piping it into kubevious CLI like this:
Also, this should work without the --ignore-unknown flag, because it is expected that all YAML files to be valid K8s resources. |
Hi @rubenhak Thanks for your comment. I get the same error when I pass the kustomize path directly as input:
Please find the output of
|
Could you try this command locally? I took the output you provided and ran it. Didn't see any errors with the "external-secret" object. I see in your case, it complains about "#/properties/status/properties/refreshTime", but the status object was not even populated in your kustomize output. $ kubevious guard https://raw.githubusercontent.com/kubevious/demos/main/bug-fixes/guard/external-secret/external-secret.yaml https://raw.githubusercontent.com/kubevious/demos/main/bug-fixes/guard/external-secret/crd.yaml Here is the output I see: ✔ Sources identified.
✔ Manifests loaded.
✔ Fetched K8s API schema.
✔ Lint complete.
✔ Libraries loaded.
✔ ClusterRules loaded.
✔ Rules loaded.
✔ RuleApplicators loaded
✔ RulesLibrary locally populated.
✔ Rules validation complete.
ℹ️ Linting against Kubernetes Version: 1.25.2
-= SOURCES =-
✅ No issues with sources.
-= MANIFESTS =-
✅ No issues with manifests.
-= RULES =-
✅ No issues with rules.
-= SUMMARY =-
📚 Sources: 38
✖️ Sources with Errors: 0
📄 Manifests: 38
✅ Valid Manifests: 38
✖️ Manifests with Errors: 0
❕ Manifests with Warnings: 0
☑️ Manifests Processed for Rules: 0
✖️ Manifests with Rule Errors: 0
❕ Manifests with Rule Warnings: 0
📜 Rules: 31
✅ Rules Passed: 31
✖️ Rules Failed: 0
🔘 Rules with Errors: 0
❕ Rules with Warnings: 0
ℹ️ Run with --detailed to see all sources and manifests
✅ Guard Succeeded. |
Hi @rubenhak, The kubevious guard succeeds with the command you have provided locally and also with "--live-k8s". Please find the output below:
But, When running the kubevious guard locally without specifying "live-k8s" argument and crd.yaml file, I get the "Unknown API Resource" error in the manifest validation part as shown below:
Also, When running the kubevious guard locally by specifying "live-k8s" argument and without the CRD.yaml file , I get the inital error
Passing the file: https://raw.githubusercontent.com/kubevious/demos/main/bug-fixes/guard/external-secret/crd.yaml does resolve this issue. But do I always need to pass the crd.yaml link to fix this ? Note: I'm using kubevious version |
@jeraldsm, can I see your CRD definition for No, it is supposed to work with --live-k8s. For the time being, you can try passing the crd.yaml as an input. But, lets try to get this resolved. |
@rubenhak the CRD definition I use for external-secrets was downloaded using helm and the version is 0.3.11. Please find the link below: |
I've tested it on a local KIND cluster, and it looks file. I may need a few more inputs from you. I want to look at the OpenAPI Schema. Please run:
Then query the URL The result would be pretty large. This is just the API schema, it doesn't contain your k8s objects. Please feel free to email me at r@kubevious.io |
@rubenhak I have emailed you the API -Schema. I have also sent you the CRD definition we use, just incase if there's any additional change from the vendor manifest. |
@jeraldsm, I got your email. There is something wrong with the "refreshTime" field. See the line 88653.
The manifest CRD contains the "type" field: refreshTime:
description: refreshTime is the time and date the external secret was fetched and the target secret updated
format: date-time
nullable: true
type: string Maybe it is some weird EKS behavior. I will look into this more, and might add a check to assume "string" type if no type is set explicitly. |
@jeraldsm, could you try the latest version v.1.0.52? Home will take bit longer time to release, so can you use the npm installer or binaries. |
Looks like the issue was resolved. Closing for inactivity. |
@rubenhak Apologies for the late response. |
Thanks for testing it out! |
I get the following error, when I run
kubevious guard
against a Custom resourceexternal-secrets
with --live-k8sHere is the full logs of running kubevious guard:
Following is the external-secret configuration in local. The configuration itself works without any issues.
Kindly help me to resolve this issue.
The text was updated successfully, but these errors were encountered: