-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add K3S exceptions #270
Conversation
Codecov ReportAttention: Patch coverage is
❗ Your organization needs to install the Codecov GitHub app to enable full functionality. Additional details and impacted files@@ Coverage Diff @@
## main #270 +/- ##
==========================================
- Coverage 40.83% 40.79% -0.04%
==========================================
Files 58 58
Lines 2902 2907 +5
==========================================
+ Hits 1185 1186 +1
- Misses 1531 1533 +2
- Partials 186 188 +2 ☔ View full report in Codecov by Sentry. |
Pull request looks good. Otherwise we will need to consider regexes |
Unfortunately it's opaque. |
@doronkg we were looking at a similar issue with the openshift namespaces right? |
Not sure which case you meant so I'll address both: As for regex:
In OpenShift, we used type In addition, as described in #262:
In this case we discussed excluding all the |
Well, the object resides in |
Added a ticket for this. |
I think merging this now will be easier to work with, changes in all wildcard exceptions will be already done in #277, sounds like an easier fix to me. |
OK. Just add this secret regex in #277 and use it as a test case |
* fix(formatOutput): fix spacing between tables (#269) * fix(formatOutput): fix spacing between tables * fix * refactor * refactor --------- Co-authored-by: Phil Brocker <phil.brocker@gmail.com> * feat: added regex support * feat: updated exceptions to regex * fix: converted all existing exceptions to be regex compatible * fix: added support for configmaps and serviceaccounts * fix: Configmaps and serviceaccounts are now filtered using the same methods * fix: exceptiontype * fix: once again wrong file * feat: add K3S exceptions (#270) * feat: added clusterroles * feat: added k3s configmaps * feat: added k3s crds * feat: added k3s secrets * feat: added k3s StorageClass * feat: added job resource exceptions * feat: added job exceptions * fix: importing embed * fix: fixed sa test * fix: regex-ified job exceptions * fix: fixed resource exception for jobs * fix: removed kube-root-ca from test * fix: removed default from TestRetrieveUsedSA * fix: added regex flag to jsons * added MatchRegex flag * sorted all exceptoins * fix: wrong regex expressions * feat: added resource exception test * fix: removed binary --------- Co-authored-by: Phil Brocker <5331286+pbr0ck3r@users.noreply.github.com> Co-authored-by: Phil Brocker <phil.brocker@gmail.com>
What this PR does / why we need it
Adds exceptions to all k3s default objects.
PR Checklist
Github Issue
Fixes #259
Notes for your reviewers
Theres a default secret which is prefixed by the node's name. (e.g:
nodename.node-password.k3s
)As wildcards work only as an indicator for a suffix I can't really really ignore it at the current state.
I think the way forward will be one of the following options:
*
to be used as a prefix as well as a suffix.I think option 1 has more risk of ignoring objects that aren't supposed to be ignored, so the second one seems more appealing to me.
On the other hand, the second option is not as straightforward as well-known and used wildcards.