Skip to content

Commit

Permalink
chore: small updates (#252)
Browse files Browse the repository at this point in the history
Signed-off-by: Charles-Edouard Brétéché <[email protected]>
  • Loading branch information
eddycharly authored Jan 2, 2024
1 parent 63c24c9 commit d192c71
Show file tree
Hide file tree
Showing 3 changed files with 19 additions and 13 deletions.
26 changes: 16 additions & 10 deletions .release-notes/main.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,22 +2,28 @@

Release notes for `TODO`.


<!--
## :bangbang: Breaking chages :bangbang:
## ‼️ Breaking changes ‼️
## :dizzy: New features :dizzy:
## ✨ UI changes ✨
## :sparkles: UI changes :sparkles:
## ⭐ Examples ⭐
## :star: Examples :star:
## ⛵ Tutorials ⛵
## :boat: Tutorials :boat:
## 🎸 Misc 🎸
-->

## :wrench: Fixes :wrench:
## 💫 New features 💫

## :guitar: Misc :guitar:
-->
- Kyverno-JSON is now available via brew
- Added a GitHub action to install Kyverno-JSON

## 🔧 Fixes 🔧

- Fixed an index not found error

## :books: Docs :books:
## 📚 Docs 📚

- Added multi version docs support
- Added multi-version docs support
4 changes: 2 additions & 2 deletions pkg/policy/load.go
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ import (

var (
gv_v1alpha1 = schema.GroupVersion{Group: "json.kyverno.io", Version: "v1alpha1"}
validationPolicy_v1alpha1 = gv_v1alpha1.WithKind("ValidatingPolicy")
validatingPolicy_v1alpha1 = gv_v1alpha1.WithKind("ValidatingPolicy")
)

func Load(path ...string) ([]*v1alpha1.ValidatingPolicy, error) {
Expand Down Expand Up @@ -79,7 +79,7 @@ func Parse(content []byte) ([]*v1alpha1.ValidatingPolicy, error) {
return nil, err
}
switch gvk {
case validationPolicy_v1alpha1:
case validatingPolicy_v1alpha1:
policy, err := convert.To[v1alpha1.ValidatingPolicy](untyped)
if err != nil {
return nil, err
Expand Down
2 changes: 1 addition & 1 deletion website/docs/policies/asserts.md
Original file line number Diff line number Diff line change
Expand Up @@ -201,7 +201,7 @@ spec:
($sum): 10
```
Finally, we can always access the current payload, policy and rule being evaluated using the builtin `$payload`, `$policy` and `$rule` bindings. No protection is made to prevent you from overriding those bindings though.
Finally, we can always access the current payload, policy and rule being evaluated using the built-in `$payload`, `$policy` and `$rule` bindings. No protection is made to prevent you from overriding those bindings though.


## Escaping projection
Expand Down

0 comments on commit d192c71

Please sign in to comment.