-
Notifications
You must be signed in to change notification settings - Fork 229
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Validation error: Additional property seccompProfile is not allowed #329
Comments
This issue is surfaced because the latest release of Flux has added I don't know why kubeval would have an issue with this one field in particular, but: It appears to be present in the cluster's schema A-OK, and it is matched together with the API documentation in a document where I've enabled validation through the cluster's API docs. So I tried to figure out where kubeval gets its schemas for validation, and I noticed that you can pass a particular Kubernetes version in at manifest validation time:
I don't know any reason why this new feature wouldn't be in If there's something we can do to fix this in our docs, then it can be filed as an enhancement against these repos where we include kubeval in our examples: https://github.com/fluxcd/flux2-kustomize-helm-example/blob/main/scripts/validate.sh |
Adding |
That's funny @jakubhajek – it hadn't fixed it for me! Turns out I was calling I'll take this back to our tutorials and fix them up (even though the tutorials don't show any validation error because they don't include Meanwhile, if the default version is to validate against the |
It looks like we've found another option that is being actively maintained: https://github.com/yannh/kubeconform Flux project switched our recommendation to use |
kubeval is failing to correctly evalulate manifests with seccompProfiles. The project is unmaintained and a suggested replacement is kubeconform. This PR fixes failing CI by pinning the CI tool and switching to kubeconform. xref: instrumenta/kubeval#329 Signed-off-by: Lucas Servén Marín <[email protected]>
Getting an invalid Deployment when validating custom resources using kubeval with the additional CRD schemas. The
seccomp
profile feature was shipped in Kubernetes 1.19, is this not supported yet?The text was updated successfully, but these errors were encountered: