2022-04-13 18:15:04 +05:30
|
|
|
package background
|
2020-01-07 10:33:28 -08:00
|
|
|
|
|
|
|
import (
|
2021-03-20 04:03:52 +05:30
|
|
|
"reflect"
|
2020-10-07 11:12:31 -07:00
|
|
|
"time"
|
|
|
|
|
2020-03-17 11:05:20 -07:00
|
|
|
"github.com/go-logr/logr"
|
2022-04-06 22:43:07 +02:00
|
|
|
kyverno "github.com/kyverno/kyverno/api/kyverno/v1"
|
2022-04-25 20:20:40 +08:00
|
|
|
urkyverno "github.com/kyverno/kyverno/api/kyverno/v1beta1"
|
2022-03-28 16:01:27 +02:00
|
|
|
"github.com/kyverno/kyverno/pkg/autogen"
|
2022-04-13 18:15:04 +05:30
|
|
|
common "github.com/kyverno/kyverno/pkg/background/common"
|
2020-10-07 11:12:31 -07:00
|
|
|
kyvernoclient "github.com/kyverno/kyverno/pkg/client/clientset/versioned"
|
|
|
|
kyvernoinformer "github.com/kyverno/kyverno/pkg/client/informers/externalversions/kyverno/v1"
|
2022-04-25 20:20:40 +08:00
|
|
|
urkyvernoinformer "github.com/kyverno/kyverno/pkg/client/informers/externalversions/kyverno/v1beta1"
|
2020-10-07 11:12:31 -07:00
|
|
|
kyvernolister "github.com/kyverno/kyverno/pkg/client/listers/kyverno/v1"
|
2022-04-25 20:20:40 +08:00
|
|
|
urlister "github.com/kyverno/kyverno/pkg/client/listers/kyverno/v1beta1"
|
2020-10-07 11:12:31 -07:00
|
|
|
"github.com/kyverno/kyverno/pkg/config"
|
|
|
|
dclient "github.com/kyverno/kyverno/pkg/dclient"
|
|
|
|
"github.com/kyverno/kyverno/pkg/event"
|
2022-04-06 22:43:07 +02:00
|
|
|
admissionv1 "k8s.io/api/admission/v1"
|
2020-11-20 14:14:59 -08:00
|
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
2020-01-07 10:33:28 -08:00
|
|
|
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
|
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
2022-04-21 11:42:34 +05:30
|
|
|
coreinformers "k8s.io/client-go/informers/core/v1"
|
2022-04-06 22:43:07 +02:00
|
|
|
"k8s.io/client-go/kubernetes"
|
2022-04-21 11:42:34 +05:30
|
|
|
corelister "k8s.io/client-go/listers/core/v1"
|
2020-01-07 10:33:28 -08:00
|
|
|
"k8s.io/client-go/tools/cache"
|
|
|
|
"k8s.io/client-go/util/workqueue"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2020-12-01 12:30:08 -08:00
|
|
|
maxRetries = 10
|
2020-01-07 10:33:28 -08:00
|
|
|
)
|
|
|
|
|
2020-01-24 12:05:53 -08:00
|
|
|
// Controller manages the life-cycle for Generate-Requests and applies generate rule
|
2020-01-07 10:33:28 -08:00
|
|
|
type Controller struct {
|
2020-11-30 11:22:20 -08:00
|
|
|
// dynamic client implementation
|
2022-05-03 07:30:04 +02:00
|
|
|
client dclient.Interface
|
2020-12-22 11:07:31 -08:00
|
|
|
|
2020-11-30 11:22:20 -08:00
|
|
|
// typed client for Kyverno CRDs
|
2022-05-02 22:30:07 +02:00
|
|
|
kyvernoClient kyvernoclient.Interface
|
2020-12-01 12:30:08 -08:00
|
|
|
|
2021-06-08 12:37:19 -07:00
|
|
|
policyInformer kyvernoinformer.ClusterPolicyInformer
|
|
|
|
|
2020-01-07 10:33:28 -08:00
|
|
|
// event generator interface
|
|
|
|
eventGen event.Interface
|
|
|
|
|
2022-04-29 19:05:49 +08:00
|
|
|
// urStatusControl is used to update UR status
|
2022-04-13 18:15:04 +05:30
|
|
|
statusControl common.StatusControlInterface
|
2020-12-01 12:30:08 -08:00
|
|
|
|
2022-04-29 19:05:49 +08:00
|
|
|
// UR that need to be synced
|
2020-01-07 10:33:28 -08:00
|
|
|
queue workqueue.RateLimitingInterface
|
2020-12-01 12:30:08 -08:00
|
|
|
|
|
|
|
// policyLister can list/get cluster policy from the shared informer's store
|
|
|
|
policyLister kyvernolister.ClusterPolicyLister
|
|
|
|
|
2022-03-29 18:34:33 +05:30
|
|
|
// policyLister can list/get Namespace policy from the shared informer's store
|
|
|
|
npolicyLister kyvernolister.PolicyLister
|
|
|
|
|
2022-04-25 20:20:40 +08:00
|
|
|
// urLister can list/get update request from the shared informer's store
|
|
|
|
urLister urlister.UpdateRequestNamespaceLister
|
|
|
|
|
2022-04-21 11:42:34 +05:30
|
|
|
// nsLister can list/get namespaces from the shared informer's store
|
|
|
|
nsLister corelister.NamespaceLister
|
|
|
|
|
|
|
|
log logr.Logger
|
2020-08-07 17:09:24 -07:00
|
|
|
|
2022-01-18 20:59:35 +08:00
|
|
|
Config config.Interface
|
2020-01-07 10:33:28 -08:00
|
|
|
}
|
|
|
|
|
2020-01-24 12:05:53 -08:00
|
|
|
//NewController returns an instance of the Generate-Request Controller
|
2020-01-07 10:33:28 -08:00
|
|
|
func NewController(
|
2021-06-08 12:37:19 -07:00
|
|
|
kubeClient kubernetes.Interface,
|
2022-05-02 22:30:07 +02:00
|
|
|
kyvernoClient kyvernoclient.Interface,
|
2022-05-03 07:30:04 +02:00
|
|
|
client dclient.Interface,
|
2020-12-01 12:30:08 -08:00
|
|
|
policyInformer kyvernoinformer.ClusterPolicyInformer,
|
2022-03-29 18:34:33 +05:30
|
|
|
npolicyInformer kyvernoinformer.PolicyInformer,
|
2022-04-25 20:20:40 +08:00
|
|
|
urInformer urkyvernoinformer.UpdateRequestInformer,
|
2020-01-07 10:33:28 -08:00
|
|
|
eventGen event.Interface,
|
2022-04-21 11:42:34 +05:30
|
|
|
namespaceInformer coreinformers.NamespaceInformer,
|
2020-03-17 11:05:20 -07:00
|
|
|
log logr.Logger,
|
2020-08-07 17:09:24 -07:00
|
|
|
dynamicConfig config.Interface,
|
2020-12-03 19:19:36 -08:00
|
|
|
) (*Controller, error) {
|
2020-12-01 12:30:08 -08:00
|
|
|
|
2020-01-07 10:33:28 -08:00
|
|
|
c := Controller{
|
2022-04-25 20:20:40 +08:00
|
|
|
client: client,
|
|
|
|
kyvernoClient: kyvernoClient,
|
|
|
|
policyInformer: policyInformer,
|
|
|
|
eventGen: eventGen,
|
|
|
|
queue: workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), "generate-request"),
|
|
|
|
log: log,
|
|
|
|
Config: dynamicConfig,
|
2020-01-07 10:33:28 -08:00
|
|
|
}
|
|
|
|
|
2022-04-13 18:15:04 +05:30
|
|
|
c.statusControl = common.StatusControl{Client: kyvernoClient}
|
2022-04-25 20:20:40 +08:00
|
|
|
urInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
|
|
|
|
AddFunc: c.addUR,
|
|
|
|
UpdateFunc: c.updateUR,
|
|
|
|
DeleteFunc: c.deleteUR,
|
|
|
|
})
|
|
|
|
|
2020-12-01 12:30:08 -08:00
|
|
|
c.policyLister = policyInformer.Lister()
|
2022-03-29 18:34:33 +05:30
|
|
|
c.npolicyLister = npolicyInformer.Lister()
|
2022-04-25 20:20:40 +08:00
|
|
|
c.urLister = urInformer.Lister().UpdateRequests(config.KyvernoNamespace)
|
2022-04-21 11:42:34 +05:30
|
|
|
c.nsLister = namespaceInformer.Lister()
|
2021-06-08 12:37:19 -07:00
|
|
|
|
|
|
|
return &c, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run starts workers
|
|
|
|
func (c *Controller) Run(workers int, stopCh <-chan struct{}) {
|
|
|
|
defer utilruntime.HandleCrash()
|
|
|
|
defer c.queue.ShutDown()
|
|
|
|
defer c.log.Info("shutting down")
|
|
|
|
|
|
|
|
c.policyInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
|
|
|
|
UpdateFunc: c.updatePolicy, // We only handle updates to policy
|
|
|
|
// Deletion of policy will be handled by cleanup controller
|
|
|
|
})
|
|
|
|
|
|
|
|
for i := 0; i < workers; i++ {
|
|
|
|
go wait.Until(c.worker, time.Second, stopCh)
|
|
|
|
}
|
|
|
|
|
|
|
|
<-stopCh
|
|
|
|
}
|
|
|
|
|
|
|
|
// worker runs a worker thread that just dequeues items, processes them, and marks them done.
|
|
|
|
// It enforces that the syncHandler is never invoked concurrently with the same key.
|
|
|
|
func (c *Controller) worker() {
|
|
|
|
for c.processNextWorkItem() {
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Controller) processNextWorkItem() bool {
|
|
|
|
key, quit := c.queue.Get()
|
|
|
|
if quit {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
defer c.queue.Done(key)
|
2022-04-29 19:05:49 +08:00
|
|
|
err := c.syncUpdateRequest(key.(string))
|
2021-06-08 12:37:19 -07:00
|
|
|
c.handleErr(err, key)
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Controller) handleErr(err error, key interface{}) {
|
|
|
|
logger := c.log
|
|
|
|
if err == nil {
|
|
|
|
c.queue.Forget(key)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if apierrors.IsNotFound(err) {
|
|
|
|
c.queue.Forget(key)
|
2022-04-29 19:05:49 +08:00
|
|
|
logger.V(4).Info("Dropping update request from the queue", "key", key, "error", err.Error())
|
2021-06-08 12:37:19 -07:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.queue.NumRequeues(key) < maxRetries {
|
2022-04-29 19:05:49 +08:00
|
|
|
logger.V(3).Info("retrying update request", "key", key, "error", err.Error())
|
2021-06-08 12:37:19 -07:00
|
|
|
c.queue.AddRateLimited(key)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-04-29 19:05:49 +08:00
|
|
|
logger.Error(err, "failed to process update request", "key", key)
|
2021-06-08 12:37:19 -07:00
|
|
|
c.queue.Forget(key)
|
|
|
|
}
|
|
|
|
|
2022-04-29 19:05:49 +08:00
|
|
|
func (c *Controller) syncUpdateRequest(key string) error {
|
2021-06-08 12:37:19 -07:00
|
|
|
logger := c.log
|
|
|
|
var err error
|
|
|
|
startTime := time.Now()
|
|
|
|
logger.V(4).Info("started sync", "key", key, "startTime", startTime)
|
|
|
|
defer func() {
|
2022-04-29 19:05:49 +08:00
|
|
|
logger.V(4).Info("completed sync update request", "key", key, "processingTime", time.Since(startTime).String())
|
2021-06-08 12:37:19 -07:00
|
|
|
}()
|
|
|
|
|
2022-04-29 19:05:49 +08:00
|
|
|
_, urName, err := cache.SplitMetaNamespaceKey(key)
|
2021-06-08 12:37:19 -07:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-04-29 19:05:49 +08:00
|
|
|
ur, err := c.urLister.Get(urName)
|
2021-06-08 12:37:19 -07:00
|
|
|
if err != nil {
|
|
|
|
if apierrors.IsNotFound(err) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-04-29 19:05:49 +08:00
|
|
|
logger.Error(err, "failed to fetch update request", "key", key)
|
2021-06-08 12:37:19 -07:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-04-29 19:05:49 +08:00
|
|
|
return c.ProcessUR(ur)
|
2020-01-07 10:33:28 -08:00
|
|
|
}
|
|
|
|
|
2022-04-29 19:05:49 +08:00
|
|
|
func (c *Controller) enqueueUpdateRequest(obj interface{}) {
|
2022-04-25 20:20:40 +08:00
|
|
|
key, err := cache.MetaNamespaceKeyFunc(obj)
|
2020-01-07 10:33:28 -08:00
|
|
|
if err != nil {
|
2020-03-17 11:05:20 -07:00
|
|
|
c.log.Error(err, "failed to extract name")
|
2020-01-07 10:33:28 -08:00
|
|
|
return
|
|
|
|
}
|
2020-12-01 12:30:08 -08:00
|
|
|
|
2022-04-25 20:20:40 +08:00
|
|
|
c.log.V(5).Info("enqueued update request", "ur", key)
|
2020-01-07 10:33:28 -08:00
|
|
|
c.queue.Add(key)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Controller) updatePolicy(old, cur interface{}) {
|
2020-03-17 11:05:20 -07:00
|
|
|
logger := c.log
|
2020-01-07 10:33:28 -08:00
|
|
|
oldP := old.(*kyverno.ClusterPolicy)
|
|
|
|
curP := cur.(*kyverno.ClusterPolicy)
|
|
|
|
if oldP.ResourceVersion == curP.ResourceVersion {
|
|
|
|
// Periodic resync will send update events for all known Namespace.
|
|
|
|
// Two different versions of the same replica set will always have different RVs.
|
|
|
|
return
|
|
|
|
}
|
2020-11-09 11:26:12 -08:00
|
|
|
|
|
|
|
var policyHasGenerate bool
|
2022-03-28 16:01:27 +02:00
|
|
|
for _, rule := range autogen.ComputeRules(curP) {
|
2020-11-09 11:26:12 -08:00
|
|
|
if rule.HasGenerate() {
|
|
|
|
policyHasGenerate = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-20 04:03:52 +05:30
|
|
|
if reflect.DeepEqual(curP.Spec, oldP.Spec) {
|
|
|
|
policyHasGenerate = false
|
|
|
|
}
|
|
|
|
|
2020-11-09 11:26:12 -08:00
|
|
|
if !policyHasGenerate {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-03-17 11:05:20 -07:00
|
|
|
logger.V(4).Info("updating policy", "name", oldP.Name)
|
2020-12-01 12:30:08 -08:00
|
|
|
|
2022-04-29 19:05:49 +08:00
|
|
|
urs, err := c.urLister.GetUpdateRequestsForClusterPolicy(curP.Name)
|
2020-01-07 10:33:28 -08:00
|
|
|
if err != nil {
|
2022-04-29 19:05:49 +08:00
|
|
|
logger.Error(err, "failed to update request for policy", "name", curP.Name)
|
2020-01-07 10:33:28 -08:00
|
|
|
return
|
|
|
|
}
|
2020-11-20 14:14:59 -08:00
|
|
|
|
2022-04-29 19:05:49 +08:00
|
|
|
// re-evaluate the UR as the policy was updated
|
|
|
|
for _, ur := range urs {
|
|
|
|
ur.Spec.Context.AdmissionRequestInfo.Operation = admissionv1.Update
|
|
|
|
c.enqueueUpdateRequest(ur)
|
2020-08-31 23:55:13 +05:30
|
|
|
}
|
2022-04-25 20:20:40 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Controller) addUR(obj interface{}) {
|
|
|
|
ur := obj.(*urkyverno.UpdateRequest)
|
2022-04-29 19:05:49 +08:00
|
|
|
c.enqueueUpdateRequest(ur)
|
2022-04-25 20:20:40 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Controller) updateUR(old, cur interface{}) {
|
|
|
|
oldUr := old.(*urkyverno.UpdateRequest)
|
|
|
|
curUr := cur.(*urkyverno.UpdateRequest)
|
|
|
|
if oldUr.ResourceVersion == curUr.ResourceVersion {
|
|
|
|
// Periodic resync will send update events for all known Namespace.
|
|
|
|
// Two different versions of the same replica set will always have different RVs.
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// only process the ones that are in "Pending"/"Completed" state
|
2022-04-29 19:05:49 +08:00
|
|
|
// if the UPDATE Request fails due to incorrect policy, it will be requeued during policy update
|
2022-04-27 03:18:24 +08:00
|
|
|
if curUr.Status.State != urkyverno.Pending {
|
2022-04-25 20:20:40 +08:00
|
|
|
return
|
|
|
|
}
|
2022-04-29 19:05:49 +08:00
|
|
|
c.enqueueUpdateRequest(curUr)
|
2022-04-25 20:20:40 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Controller) deleteUR(obj interface{}) {
|
|
|
|
logger := c.log
|
2022-04-29 19:05:49 +08:00
|
|
|
ur, ok := obj.(*urkyverno.UpdateRequest)
|
2022-04-25 20:20:40 +08:00
|
|
|
if !ok {
|
|
|
|
tombstone, ok := obj.(cache.DeletedFinalStateUnknown)
|
|
|
|
if !ok {
|
|
|
|
logger.Info("Couldn't get object from tombstone", "obj", obj)
|
|
|
|
return
|
|
|
|
}
|
2022-04-29 19:05:49 +08:00
|
|
|
ur, ok = tombstone.Obj.(*urkyverno.UpdateRequest)
|
2022-04-25 20:20:40 +08:00
|
|
|
if !ok {
|
2022-04-29 19:05:49 +08:00
|
|
|
logger.Info("tombstone contained object that is not a Update Request CR", "obj", obj)
|
2022-04-25 20:20:40 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-04-29 19:05:49 +08:00
|
|
|
if ur.Spec.GetRequestType() == urkyverno.Generate {
|
|
|
|
for _, resource := range ur.Status.GeneratedResources {
|
2022-04-25 20:20:40 +08:00
|
|
|
r, err := c.client.GetResource(resource.APIVersion, resource.Kind, resource.Namespace, resource.Name)
|
|
|
|
if err != nil && !apierrors.IsNotFound(err) {
|
|
|
|
logger.Error(err, "Generated resource is not deleted", "Resource", resource.Name)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if r != nil && r.GetLabels()["policy.kyverno.io/synchronize"] == "enable" {
|
|
|
|
if err := c.client.DeleteResource(r.GetAPIVersion(), r.GetKind(), r.GetNamespace(), r.GetName(), false); err != nil && !apierrors.IsNotFound(err) {
|
|
|
|
logger.Error(err, "Generated resource is not deleted", "Resource", r.GetName())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-04-29 19:05:49 +08:00
|
|
|
logger.V(3).Info("deleting update request", "name", ur.Name)
|
2022-04-25 20:20:40 +08:00
|
|
|
}
|
2020-12-01 12:30:08 -08:00
|
|
|
|
2020-01-07 10:33:28 -08:00
|
|
|
// sync Handler will remove it from the queue
|
2022-04-29 19:05:49 +08:00
|
|
|
c.enqueueUpdateRequest(ur)
|
2020-01-07 10:33:28 -08:00
|
|
|
}
|