1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-06 16:06:56 +00:00
kyverno/pkg/webhooks/report.go

106 lines
2.9 KiB
Go
Raw Normal View History

2019-07-15 16:07:56 -07:00
package webhooks
import (
"strings"
2019-11-13 13:41:08 -08:00
kyverno "github.com/nirmata/kyverno/pkg/api/kyverno/v1"
"github.com/nirmata/kyverno/pkg/engine/response"
2019-08-26 13:34:42 -07:00
2019-07-15 16:07:56 -07:00
"github.com/golang/glog"
"github.com/nirmata/kyverno/pkg/event"
)
2019-08-26 13:34:42 -07:00
//generateEvents generates event info for the engine responses
func generateEvents(engineResponses []response.EngineResponse, onUpdate bool) []event.Info {
2019-08-26 13:34:42 -07:00
var events []event.Info
if !isResponseSuccesful(engineResponses) {
for _, er := range engineResponses {
if er.IsSuccesful() {
// dont create events on success
2019-07-16 15:53:14 -07:00
continue
}
2019-11-18 17:13:48 -08:00
// default behavior is audit
reason := event.PolicyViolation
if er.PolicyResponse.ValidationFailureAction == Enforce {
reason = event.RequestBlocked
}
2019-08-26 13:34:42 -07:00
failedRules := er.GetFailedRules()
filedRulesStr := strings.Join(failedRules, ";")
if onUpdate {
var e event.Info
// UPDATE
// event on resource
e = event.NewEvent(
2019-08-26 13:34:42 -07:00
er.PolicyResponse.Resource.Kind,
er.PolicyResponse.Resource.APIVersion,
er.PolicyResponse.Resource.Namespace,
er.PolicyResponse.Resource.Name,
2019-11-18 17:13:48 -08:00
reason.String(),
event.AdmissionController,
2019-08-26 13:34:42 -07:00
event.FPolicyApplyBlockUpdate,
filedRulesStr,
er.PolicyResponse.Policy,
)
glog.V(4).Infof("UPDATE event on resource %s/%s/%s with policy %s", er.PolicyResponse.Resource.Kind, er.PolicyResponse.Resource.Namespace, er.PolicyResponse.Resource.Name, er.PolicyResponse.Policy)
events = append(events, e)
// event on policy
e = event.NewEvent(
"ClusterPolicy",
2019-08-26 13:34:42 -07:00
kyverno.SchemeGroupVersion.String(),
"",
er.PolicyResponse.Policy,
2019-11-18 17:13:48 -08:00
reason.String(),
event.AdmissionController,
2019-08-26 13:34:42 -07:00
event.FPolicyBlockResourceUpdate,
er.PolicyResponse.Resource.GetKey(),
2019-08-26 13:34:42 -07:00
filedRulesStr,
)
glog.V(4).Infof("UPDATE event on policy %s", er.PolicyResponse.Policy)
events = append(events, e)
2019-07-15 16:07:56 -07:00
} else {
2019-08-26 13:34:42 -07:00
// CREATE
// event on policy
e := event.NewEvent(
"ClusterPolicy",
2019-08-26 13:34:42 -07:00
kyverno.SchemeGroupVersion.String(),
"",
er.PolicyResponse.Policy,
reason.String(),
event.AdmissionController,
2019-08-26 13:34:42 -07:00
event.FPolicyApplyBlockCreate,
er.PolicyResponse.Resource.GetKey(),
2019-08-26 13:34:42 -07:00
filedRulesStr,
)
glog.V(4).Infof("CREATE event on policy %s", er.PolicyResponse.Policy)
events = append(events, e)
2019-07-15 16:07:56 -07:00
}
}
2019-08-26 13:34:42 -07:00
return events
}
if !onUpdate {
// All policies were applied successfully
2019-08-26 13:34:42 -07:00
// CREATE
for _, er := range engineResponses {
successRules := er.GetSuccessRules()
successRulesStr := strings.Join(successRules, ";")
// event on resource
e := event.NewEvent(
2019-08-26 13:34:42 -07:00
er.PolicyResponse.Resource.Kind,
er.PolicyResponse.Resource.APIVersion,
er.PolicyResponse.Resource.Namespace,
er.PolicyResponse.Resource.Name,
event.PolicyApplied.String(),
event.AdmissionController,
2019-08-26 13:34:42 -07:00
event.SRulesApply,
successRulesStr,
er.PolicyResponse.Policy,
)
events = append(events, e)
2019-07-15 16:07:56 -07:00
}
2019-08-26 13:34:42 -07:00
2019-07-15 16:07:56 -07:00
}
2019-08-26 13:34:42 -07:00
return events
}