2020-01-07 10:33:28 -08:00
package generate
import (
2022-11-29 14:59:40 +01:00
"context"
2020-02-04 12:13:41 -08:00
"encoding/json"
2020-01-07 10:33:28 -08:00
"fmt"
2020-12-08 01:34:46 +05:30
"strings"
2020-10-07 11:12:31 -07:00
"time"
2022-04-25 20:20:40 +08:00
"github.com/go-logr/logr"
2022-05-17 13:12:43 +02:00
kyvernov1 "github.com/kyverno/kyverno/api/kyverno/v1"
kyvernov1beta1 "github.com/kyverno/kyverno/api/kyverno/v1beta1"
2022-03-28 16:01:27 +02:00
"github.com/kyverno/kyverno/pkg/autogen"
2022-04-13 18:15:04 +05:30
"github.com/kyverno/kyverno/pkg/background/common"
2022-09-07 06:01:43 +02:00
"github.com/kyverno/kyverno/pkg/client/clientset/versioned"
2022-05-18 06:02:31 +02:00
kyvernov1listers "github.com/kyverno/kyverno/pkg/client/listers/kyverno/v1"
kyvernov1beta1listers "github.com/kyverno/kyverno/pkg/client/listers/kyverno/v1beta1"
2022-08-31 14:03:47 +08:00
"github.com/kyverno/kyverno/pkg/clients/dclient"
2020-10-07 11:12:31 -07:00
"github.com/kyverno/kyverno/pkg/config"
"github.com/kyverno/kyverno/pkg/engine"
2023-01-30 12:41:09 +01:00
engineapi "github.com/kyverno/kyverno/pkg/engine/api"
2022-11-29 14:59:40 +01:00
enginecontext "github.com/kyverno/kyverno/pkg/engine/context"
2023-04-13 13:29:40 +02:00
"github.com/kyverno/kyverno/pkg/engine/jmespath"
2020-10-07 11:12:31 -07:00
"github.com/kyverno/kyverno/pkg/engine/variables"
2022-04-25 20:20:40 +08:00
"github.com/kyverno/kyverno/pkg/event"
2023-03-11 01:17:10 +08:00
admissionutils "github.com/kyverno/kyverno/pkg/utils/admission"
2022-12-21 21:30:45 +01:00
engineutils "github.com/kyverno/kyverno/pkg/utils/engine"
2022-09-08 10:17:09 +05:30
kubeutils "github.com/kyverno/kyverno/pkg/utils/kube"
2023-03-27 16:44:12 +08:00
"github.com/pkg/errors"
2022-11-29 09:04:49 +01:00
"golang.org/x/exp/slices"
2023-03-11 01:17:10 +08:00
admissionv1 "k8s.io/api/admission/v1"
2020-01-09 17:53:27 -08:00
apierrors "k8s.io/apimachinery/pkg/api/errors"
2020-08-31 23:55:13 +05:30
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
2020-01-07 10:33:28 -08:00
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
2020-12-15 04:22:13 +05:30
"k8s.io/apimachinery/pkg/labels"
2023-04-04 16:31:06 +05:30
"k8s.io/apimachinery/pkg/runtime/schema"
2022-05-17 17:51:03 +02:00
corev1listers "k8s.io/client-go/listers/core/v1"
2022-03-29 18:34:33 +05:30
"k8s.io/client-go/tools/cache"
2020-01-07 10:33:28 -08:00
)
2022-04-13 18:15:04 +05:30
type GenerateController struct {
2022-05-24 12:27:26 +02:00
// clients
client dclient . Interface
2022-09-07 06:01:43 +02:00
kyvernoClient versioned . Interface
2022-04-13 18:15:04 +05:30
statusControl common . StatusControlInterface
2023-02-03 06:01:11 +01:00
engine engineapi . Engine
2022-04-13 18:15:04 +05:30
2022-05-24 12:27:26 +02:00
// listers
urLister kyvernov1beta1listers . UpdateRequestNamespaceLister
nsLister corev1listers . NamespaceLister
policyLister kyvernov1listers . ClusterPolicyLister
2022-05-18 06:02:31 +02:00
npolicyLister kyvernov1listers . PolicyLister
2022-04-13 18:15:04 +05:30
2023-02-03 06:01:11 +01:00
configuration config . Configuration
eventGen event . Interface
2022-08-31 14:03:47 +08:00
log logr . Logger
2023-04-13 13:29:40 +02:00
jp jmespath . Interface
2022-04-13 18:15:04 +05:30
}
2022-05-17 08:19:03 +02:00
// NewGenerateController returns an instance of the Generate-Request Controller
2022-04-13 18:15:04 +05:30
func NewGenerateController (
2022-05-03 07:30:04 +02:00
client dclient . Interface ,
2022-09-07 06:01:43 +02:00
kyvernoClient versioned . Interface ,
2022-05-24 12:27:26 +02:00
statusControl common . StatusControlInterface ,
2023-02-03 06:01:11 +01:00
engine engineapi . Engine ,
2022-05-18 06:02:31 +02:00
policyLister kyvernov1listers . ClusterPolicyLister ,
npolicyLister kyvernov1listers . PolicyLister ,
urLister kyvernov1beta1listers . UpdateRequestNamespaceLister ,
2022-05-17 17:51:03 +02:00
nsLister corev1listers . NamespaceLister ,
2022-05-04 18:05:03 +02:00
dynamicConfig config . Configuration ,
2022-05-24 12:27:26 +02:00
eventGen event . Interface ,
log logr . Logger ,
2023-04-13 13:29:40 +02:00
jp jmespath . Interface ,
2022-05-24 12:27:26 +02:00
) * GenerateController {
2022-04-13 18:15:04 +05:30
c := GenerateController {
2023-02-03 06:01:11 +01:00
client : client ,
kyvernoClient : kyvernoClient ,
statusControl : statusControl ,
engine : engine ,
policyLister : policyLister ,
npolicyLister : npolicyLister ,
urLister : urLister ,
nsLister : nsLister ,
configuration : dynamicConfig ,
eventGen : eventGen ,
log : log ,
2023-04-13 13:29:40 +02:00
jp : jp ,
2022-04-13 18:15:04 +05:30
}
2022-05-24 12:27:26 +02:00
return & c
2022-04-13 18:15:04 +05:30
}
2022-05-17 13:12:43 +02:00
func ( c * GenerateController ) ProcessUR ( ur * kyvernov1beta1 . UpdateRequest ) error {
2023-02-10 22:56:17 +08:00
logger := c . log . WithValues ( "name" , ur . GetName ( ) , "policy" , ur . Spec . GetPolicyKey ( ) , "resource" , ur . Spec . GetResource ( ) . String ( ) )
2020-01-07 15:13:57 -08:00
var err error
2022-05-17 13:12:43 +02:00
var genResources [ ] kyvernov1 . ResourceSpec
2022-05-17 12:26:12 +05:30
logger . Info ( "start processing UR" , "ur" , ur . Name , "resourceVersion" , ur . GetResourceVersion ( ) )
2020-07-20 08:00:02 -07:00
2023-03-11 01:17:10 +08:00
trigger , err := c . getTrigger ( ur . Spec )
2020-01-07 10:33:28 -08:00
if err != nil {
2023-03-11 01:17:10 +08:00
logger . V ( 3 ) . Info ( "the trigger resource does not exist or is pending creation, re-queueing" , "details" , err . Error ( ) )
2023-03-27 16:44:12 +08:00
if err := updateRetryAnnotation ( c . kyvernoClient , ur ) ; err != nil {
2023-02-10 18:22:11 +08:00
return err
}
2020-01-07 10:33:28 -08:00
}
2020-07-20 08:00:02 -07:00
2023-03-11 01:17:10 +08:00
if trigger == nil {
2020-11-20 14:14:59 -08:00
return nil
}
2023-03-11 01:17:10 +08:00
namespaceLabels := engineutils . GetNamespaceSelectorsFromNamespaceLister ( trigger . GetKind ( ) , trigger . GetNamespace ( ) , c . nsLister , logger )
genResources , err = c . applyGenerate ( * trigger , * ur , namespaceLabels )
2020-12-22 11:07:31 -08:00
if err != nil {
2022-04-29 19:05:49 +08:00
// Need not update the status when policy doesn't apply on resource, because all the update requests are removed by the cleanup controller
2020-12-22 11:07:31 -08:00
if strings . Contains ( err . Error ( ) , doesNotApply ) {
2022-04-29 19:05:49 +08:00
logger . V ( 4 ) . Info ( "skipping updating status of update request" )
2020-12-22 11:07:31 -08:00
return nil
}
2020-07-20 08:00:02 -07:00
2023-07-26 17:06:51 +03:00
policy , _ := c . getPolicySpec ( * ur )
events := event . NewBackgroundFailedEvent ( err , policy , ur . Spec . Rule , event . GeneratePolicyController ,
kyvernov1 . ResourceSpec { Kind : trigger . GetKind ( ) , Namespace : trigger . GetNamespace ( ) , Name : trigger . GetName ( ) } )
2020-12-22 11:07:31 -08:00
c . eventGen . Add ( events ... )
2020-12-08 01:34:46 +05:30
}
2023-03-01 23:49:05 +08:00
return updateStatus ( c . statusControl , * ur , err , genResources )
2020-01-07 10:33:28 -08:00
}
2020-12-22 11:07:31 -08:00
const doesNotApply = "policy does not apply to resource"
2023-03-11 01:17:10 +08:00
func ( c * GenerateController ) getTrigger ( spec kyvernov1beta1 . UpdateRequestSpec ) ( * unstructured . Unstructured , error ) {
2023-04-04 16:31:06 +05:30
admissionRequest := spec . Context . AdmissionRequestInfo . AdmissionRequest
if admissionRequest == nil {
return common . GetResource ( c . client , spec , c . log )
2023-03-11 01:17:10 +08:00
} else {
2023-04-04 16:31:06 +05:30
operation := spec . Context . AdmissionRequestInfo . Operation
if operation == admissionv1 . Delete {
2023-06-13 17:12:13 +08:00
return c . getTriggerForDeleteOperation ( spec )
2023-04-04 16:31:06 +05:30
} else if operation == admissionv1 . Create {
2023-06-13 17:12:13 +08:00
return c . getTriggerForCreateOperation ( spec )
2023-04-04 16:31:06 +05:30
} else {
newResource , oldResource , err := admissionutils . ExtractResources ( nil , * admissionRequest )
if err != nil {
c . log . Error ( err , "failed to extract resources from admission review request" )
return nil , err
}
trigger := & newResource
if newResource . Object == nil {
trigger = & oldResource
}
return trigger , nil
}
}
}
2023-06-13 17:12:13 +08:00
func ( c * GenerateController ) getTriggerForDeleteOperation ( spec kyvernov1beta1 . UpdateRequestSpec ) ( * unstructured . Unstructured , error ) {
2023-04-04 16:31:06 +05:30
request := spec . Context . AdmissionRequestInfo . AdmissionRequest
_ , oldResource , err := admissionutils . ExtractResources ( nil , * request )
if err != nil {
return nil , fmt . Errorf ( "failed to load resource from context: %w" , err )
}
labels := oldResource . GetLabels ( )
if labels [ common . GeneratePolicyLabel ] != "" {
// non-trigger deletion, get trigger from ur spec
c . log . V ( 4 ) . Info ( "non-trigger resource is deleted, fetching the trigger from the UR spec" , "trigger" , spec . Resource . String ( ) )
2023-03-11 01:17:10 +08:00
return common . GetResource ( c . client , spec , c . log )
}
2023-04-04 16:31:06 +05:30
return & oldResource , nil
}
2023-06-13 17:12:13 +08:00
func ( c * GenerateController ) getTriggerForCreateOperation ( spec kyvernov1beta1 . UpdateRequestSpec ) ( * unstructured . Unstructured , error ) {
2023-04-04 16:31:06 +05:30
admissionRequest := spec . Context . AdmissionRequestInfo . AdmissionRequest
trigger , err := common . GetResource ( c . client , spec , c . log )
if err != nil || trigger == nil {
if admissionRequest . SubResource == "" {
return nil , err
} else {
c . log . V ( 4 ) . Info ( "trigger resource not found for subresource, reverting to resource in AdmissionReviewRequest" , "subresource" , admissionRequest . SubResource )
newResource , _ , err := admissionutils . ExtractResources ( nil , * admissionRequest )
if err != nil {
c . log . Error ( err , "failed to extract resources from admission review request" )
return nil , err
}
trigger = & newResource
}
}
return trigger , err
2023-03-11 01:17:10 +08:00
}
2023-03-01 23:49:05 +08:00
func ( c * GenerateController ) applyGenerate ( resource unstructured . Unstructured , ur kyvernov1beta1 . UpdateRequest , namespaceLabels map [ string ] string ) ( [ ] kyvernov1 . ResourceSpec , error ) {
2023-02-10 22:56:17 +08:00
logger := c . log . WithValues ( "name" , ur . GetName ( ) , "policy" , ur . Spec . GetPolicyKey ( ) , "resource" , ur . Spec . GetResource ( ) . String ( ) )
2020-12-01 12:30:08 -08:00
logger . V ( 3 ) . Info ( "applying generate policy rule" )
2022-04-29 19:05:49 +08:00
policy , err := c . getPolicySpec ( ur )
2023-03-01 11:48:18 +08:00
if err != nil && ! apierrors . IsNotFound ( err ) {
2020-11-12 16:44:57 -08:00
logger . Error ( err , "error in fetching policy" )
2023-03-01 23:49:05 +08:00
return nil , err
2020-01-07 10:33:28 -08:00
}
2020-07-08 14:22:32 -07:00
2023-03-01 11:48:18 +08:00
if ur . Spec . DeleteDownstream || apierrors . IsNotFound ( err ) {
err = c . deleteDownstream ( policy , & ur )
2023-03-01 23:49:05 +08:00
return nil , err
2023-03-01 11:48:18 +08:00
}
2023-04-13 13:29:40 +02:00
policyContext , err := common . NewBackgroundContext ( logger , c . client , & ur , policy , & resource , c . configuration , c . jp , namespaceLabels )
2020-01-24 09:37:12 -08:00
if err != nil {
2023-03-01 23:49:05 +08:00
return nil , err
2020-01-07 10:33:28 -08:00
}
2023-04-04 16:31:06 +05:30
admissionRequest := ur . Spec . Context . AdmissionRequestInfo . AdmissionRequest
if admissionRequest != nil {
var gvk schema . GroupVersionKind
gvk , err = c . client . Discovery ( ) . GetGVKFromGVR ( schema . GroupVersionResource ( admissionRequest . Resource ) )
if err != nil {
return nil , err
}
policyContext = policyContext . WithResourceKind ( gvk , admissionRequest . SubResource )
}
2020-01-07 10:33:28 -08:00
// check if the policy still applies to the resource
2023-04-03 06:57:48 +02:00
engineResponse := c . engine . Generate ( context . Background ( ) , policyContext )
2020-01-07 10:33:28 -08:00
if len ( engineResponse . PolicyResponse . Rules ) == 0 {
2020-12-22 11:07:31 -08:00
logger . V ( 4 ) . Info ( doesNotApply )
2023-03-01 23:49:05 +08:00
return nil , errors . New ( doesNotApply )
2020-01-07 10:33:28 -08:00
}
2020-09-19 01:04:43 +05:30
2020-12-15 15:21:39 -08:00
var applicableRules [ ] string
2022-04-29 19:05:49 +08:00
// Removing UR if rule is failed. Used when the generate condition failed but ur exist
2020-09-04 03:04:23 +05:30
for _ , r := range engineResponse . PolicyResponse . Rules {
2023-04-05 12:35:38 +02:00
if r . Status ( ) != engineapi . RuleStatusPass {
2022-04-29 19:05:49 +08:00
logger . V ( 4 ) . Info ( "querying all update requests" )
2020-12-15 04:22:13 +05:30
selector := labels . SelectorFromSet ( labels . Set ( map [ string ] string {
2023-05-03 07:05:01 +02:00
kyvernov1beta1 . URGeneratePolicyLabel : engineResponse . Policy ( ) . GetName ( ) ,
2023-02-10 15:04:41 +01:00
kyvernov1beta1 . URGenerateResourceNameLabel : engineResponse . Resource . GetName ( ) ,
kyvernov1beta1 . URGenerateResourceKindLabel : engineResponse . Resource . GetKind ( ) ,
kyvernov1beta1 . URGenerateResourceNSLabel : engineResponse . Resource . GetNamespace ( ) ,
2020-12-15 04:22:13 +05:30
} ) )
2022-04-29 19:05:49 +08:00
urList , err := c . urLister . List ( selector )
2020-08-31 23:55:13 +05:30
if err != nil {
2023-02-10 15:04:41 +01:00
logger . Error ( err , "failed to get update request for the resource" , "kind" , engineResponse . Resource . GetKind ( ) , "name" , engineResponse . Resource . GetName ( ) , "namespace" , engineResponse . Resource . GetNamespace ( ) )
2020-08-31 23:55:13 +05:30
continue
}
2020-11-12 16:44:57 -08:00
2022-04-29 19:05:49 +08:00
for _ , v := range urList {
2022-11-29 14:59:40 +01:00
err := c . kyvernoClient . KyvernoV1beta1 ( ) . UpdateRequests ( config . KyvernoNamespace ( ) ) . Delete ( context . TODO ( ) , v . GetName ( ) , metav1 . DeleteOptions { } )
2020-12-15 15:21:39 -08:00
if err != nil {
2022-04-29 19:05:49 +08:00
logger . Error ( err , "failed to delete update request" )
2020-08-31 23:55:13 +05:30
}
}
2020-12-15 15:21:39 -08:00
} else {
2023-04-05 12:35:38 +02:00
applicableRules = append ( applicableRules , r . Name ( ) )
2020-08-31 23:55:13 +05:30
}
}
2020-09-04 03:04:23 +05:30
2020-01-07 10:33:28 -08:00
// Apply the generate rule on resource
2023-07-10 14:22:28 +03:00
genResources , err := c . ApplyGeneratePolicy ( logger , policyContext , ur , applicableRules )
// generate events.
if err == nil {
for _ , res := range genResources {
e := event . NewResourceGenerationEvent ( ur . Spec . Policy , ur . Spec . Rule , event . GeneratePolicyController , res )
c . eventGen . Add ( e )
}
2023-07-26 17:06:51 +03:00
e := event . NewBackgroundSuccessEvent ( event . GeneratePolicyController , policy , genResources )
2023-07-10 14:22:28 +03:00
c . eventGen . Add ( e ... )
}
return genResources , err
2020-01-07 10:33:28 -08:00
}
2022-03-29 18:34:33 +05:30
// getPolicySpec gets the policy spec from the ClusterPolicy/Policy
2023-02-22 18:49:09 +08:00
func ( c * GenerateController ) getPolicySpec ( ur kyvernov1beta1 . UpdateRequest ) ( kyvernov1 . PolicyInterface , error ) {
2022-04-29 19:05:49 +08:00
pNamespace , pName , err := cache . SplitMetaNamespaceKey ( ur . Spec . Policy )
2022-03-29 18:34:33 +05:30
if err != nil {
2023-02-22 18:49:09 +08:00
return nil , err
2022-03-29 18:34:33 +05:30
}
if pNamespace == "" {
policyObj , err := c . policyLister . Get ( pName )
if err != nil {
2023-02-22 18:49:09 +08:00
return nil , err
2022-03-29 18:34:33 +05:30
}
2023-02-22 18:49:09 +08:00
return policyObj , err
2022-03-29 18:34:33 +05:30
}
2022-09-08 10:17:09 +05:30
npolicyObj , err := c . npolicyLister . Policies ( pNamespace ) . Get ( pName )
if err != nil {
2023-02-22 18:49:09 +08:00
return nil , err
}
return npolicyObj , nil
2022-03-29 18:34:33 +05:30
}
2023-03-01 23:49:05 +08:00
func updateStatus ( statusControl common . StatusControlInterface , ur kyvernov1beta1 . UpdateRequest , err error , genResources [ ] kyvernov1 . ResourceSpec ) error {
2020-01-07 10:33:28 -08:00
if err != nil {
2022-05-19 18:06:56 +02:00
if _ , err := statusControl . Failed ( ur . GetName ( ) , err . Error ( ) , genResources ) ; err != nil {
return err
}
} else {
if _ , err := statusControl . Success ( ur . GetName ( ) , genResources ) ; err != nil {
return err
}
2020-01-07 10:33:28 -08:00
}
2022-05-19 18:06:56 +02:00
return nil
2020-01-07 10:33:28 -08:00
}
2023-03-01 23:49:05 +08:00
func ( c * GenerateController ) ApplyGeneratePolicy ( log logr . Logger , policyContext * engine . PolicyContext , ur kyvernov1beta1 . UpdateRequest , applicableRules [ ] string ) ( genResources [ ] kyvernov1 . ResourceSpec , err error ) {
2020-01-07 10:33:28 -08:00
// Get the response as the actions to be performed on the resource
// - - substitute values
2022-12-02 09:14:23 +01:00
policy := policyContext . Policy ( )
resource := policyContext . NewResource ( )
jsonContext := policyContext . JSONContext ( )
2020-08-31 23:55:13 +05:30
// To manage existing resources, we compare the creation time for the default resource to be generated and policy creation time
2020-03-04 13:11:48 +05:30
ruleNameToProcessingTime := make ( map [ string ] time . Duration )
2022-12-02 09:14:23 +01:00
applyRules := policy . GetSpec ( ) . GetApplyRules ( )
2022-07-29 00:02:26 -07:00
applyCount := 0
2022-03-30 15:04:30 +02:00
for _ , rule := range autogen . ComputeRules ( policy ) {
2021-04-13 21:44:43 +03:00
var err error
2020-01-07 10:33:28 -08:00
if ! rule . HasGenerate ( ) {
continue
}
2020-09-04 03:04:23 +05:30
2022-11-29 09:04:49 +01:00
if ! slices . Contains ( applicableRules , rule . Name ) {
2020-12-15 15:21:39 -08:00
continue
}
2020-11-12 16:44:57 -08:00
startTime := time . Now ( )
2022-09-08 10:17:09 +05:30
var genResource [ ] kyvernov1 . ResourceSpec
2022-07-29 00:02:26 -07:00
if applyRules == kyvernov1 . ApplyOne && applyCount > 0 {
break
}
2020-09-23 02:41:49 +05:30
// add configmap json data to context
2023-02-08 06:55:03 +01:00
if err := c . engine . ContextLoader ( policyContext . Policy ( ) , rule ) ( context . TODO ( ) , rule . Context , policyContext . JSONContext ( ) ) ; err != nil {
2021-04-13 21:44:43 +03:00
log . Error ( err , "cannot add configmaps to context" )
2023-03-01 23:49:05 +08:00
return nil , err
2021-04-13 21:44:43 +03:00
}
2022-12-02 09:14:23 +01:00
if rule , err = variables . SubstituteAllInRule ( log , policyContext . JSONContext ( ) , rule ) ; err != nil {
2021-04-13 21:44:43 +03:00
log . Error ( err , "variable substitution failed for rule %s" , rule . Name )
2023-03-01 23:49:05 +08:00
return nil , err
2020-01-07 10:33:28 -08:00
}
2022-05-09 12:43:11 +05:30
2023-03-01 23:49:05 +08:00
genResource , err = applyRule ( log , c . client , rule , resource , jsonContext , policy , ur )
if err != nil {
log . Error ( err , "failed to apply generate rule" , "policy" , policy . GetName ( ) ,
"rule" , rule . Name , "resource" , resource . GetName ( ) , "suggestion" , "users need to grant Kyverno's service account additional privileges" )
return nil , err
2022-05-09 12:43:11 +05:30
}
2023-03-01 23:49:05 +08:00
ruleNameToProcessingTime [ rule . Name ] = time . Since ( startTime )
genResources = append ( genResources , genResource ... )
2022-07-29 00:02:26 -07:00
applyCount ++
2020-01-07 10:33:28 -08:00
}
2023-03-01 23:49:05 +08:00
return genResources , nil
2020-01-07 10:33:28 -08:00
}
2023-03-11 01:17:10 +08:00
func applyRule ( log logr . Logger , client dclient . Interface , rule kyvernov1 . Rule , trigger unstructured . Unstructured , ctx enginecontext . EvalInterface , policy kyvernov1 . PolicyInterface , ur kyvernov1beta1 . UpdateRequest ) ( [ ] kyvernov1 . ResourceSpec , error ) {
2023-06-06 18:07:07 +08:00
responses := [ ] generateResponse { }
2020-01-07 10:33:28 -08:00
var err error
2022-09-08 10:17:09 +05:30
var newGenResources [ ] kyvernov1 . ResourceSpec
2020-12-14 02:43:16 -08:00
2023-06-06 18:07:07 +08:00
target := rule . Generation . ResourceSpec
logger := log . WithValues ( "target" , target . String ( ) )
2020-12-14 02:43:16 -08:00
2022-09-08 10:17:09 +05:30
if rule . Generation . Clone . Name != "" {
2023-06-06 18:07:07 +08:00
resp := manageClone ( logger . WithValues ( "type" , "clone" ) , target , kyvernov1 . ResourceSpec { } , policy , ur , rule , client )
responses = append ( responses , resp )
2022-09-08 10:17:09 +05:30
} else if len ( rule . Generation . CloneList . Kinds ) != 0 {
2023-06-06 18:07:07 +08:00
responses = manageCloneList ( logger . WithValues ( "type" , "cloneList" ) , target . GetNamespace ( ) , ur , policy , rule , client )
2020-02-13 13:57:48 -08:00
} else {
2023-06-06 18:07:07 +08:00
resp := manageData ( logger . WithValues ( "type" , "data" ) , target , rule . Generation . RawData , rule . Generation . Synchronize , ur , client )
responses = append ( responses , resp )
2022-09-08 10:17:09 +05:30
}
2023-06-06 18:07:07 +08:00
for _ , response := range responses {
targetMeta := response . GetTarget ( )
if response . GetError ( ) != nil {
logger . Error ( response . GetError ( ) , "failed to generate resource" , "mode" , response . GetAction ( ) )
2022-09-08 10:17:09 +05:30
return newGenResources , err
}
2020-12-14 02:43:16 -08:00
2023-06-06 18:07:07 +08:00
if response . GetAction ( ) == Skip {
2022-09-08 10:17:09 +05:30
continue
}
2022-05-09 12:43:11 +05:30
2023-06-06 18:07:07 +08:00
logger . V ( 3 ) . Info ( "applying generate rule" , "mode" , response . GetAction ( ) )
if response . GetData ( ) == nil && response . GetAction ( ) == Update {
2022-09-08 10:17:09 +05:30
logger . V ( 4 ) . Info ( "no changes required for generate target resource" )
return newGenResources , nil
}
2022-05-09 12:43:11 +05:30
2022-09-08 10:17:09 +05:30
newResource := & unstructured . Unstructured { }
2023-06-06 18:07:07 +08:00
newResource . SetUnstructuredContent ( response . GetData ( ) )
newResource . SetName ( targetMeta . GetName ( ) )
newResource . SetNamespace ( targetMeta . GetNamespace ( ) )
2022-09-08 10:17:09 +05:30
if newResource . GetKind ( ) == "" {
2023-06-06 18:07:07 +08:00
newResource . SetKind ( targetMeta . GetKind ( ) )
2020-09-04 03:04:23 +05:30
}
2020-12-14 02:43:16 -08:00
2023-06-06 18:07:07 +08:00
newResource . SetAPIVersion ( targetMeta . GetAPIVersion ( ) )
2023-03-11 01:17:10 +08:00
common . ManageLabels ( newResource , trigger , policy , rule . Name )
2023-06-06 18:07:07 +08:00
if response . GetAction ( ) == Create {
2022-09-08 10:17:09 +05:30
newResource . SetResourceVersion ( "" )
2023-06-06 18:07:07 +08:00
_ , err = client . CreateResource ( context . TODO ( ) , targetMeta . GetAPIVersion ( ) , targetMeta . GetKind ( ) , targetMeta . GetNamespace ( ) , newResource , false )
2022-09-08 10:17:09 +05:30
if err != nil {
if ! apierrors . IsAlreadyExists ( err ) {
return newGenResources , err
2021-10-29 14:54:39 +05:30
}
2022-09-08 10:17:09 +05:30
}
logger . V ( 2 ) . Info ( "created generate target resource" )
2023-06-06 18:07:07 +08:00
newGenResources = append ( newGenResources , targetMeta )
} else if response . GetAction ( ) == Update {
generatedObj , err := client . GetResource ( context . TODO ( ) , targetMeta . GetAPIVersion ( ) , targetMeta . GetKind ( ) , targetMeta . GetNamespace ( ) , targetMeta . GetName ( ) )
2022-09-08 10:17:09 +05:30
if err != nil {
2023-06-06 18:07:07 +08:00
logger . V ( 2 ) . Info ( "target resource not found, creating new target" )
_ , err = client . CreateResource ( context . TODO ( ) , targetMeta . GetAPIVersion ( ) , targetMeta . GetKind ( ) , targetMeta . GetNamespace ( ) , newResource , false )
2022-09-08 10:17:09 +05:30
if err != nil {
return newGenResources , err
2021-10-29 14:54:39 +05:30
}
2023-06-06 18:07:07 +08:00
newGenResources = append ( newGenResources , targetMeta )
2022-09-08 10:17:09 +05:30
} else {
2023-06-06 18:07:07 +08:00
if ! rule . Generation . Synchronize {
logger . V ( 4 ) . Info ( "synchronize disabled, skip syncing changes" )
}
logger . V ( 4 ) . Info ( "updating existing resource" )
if targetMeta . GetAPIVersion ( ) == "" {
generatedResourceAPIVersion := generatedObj . GetAPIVersion ( )
newResource . SetAPIVersion ( generatedResourceAPIVersion )
}
if targetMeta . GetNamespace ( ) == "" {
newResource . SetNamespace ( "default" )
2021-08-13 17:23:39 +05:30
}
2022-09-08 10:17:09 +05:30
2023-06-06 18:07:07 +08:00
_ , err = client . UpdateResource ( context . TODO ( ) , targetMeta . GetAPIVersion ( ) , targetMeta . GetKind ( ) , targetMeta . GetNamespace ( ) , newResource , false )
if err != nil {
logger . Error ( err , "failed to update resource" )
return newGenResources , err
2022-09-08 10:17:09 +05:30
}
}
2023-06-06 18:07:07 +08:00
logger . V ( 3 ) . Info ( "updated generate target resource" )
2022-09-08 10:17:09 +05:30
}
}
2023-06-06 18:07:07 +08:00
return newGenResources , nil
2022-09-08 10:17:09 +05:30
}
2022-05-25 19:56:22 +05:30
func GetUnstrRule ( rule * kyvernov1 . Generation ) ( * unstructured . Unstructured , error ) {
2020-02-13 13:57:48 -08:00
ruleData , err := json . Marshal ( rule )
if err != nil {
return nil , err
}
2023-01-03 13:02:15 +01:00
return kubeutils . BytesToUnstructured ( ruleData )
2020-01-07 10:33:28 -08:00
}
2022-05-18 00:10:47 +08:00
2022-05-25 19:56:22 +05:30
// NewGenerateControllerWithOnlyClient returns an instance of Controller with only the client.
2023-02-03 06:01:11 +01:00
func NewGenerateControllerWithOnlyClient ( client dclient . Interface , engine engineapi . Engine ) * GenerateController {
2022-05-25 19:56:22 +05:30
c := GenerateController {
2023-02-03 06:01:11 +01:00
client : client ,
engine : engine ,
2022-05-25 19:56:22 +05:30
}
return & c
}
// GetUnstrResource converts ResourceSpec object to type Unstructured
func ( c * GenerateController ) GetUnstrResource ( genResourceSpec kyvernov1 . ResourceSpec ) ( * unstructured . Unstructured , error ) {
2022-11-29 14:59:40 +01:00
resource , err := c . client . GetResource ( context . TODO ( ) , genResourceSpec . APIVersion , genResourceSpec . Kind , genResourceSpec . Namespace , genResourceSpec . Name )
2022-05-25 19:56:22 +05:30
if err != nil {
return nil , err
}
return resource , nil
}