1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-06 16:06:56 +00:00
kyverno/pkg/policy/background.go

169 lines
4 KiB
Go
Raw Normal View History

package policy
import (
"encoding/json"
"fmt"
gojmespath "github.com/jmespath/go-jmespath"
kyverno "github.com/kyverno/kyverno/pkg/api/kyverno/v1"
"github.com/kyverno/kyverno/pkg/engine/context"
"github.com/kyverno/kyverno/pkg/engine/variables"
"github.com/kyverno/kyverno/pkg/utils"
"k8s.io/apiextensions-apiserver/pkg/apis/apiextensions"
2020-03-17 16:25:34 -07:00
"sigs.k8s.io/controller-runtime/pkg/log"
)
//ContainsVariablesOtherThanObject returns error if variable that does not start from request.object
func ContainsVariablesOtherThanObject(policy kyverno.ClusterPolicy) error {
2020-02-14 11:59:28 -08:00
var err error
for idx, rule := range policy.Spec.Rules {
2020-02-14 11:59:28 -08:00
if path := userInfoDefined(rule.MatchResources.UserInfo); path != "" {
return fmt.Errorf("invalid variable used at path: spec/rules[%d]/match/%s", idx, path)
}
2020-02-14 11:59:28 -08:00
if path := userInfoDefined(rule.ExcludeResources.UserInfo); path != "" {
return fmt.Errorf("invalid variable used at path: spec/rules[%d]/exclude/%s", idx, path)
}
filterVars := []string{"request.object", "request.namespace", "images"}
2020-02-14 11:59:28 -08:00
ctx := context.NewContext(filterVars...)
for _, contextEntry := range rule.Context {
if contextEntry.APICall != nil {
ctx.AddBuiltInVars(contextEntry.Name)
}
if contextEntry.ConfigMap != nil {
ctx.AddBuiltInVars(contextEntry.Name)
}
}
err = validateBackgroundModeVars(ctx, rule)
if err != nil {
return err
}
if rule, err = variables.SubstituteAllInRule(log.Log, ctx, rule); !checkNotFoundErr(err) {
return fmt.Errorf("variable substitution failed for rule %s: %s", rule.Name, err.Error())
}
if rule.AnyAllConditions != nil {
if err = validatePreConditions(idx, ctx, rule.AnyAllConditions); !checkNotFoundErr(err) {
return err
593 feature (#594) * initial commit * background policy validation * correct message * skip non-background policy process for add/update * add Generate Request CR * generate Request Generator Initial * test generate request CR generation * initial commit gr generator * generate controller initial framework * add crd for generate request * gr cleanup controller initial commit * cleanup controller initial * generate mid-commit * generate rule processing * create PV on generate error * embed resource type * testing phase 1- generate resources with variable substitution * fix tests * comment broken test #586 * add printer column for state * return if existing resource for clone * set resync time to 2 mins & remove resource version check in update handler for gr * generate events for reporting * fix logs * initial commit * fix trailing quote in patch * remove comments * initial condition (equal & notequal) * initial support for conditions * initial support fo conditions in generate * support precondition checks * cleanup * re-evaluate GR on namespace update using dynamic informers * add status for generated resources * display loaded variable SA * support delete cleanup of generate request main resources * fix log * remove namespace from SA username * support multiple variables per statement for scalar values * fix fail variables * add check for userInfo * validation checks for conditions * update policy * refactor logs * code review * add openapispec for clusterpolicy preconditions * Update documentation * CR fixes * documentation * CR fixes * update variable * fix logs * update policy * pre-defined variables (serviceAccountName & serviceAccountNamespace) * update test
2020-01-07 15:13:57 -08:00
}
}
if rule.Validation.Deny != nil {
if err = validateDenyConditions(idx, ctx, rule.Validation.Deny.AnyAllConditions); !checkNotFoundErr(err) {
return err
}
}
}
2020-11-13 16:25:51 -08:00
return nil
}
func validatePreConditions(idx int, ctx context.EvalInterface, anyAllConditions apiextensions.JSON) error {
var err error
anyAllConditions, err = substituteVarsInJSON(ctx, anyAllConditions)
if err != nil {
return err
}
_, err = utils.ApiextensionsJsonToKyvernoConditions(anyAllConditions)
if err != nil {
return err
}
return nil
}
func validateDenyConditions(idx int, ctx context.EvalInterface, denyConditions apiextensions.JSON) error {
var err error
denyConditions, err = substituteVarsInJSON(ctx, denyConditions)
if err != nil {
return err
}
_, err = utils.ApiextensionsJsonToKyvernoConditions(denyConditions)
if err != nil {
return err
}
return nil
}
2020-05-06 22:27:06 +05:30
func checkNotFoundErr(err error) bool {
if err != nil {
2020-05-13 10:06:21 +05:30
switch err.(type) {
case gojmespath.NotFoundError:
2020-05-06 22:27:06 +05:30
return true
case context.InvalidVariableErr:
// non-white-listed variable is found
return false
2020-05-13 10:06:21 +05:30
default:
2020-05-06 22:27:06 +05:30
return false
}
}
2020-05-13 10:06:21 +05:30
2020-05-06 22:27:06 +05:30
return true
}
2020-02-14 11:59:28 -08:00
func userInfoDefined(ui kyverno.UserInfo) string {
if len(ui.Roles) > 0 {
2020-02-14 11:59:28 -08:00
return "roles"
}
if len(ui.ClusterRoles) > 0 {
2020-02-14 11:59:28 -08:00
return "clusterRoles"
}
if len(ui.Subjects) > 0 {
2020-02-14 11:59:28 -08:00
return "subjects"
}
2020-02-14 11:59:28 -08:00
return ""
}
func validateBackgroundModeVars(ctx context.EvalInterface, document apiextensions.JSON) error {
jsonByte, err := json.Marshal(document)
if err != nil {
return err
}
var jsonInterface interface{}
err = json.Unmarshal(jsonByte, &jsonInterface)
if err != nil {
return err
}
_, err = variables.ValidateBackgroundModeVars(log.Log, ctx, jsonInterface)
return err
}
func substituteVarsInJSON(ctx context.EvalInterface, document apiextensions.JSON) (apiextensions.JSON, error) {
jsonByte, err := json.Marshal(document)
if err != nil {
return nil, err
}
var jsonInterface interface{}
err = json.Unmarshal(jsonByte, &jsonInterface)
if err != nil {
return nil, err
}
jsonInterface, err = variables.SubstituteAll(log.Log, ctx, jsonInterface)
if err != nil {
return nil, err
}
jsonByte, err = json.Marshal(jsonInterface)
if err != nil {
return nil, err
}
err = json.Unmarshal(jsonByte, &document)
if err != nil {
return nil, err
}
return document, nil
}