2024-01-31 00:08:47 +01:00
|
|
|
package aggregate
|
2023-09-20 08:51:32 +02:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/go-logr/logr"
|
|
|
|
kyvernov1 "github.com/kyverno/kyverno/api/kyverno/v1"
|
|
|
|
kyvernov1alpha2 "github.com/kyverno/kyverno/api/kyverno/v1alpha2"
|
|
|
|
policyreportv1alpha2 "github.com/kyverno/kyverno/api/policyreport/v1alpha2"
|
2024-01-30 15:53:37 +01:00
|
|
|
reportsv1 "github.com/kyverno/kyverno/api/reports/v1"
|
2023-09-20 08:51:32 +02:00
|
|
|
"github.com/kyverno/kyverno/pkg/autogen"
|
|
|
|
"github.com/kyverno/kyverno/pkg/client/clientset/versioned"
|
|
|
|
kyvernov1informers "github.com/kyverno/kyverno/pkg/client/informers/externalversions/kyverno/v1"
|
|
|
|
kyvernov1listers "github.com/kyverno/kyverno/pkg/client/listers/kyverno/v1"
|
2024-02-08 11:36:01 +01:00
|
|
|
"github.com/kyverno/kyverno/pkg/clients/dclient"
|
2023-09-20 08:51:32 +02:00
|
|
|
"github.com/kyverno/kyverno/pkg/controllers"
|
|
|
|
controllerutils "github.com/kyverno/kyverno/pkg/utils/controller"
|
|
|
|
reportutils "github.com/kyverno/kyverno/pkg/utils/report"
|
|
|
|
corev1 "k8s.io/api/core/v1"
|
|
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
2024-02-08 11:36:01 +01:00
|
|
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
2023-09-20 08:51:32 +02:00
|
|
|
"k8s.io/apimachinery/pkg/labels"
|
|
|
|
"k8s.io/apimachinery/pkg/types"
|
|
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
2024-02-08 11:36:01 +01:00
|
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
|
|
"k8s.io/client-go/dynamic"
|
2023-09-20 10:32:38 +02:00
|
|
|
admissionregistrationv1alpha1informers "k8s.io/client-go/informers/admissionregistration/v1alpha1"
|
|
|
|
admissionregistrationv1alpha1listers "k8s.io/client-go/listers/admissionregistration/v1alpha1"
|
2023-09-20 08:51:32 +02:00
|
|
|
metadatainformers "k8s.io/client-go/metadata/metadatainformer"
|
|
|
|
"k8s.io/client-go/tools/cache"
|
|
|
|
"k8s.io/client-go/util/workqueue"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
// Workers is the number of workers for this controller
|
|
|
|
Workers = 10
|
2024-01-31 00:08:47 +01:00
|
|
|
ControllerName = "aggregate-report-controller"
|
2023-09-20 08:51:32 +02:00
|
|
|
maxRetries = 10
|
|
|
|
enqueueDelay = 10 * time.Second
|
2024-02-08 11:36:01 +01:00
|
|
|
deletionGrace = time.Minute * 2
|
2023-09-20 08:51:32 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
type controller struct {
|
|
|
|
// clients
|
2024-02-08 11:36:01 +01:00
|
|
|
client versioned.Interface
|
|
|
|
dclient dclient.Interface
|
2023-09-20 08:51:32 +02:00
|
|
|
|
|
|
|
// listers
|
2024-02-08 11:36:01 +01:00
|
|
|
polLister kyvernov1listers.PolicyLister
|
|
|
|
cpolLister kyvernov1listers.ClusterPolicyLister
|
|
|
|
vapLister admissionregistrationv1alpha1listers.ValidatingAdmissionPolicyLister
|
|
|
|
ephrLister cache.GenericLister
|
|
|
|
cephrLister cache.GenericLister
|
2023-09-20 08:51:32 +02:00
|
|
|
|
2024-02-08 11:36:01 +01:00
|
|
|
// queues
|
|
|
|
frontQueue workqueue.RateLimitingInterface
|
|
|
|
backQueue workqueue.RateLimitingInterface
|
2023-09-20 08:51:32 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
type policyMapEntry struct {
|
|
|
|
policy kyvernov1.PolicyInterface
|
|
|
|
rules sets.Set[string]
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewController(
|
|
|
|
client versioned.Interface,
|
2024-02-08 11:36:01 +01:00
|
|
|
dclient dclient.Interface,
|
2023-09-20 08:51:32 +02:00
|
|
|
metadataFactory metadatainformers.SharedInformerFactory,
|
|
|
|
polInformer kyvernov1informers.PolicyInformer,
|
|
|
|
cpolInformer kyvernov1informers.ClusterPolicyInformer,
|
2023-09-20 10:32:38 +02:00
|
|
|
vapInformer admissionregistrationv1alpha1informers.ValidatingAdmissionPolicyInformer,
|
2023-09-20 08:51:32 +02:00
|
|
|
) controllers.Controller {
|
2024-01-30 15:53:37 +01:00
|
|
|
ephrInformer := metadataFactory.ForResource(reportsv1.SchemeGroupVersion.WithResource("ephemeralreports"))
|
|
|
|
cephrInformer := metadataFactory.ForResource(reportsv1.SchemeGroupVersion.WithResource("clusterephemeralreports"))
|
2023-09-20 08:51:32 +02:00
|
|
|
polrInformer := metadataFactory.ForResource(policyreportv1alpha2.SchemeGroupVersion.WithResource("policyreports"))
|
|
|
|
cpolrInformer := metadataFactory.ForResource(policyreportv1alpha2.SchemeGroupVersion.WithResource("clusterpolicyreports"))
|
|
|
|
c := controller{
|
2024-02-08 11:36:01 +01:00
|
|
|
client: client,
|
|
|
|
dclient: dclient,
|
|
|
|
polLister: polInformer.Lister(),
|
|
|
|
cpolLister: cpolInformer.Lister(),
|
|
|
|
ephrLister: ephrInformer.Lister(),
|
|
|
|
cephrLister: cephrInformer.Lister(),
|
|
|
|
frontQueue: workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), ControllerName),
|
|
|
|
backQueue: workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), ControllerName),
|
|
|
|
}
|
|
|
|
if _, _, err := controllerutils.AddDelayedDefaultEventHandlers(logger, ephrInformer.Informer(), c.frontQueue, enqueueDelay); err != nil {
|
|
|
|
logger.Error(err, "failed to register event handlers")
|
|
|
|
}
|
|
|
|
if _, _, err := controllerutils.AddDelayedDefaultEventHandlers(logger, cephrInformer.Informer(), c.frontQueue, enqueueDelay); err != nil {
|
|
|
|
logger.Error(err, "failed to register event handlers")
|
2023-09-20 08:51:32 +02:00
|
|
|
}
|
|
|
|
enqueueAll := func() {
|
|
|
|
if list, err := polrInformer.Lister().List(labels.Everything()); err == nil {
|
|
|
|
for _, item := range list {
|
2024-02-08 11:36:01 +01:00
|
|
|
c.backQueue.AddAfter(controllerutils.MetaObjectToName(item.(*metav1.PartialObjectMetadata)), enqueueDelay)
|
2023-09-20 08:51:32 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if list, err := cpolrInformer.Lister().List(labels.Everything()); err == nil {
|
|
|
|
for _, item := range list {
|
2024-02-08 11:36:01 +01:00
|
|
|
c.backQueue.AddAfter(controllerutils.MetaObjectToName(item.(*metav1.PartialObjectMetadata)), enqueueDelay)
|
2023-09-20 08:51:32 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, err := controllerutils.AddEventHandlersT(
|
|
|
|
polInformer.Informer(),
|
|
|
|
func(_ metav1.Object) { enqueueAll() },
|
|
|
|
func(_, _ metav1.Object) { enqueueAll() },
|
|
|
|
func(_ metav1.Object) { enqueueAll() },
|
|
|
|
); err != nil {
|
|
|
|
logger.Error(err, "failed to register event handlers")
|
|
|
|
}
|
|
|
|
if _, err := controllerutils.AddEventHandlersT(
|
|
|
|
cpolInformer.Informer(),
|
|
|
|
func(_ metav1.Object) { enqueueAll() },
|
|
|
|
func(_, _ metav1.Object) { enqueueAll() },
|
|
|
|
func(_ metav1.Object) { enqueueAll() },
|
|
|
|
); err != nil {
|
|
|
|
logger.Error(err, "failed to register event handlers")
|
|
|
|
}
|
2023-09-20 10:32:38 +02:00
|
|
|
if vapInformer != nil {
|
|
|
|
c.vapLister = vapInformer.Lister()
|
|
|
|
if _, err := controllerutils.AddEventHandlersT(
|
|
|
|
vapInformer.Informer(),
|
|
|
|
func(_ metav1.Object) { enqueueAll() },
|
|
|
|
func(_, _ metav1.Object) { enqueueAll() },
|
|
|
|
func(_ metav1.Object) { enqueueAll() },
|
|
|
|
); err != nil {
|
|
|
|
logger.Error(err, "failed to register event handlers")
|
|
|
|
}
|
|
|
|
}
|
2023-09-20 08:51:32 +02:00
|
|
|
return &c
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) Run(ctx context.Context, workers int) {
|
2024-02-08 11:36:01 +01:00
|
|
|
var group wait.Group
|
|
|
|
group.StartWithContext(ctx, func(ctx context.Context) {
|
|
|
|
controllerutils.Run(ctx, logger, ControllerName, time.Second, c.frontQueue, workers, maxRetries, c.frontReconcile)
|
|
|
|
})
|
|
|
|
group.StartWithContext(ctx, func(ctx context.Context) {
|
|
|
|
controllerutils.Run(ctx, logger, ControllerName, time.Second, c.backQueue, workers, maxRetries, c.backReconcile)
|
|
|
|
})
|
|
|
|
group.Wait()
|
2023-09-20 08:51:32 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) createPolicyMap() (map[string]policyMapEntry, error) {
|
|
|
|
results := map[string]policyMapEntry{}
|
|
|
|
cpols, err := c.cpolLister.List(labels.Everything())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
for _, cpol := range cpols {
|
|
|
|
key, err := cache.MetaNamespaceKeyFunc(cpol)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
results[key] = policyMapEntry{
|
|
|
|
policy: cpol,
|
|
|
|
rules: sets.New[string](),
|
|
|
|
}
|
2024-04-04 10:09:30 +02:00
|
|
|
for _, rule := range autogen.ComputeRules(cpol, "") {
|
2023-09-20 08:51:32 +02:00
|
|
|
results[key].rules.Insert(rule.Name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
pols, err := c.polLister.List(labels.Everything())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
for _, pol := range pols {
|
|
|
|
key, err := cache.MetaNamespaceKeyFunc(pol)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
results[key] = policyMapEntry{
|
|
|
|
policy: pol,
|
|
|
|
rules: sets.New[string](),
|
|
|
|
}
|
2024-04-04 10:09:30 +02:00
|
|
|
for _, rule := range autogen.ComputeRules(pol, "") {
|
2023-09-20 08:51:32 +02:00
|
|
|
results[key].rules.Insert(rule.Name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return results, nil
|
|
|
|
}
|
|
|
|
|
2023-09-20 10:32:38 +02:00
|
|
|
func (c *controller) createVapMap() (sets.Set[string], error) {
|
|
|
|
results := sets.New[string]()
|
|
|
|
if c.vapLister != nil {
|
|
|
|
vaps, err := c.vapLister.List(labels.Everything())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
for _, vap := range vaps {
|
|
|
|
key, err := cache.MetaNamespaceKeyFunc(vap)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
results.Insert(key)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return results, nil
|
|
|
|
}
|
|
|
|
|
2024-04-30 20:47:24 +05:30
|
|
|
func (c *controller) findOwnedEphemeralReports(ctx context.Context, namespace, name string) ([]kyvernov1alpha2.ReportInterface, error) {
|
2024-01-30 15:53:37 +01:00
|
|
|
selector, err := reportutils.SelectorResourceUidEquals(types.UID(name))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
var results []kyvernov1alpha2.ReportInterface
|
2023-09-20 08:51:32 +02:00
|
|
|
if namespace == "" {
|
2024-01-30 15:53:37 +01:00
|
|
|
reports, err := c.client.ReportsV1().ClusterEphemeralReports().List(ctx, metav1.ListOptions{
|
|
|
|
LabelSelector: selector.String(),
|
|
|
|
})
|
2023-09-20 08:51:32 +02:00
|
|
|
if err != nil {
|
|
|
|
if apierrors.IsNotFound(err) {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
2024-01-30 15:53:37 +01:00
|
|
|
for _, report := range reports.Items {
|
2024-04-30 20:47:24 +05:30
|
|
|
if len(report.OwnerReferences) != 0 {
|
|
|
|
report := report
|
|
|
|
results = append(results, &report)
|
|
|
|
}
|
2024-01-30 15:53:37 +01:00
|
|
|
}
|
2023-09-20 08:51:32 +02:00
|
|
|
} else {
|
2024-01-30 15:53:37 +01:00
|
|
|
reports, err := c.client.ReportsV1().EphemeralReports(namespace).List(ctx, metav1.ListOptions{
|
|
|
|
LabelSelector: selector.String(),
|
|
|
|
})
|
2023-09-20 08:51:32 +02:00
|
|
|
if err != nil {
|
|
|
|
if apierrors.IsNotFound(err) {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
2024-01-30 15:53:37 +01:00
|
|
|
for _, report := range reports.Items {
|
2024-04-30 20:47:24 +05:30
|
|
|
if len(report.OwnerReferences) != 0 {
|
|
|
|
report := report
|
|
|
|
results = append(results, &report)
|
|
|
|
}
|
2024-01-30 15:53:37 +01:00
|
|
|
}
|
2023-09-20 08:51:32 +02:00
|
|
|
}
|
2024-01-30 15:53:37 +01:00
|
|
|
return results, nil
|
2023-09-20 08:51:32 +02:00
|
|
|
}
|
|
|
|
|
2024-02-08 11:36:01 +01:00
|
|
|
func (c *controller) getReport(ctx context.Context, namespace, name string) (kyvernov1alpha2.ReportInterface, error) {
|
2023-09-20 08:51:32 +02:00
|
|
|
if namespace == "" {
|
|
|
|
report, err := c.client.Wgpolicyk8sV1alpha2().ClusterPolicyReports().Get(ctx, name, metav1.GetOptions{})
|
|
|
|
if err != nil {
|
|
|
|
if apierrors.IsNotFound(err) {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return report, nil
|
|
|
|
} else {
|
|
|
|
report, err := c.client.Wgpolicyk8sV1alpha2().PolicyReports(namespace).Get(ctx, name, metav1.GetOptions{})
|
|
|
|
if err != nil {
|
|
|
|
if apierrors.IsNotFound(err) {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return report, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-02-08 11:36:01 +01:00
|
|
|
func (c *controller) lookupEphemeralReportMeta(_ context.Context, namespace, name string) (*metav1.PartialObjectMetadata, error) {
|
|
|
|
if namespace == "" {
|
|
|
|
obj, err := c.cephrLister.Get(name)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return obj.(*metav1.PartialObjectMetadata), nil
|
|
|
|
} else {
|
|
|
|
obj, err := c.ephrLister.ByNamespace(namespace).Get(name)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return obj.(*metav1.PartialObjectMetadata), nil
|
2023-09-20 08:51:32 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-02-08 11:36:01 +01:00
|
|
|
func (c *controller) getEphemeralReport(ctx context.Context, namespace, name string) (kyvernov1alpha2.ReportInterface, error) {
|
|
|
|
if namespace == "" {
|
|
|
|
obj, err := c.client.ReportsV1().ClusterEphemeralReports().Get(ctx, name, metav1.GetOptions{})
|
2023-09-20 08:51:32 +02:00
|
|
|
if err != nil {
|
2024-02-08 11:36:01 +01:00
|
|
|
return nil, err
|
2023-09-20 08:51:32 +02:00
|
|
|
}
|
2024-02-08 11:36:01 +01:00
|
|
|
return obj, err
|
|
|
|
} else {
|
|
|
|
obj, err := c.client.ReportsV1().EphemeralReports(namespace).Get(ctx, name, metav1.GetOptions{})
|
2023-09-20 08:51:32 +02:00
|
|
|
if err != nil {
|
2024-02-08 11:36:01 +01:00
|
|
|
return nil, err
|
2023-09-20 08:51:32 +02:00
|
|
|
}
|
2024-02-08 11:36:01 +01:00
|
|
|
return obj, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) deleteEphemeralReport(ctx context.Context, namespace, name string) error {
|
|
|
|
if namespace == "" {
|
|
|
|
return c.client.ReportsV1().ClusterEphemeralReports().Delete(ctx, name, metav1.DeleteOptions{})
|
|
|
|
} else {
|
|
|
|
return c.client.ReportsV1().EphemeralReports(namespace).Delete(ctx, name, metav1.DeleteOptions{})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) findResource(ctx context.Context, reportMeta *metav1.PartialObjectMetadata) (*unstructured.Unstructured, error) {
|
|
|
|
gvr := reportutils.GetResourceGVR(reportMeta)
|
|
|
|
dyn := c.dclient.GetDynamicInterface().Resource(gvr)
|
|
|
|
namespace, name := reportutils.GetResourceNamespaceAndName(reportMeta)
|
|
|
|
var iface dynamic.ResourceInterface
|
|
|
|
if namespace == "" {
|
|
|
|
iface = dyn
|
|
|
|
} else {
|
|
|
|
iface = dyn.Namespace(namespace)
|
|
|
|
}
|
|
|
|
resource, err := iface.Get(ctx, name, metav1.GetOptions{})
|
|
|
|
if err != nil {
|
|
|
|
if !apierrors.IsNotFound(err) {
|
|
|
|
return nil, err
|
2023-09-20 08:51:32 +02:00
|
|
|
}
|
2024-02-08 11:36:01 +01:00
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
return resource, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) adopt(ctx context.Context, reportMeta *metav1.PartialObjectMetadata) bool {
|
|
|
|
resource, err := c.findResource(ctx, reportMeta)
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if resource == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
report, err := c.getEphemeralReport(ctx, reportMeta.GetNamespace(), reportMeta.GetName())
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if report == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
controllerutils.SetOwner(report, resource.GetAPIVersion(), resource.GetKind(), resource.GetName(), resource.GetUID())
|
|
|
|
reportutils.SetResourceUid(report, resource.GetUID())
|
|
|
|
if _, err := updateReport(ctx, report, c.client); err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) frontReconcile(ctx context.Context, logger logr.Logger, _, namespace, name string) error {
|
|
|
|
reportMeta, err := c.lookupEphemeralReportMeta(ctx, namespace, name)
|
|
|
|
// try to lookup metadata from lister
|
|
|
|
if err != nil {
|
|
|
|
if !apierrors.IsNotFound(err) {
|
2023-09-20 08:51:32 +02:00
|
|
|
return err
|
|
|
|
}
|
2024-02-08 11:36:01 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
// check if it is owned already
|
|
|
|
if len(reportMeta.OwnerReferences) != 0 {
|
|
|
|
defer func() {
|
|
|
|
obj := cache.ObjectName{Namespace: namespace, Name: string(reportMeta.OwnerReferences[0].UID)}
|
|
|
|
c.backQueue.Add(obj.String())
|
|
|
|
}()
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
// try to find the owner
|
|
|
|
if c.adopt(ctx, reportMeta) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
// if not found and too old, forget about it
|
|
|
|
if isTooOld(reportMeta) {
|
|
|
|
return c.deleteEphemeralReport(ctx, reportMeta.GetNamespace(), reportMeta.GetName())
|
|
|
|
}
|
|
|
|
// else try again later
|
|
|
|
c.frontQueue.AddAfter(controllerutils.MetaObjectToName(reportMeta), enqueueDelay)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *controller) backReconcile(ctx context.Context, logger logr.Logger, _, namespace, name string) (err error) {
|
|
|
|
var reports []kyvernov1alpha2.ReportInterface
|
|
|
|
// get the report
|
|
|
|
// if we don't have a report, we will eventually create one
|
|
|
|
report, err := c.getReport(ctx, namespace, name)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2024-04-30 20:47:24 +05:30
|
|
|
if report != nil {
|
2024-02-08 11:36:01 +01:00
|
|
|
reports = append(reports, report)
|
|
|
|
}
|
|
|
|
// get ephemeral reports
|
2024-04-30 20:47:24 +05:30
|
|
|
ephemeralReports, err := c.findOwnedEphemeralReports(ctx, namespace, name)
|
2024-02-08 11:36:01 +01:00
|
|
|
if err != nil {
|
|
|
|
if !apierrors.IsNotFound(err) {
|
2023-09-20 10:32:38 +02:00
|
|
|
return err
|
|
|
|
}
|
2024-02-08 11:36:01 +01:00
|
|
|
}
|
|
|
|
// if there was no error aggregating the report we can delete ephemeral reports
|
|
|
|
defer func() {
|
|
|
|
if err == nil {
|
|
|
|
for _, ephemeralReport := range ephemeralReports {
|
|
|
|
if err := deleteReport(ctx, ephemeralReport, c.client); err != nil {
|
|
|
|
logger.Error(err, "failed to delete ephemeral report")
|
2023-09-20 08:51:32 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2024-02-08 11:36:01 +01:00
|
|
|
}()
|
|
|
|
// aggregate reports
|
|
|
|
policyMap, err := c.createPolicyMap()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
vapMap, err := c.createVapMap()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
reports = append(reports, ephemeralReports...)
|
|
|
|
merged := map[string]policyreportv1alpha2.PolicyReportResult{}
|
|
|
|
mergeReports(policyMap, vapMap, merged, types.UID(name), reports...)
|
|
|
|
var results []policyreportv1alpha2.PolicyReportResult
|
|
|
|
for _, result := range merged {
|
|
|
|
results = append(results, result)
|
|
|
|
}
|
|
|
|
if len(results) == 0 {
|
|
|
|
if report != nil {
|
|
|
|
return deleteReport(ctx, report, c.client)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if report == nil {
|
|
|
|
owner := ephemeralReports[0].GetOwnerReferences()[0]
|
|
|
|
scope := &corev1.ObjectReference{
|
|
|
|
Kind: owner.Kind,
|
|
|
|
Namespace: namespace,
|
|
|
|
Name: owner.Name,
|
|
|
|
UID: owner.UID,
|
|
|
|
APIVersion: owner.APIVersion,
|
2023-09-20 08:51:32 +02:00
|
|
|
}
|
2024-02-08 11:36:01 +01:00
|
|
|
report = reportutils.NewPolicyReport(namespace, name, scope)
|
|
|
|
controllerutils.SetOwner(report, owner.APIVersion, owner.Kind, owner.Name, owner.UID)
|
2023-09-20 08:51:32 +02:00
|
|
|
}
|
2024-02-08 11:36:01 +01:00
|
|
|
reportutils.SetResults(report, results...)
|
|
|
|
if report.GetResourceVersion() == "" {
|
|
|
|
if _, err := reportutils.CreateReport(ctx, report, c.client); err != nil {
|
2023-09-20 08:51:32 +02:00
|
|
|
return err
|
|
|
|
}
|
2024-02-08 11:36:01 +01:00
|
|
|
} else {
|
|
|
|
if _, err := updateReport(ctx, report, c.client); err != nil {
|
2023-09-20 08:51:32 +02:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|