2020-07-02 12:49:10 -07:00
|
|
|
package policycache
|
|
|
|
|
|
|
|
// package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"sync"
|
|
|
|
|
|
|
|
"github.com/go-logr/logr"
|
|
|
|
kyverno "github.com/nirmata/kyverno/pkg/api/kyverno/v1"
|
|
|
|
)
|
|
|
|
|
|
|
|
type pMap struct {
|
|
|
|
sync.RWMutex
|
|
|
|
dataMap map[PolicyType][]*kyverno.ClusterPolicy
|
2020-07-09 11:48:34 -07:00
|
|
|
|
|
|
|
// nameCacheMap stores the names of all existing policies in dataMap
|
|
|
|
nameCacheMap map[PolicyType]map[string]bool
|
2020-07-02 12:49:10 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// policyCache ...
|
|
|
|
type policyCache struct {
|
|
|
|
pMap
|
|
|
|
logr.Logger
|
|
|
|
}
|
|
|
|
|
|
|
|
// Interface ...
|
|
|
|
type Interface interface {
|
|
|
|
Add(policy *kyverno.ClusterPolicy)
|
|
|
|
Remove(policy *kyverno.ClusterPolicy)
|
|
|
|
Get(pkey PolicyType) []*kyverno.ClusterPolicy
|
|
|
|
}
|
|
|
|
|
|
|
|
// newPolicyCache ...
|
|
|
|
func newPolicyCache(log logr.Logger) Interface {
|
2020-07-09 11:48:34 -07:00
|
|
|
namesCache := map[PolicyType]map[string]bool{
|
|
|
|
Mutate: make(map[string]bool),
|
|
|
|
ValidateEnforce: make(map[string]bool),
|
|
|
|
ValidateAudit: make(map[string]bool),
|
|
|
|
Generate: make(map[string]bool),
|
|
|
|
}
|
|
|
|
|
2020-07-02 12:49:10 -07:00
|
|
|
return &policyCache{
|
|
|
|
pMap{
|
2020-07-09 11:48:34 -07:00
|
|
|
dataMap: make(map[PolicyType][]*kyverno.ClusterPolicy),
|
|
|
|
nameCacheMap: namesCache,
|
2020-07-02 12:49:10 -07:00
|
|
|
},
|
|
|
|
log,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add a policy to cache
|
|
|
|
func (pc *policyCache) Add(policy *kyverno.ClusterPolicy) {
|
|
|
|
pc.pMap.add(policy)
|
|
|
|
pc.Logger.V(4).Info("policy is added to cache", "name", policy.GetName())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the list of matched policies
|
|
|
|
func (pc *policyCache) Get(pkey PolicyType) []*kyverno.ClusterPolicy {
|
|
|
|
return pc.pMap.get(pkey)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove a policy from cache
|
|
|
|
func (pc *policyCache) Remove(policy *kyverno.ClusterPolicy) {
|
|
|
|
pc.pMap.remove(policy)
|
|
|
|
pc.Logger.V(4).Info("policy is removed from cache", "name", policy.GetName())
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *pMap) add(policy *kyverno.ClusterPolicy) {
|
|
|
|
m.Lock()
|
|
|
|
defer m.Unlock()
|
|
|
|
|
|
|
|
enforcePolicy := policy.Spec.ValidationFailureAction == "enforce"
|
2020-07-09 11:48:34 -07:00
|
|
|
mutateMap := m.nameCacheMap[Mutate]
|
|
|
|
validateEnforceMap := m.nameCacheMap[ValidateEnforce]
|
|
|
|
validateAuditMap := m.nameCacheMap[ValidateAudit]
|
|
|
|
generateMap := m.nameCacheMap[Generate]
|
2020-07-02 12:49:10 -07:00
|
|
|
|
|
|
|
pName := policy.GetName()
|
|
|
|
for _, rule := range policy.Spec.Rules {
|
|
|
|
if rule.HasMutate() {
|
|
|
|
if !mutateMap[pName] {
|
|
|
|
mutateMap[pName] = true
|
|
|
|
|
|
|
|
mutatePolicy := m.dataMap[Mutate]
|
|
|
|
m.dataMap[Mutate] = append(mutatePolicy, policy)
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2020-07-09 11:48:34 -07:00
|
|
|
if rule.HasValidate() {
|
|
|
|
if enforcePolicy {
|
|
|
|
if !validateEnforceMap[pName] {
|
|
|
|
validateEnforceMap[pName] = true
|
2020-07-02 12:49:10 -07:00
|
|
|
|
2020-07-09 11:48:34 -07:00
|
|
|
validatePolicy := m.dataMap[ValidateEnforce]
|
|
|
|
m.dataMap[ValidateEnforce] = append(validatePolicy, policy)
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// ValidateAudit
|
|
|
|
if !validateAuditMap[pName] {
|
|
|
|
validateAuditMap[pName] = true
|
|
|
|
|
|
|
|
validatePolicy := m.dataMap[ValidateAudit]
|
|
|
|
m.dataMap[ValidateAudit] = append(validatePolicy, policy)
|
2020-07-02 12:49:10 -07:00
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if rule.HasGenerate() {
|
|
|
|
if !generateMap[pName] {
|
|
|
|
generateMap[pName] = true
|
|
|
|
|
|
|
|
generatePolicy := m.dataMap[Generate]
|
|
|
|
m.dataMap[Generate] = append(generatePolicy, policy)
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
2020-07-09 11:48:34 -07:00
|
|
|
|
|
|
|
m.nameCacheMap[Mutate] = mutateMap
|
|
|
|
m.nameCacheMap[ValidateEnforce] = validateEnforceMap
|
|
|
|
m.nameCacheMap[ValidateAudit] = validateAuditMap
|
|
|
|
m.nameCacheMap[Generate] = generateMap
|
2020-07-02 12:49:10 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
func (m *pMap) get(key PolicyType) []*kyverno.ClusterPolicy {
|
|
|
|
m.RLock()
|
|
|
|
defer m.RUnlock()
|
|
|
|
|
|
|
|
return m.dataMap[key]
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *pMap) remove(policy *kyverno.ClusterPolicy) {
|
|
|
|
m.Lock()
|
|
|
|
defer m.Unlock()
|
|
|
|
|
2020-07-13 20:29:39 -07:00
|
|
|
pName := policy.GetName()
|
2020-07-02 12:49:10 -07:00
|
|
|
dataMap := m.dataMap
|
|
|
|
for k, policies := range dataMap {
|
|
|
|
|
|
|
|
var newPolicies []*kyverno.ClusterPolicy
|
|
|
|
for _, p := range policies {
|
2020-07-13 20:29:39 -07:00
|
|
|
if p.GetName() == pName {
|
2020-07-02 12:49:10 -07:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
newPolicies = append(newPolicies, p)
|
|
|
|
}
|
|
|
|
|
|
|
|
m.dataMap[k] = newPolicies
|
|
|
|
}
|
2020-07-13 20:29:39 -07:00
|
|
|
|
|
|
|
for _, nameCache := range m.nameCacheMap {
|
|
|
|
if _, ok := nameCache[pName]; ok {
|
|
|
|
delete(nameCache, pName)
|
|
|
|
}
|
|
|
|
}
|
2020-07-02 12:49:10 -07:00
|
|
|
}
|