2019-07-15 16:07:56 -07:00
|
|
|
package webhooks
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
|
2019-11-13 13:41:08 -08:00
|
|
|
kyverno "github.com/nirmata/kyverno/pkg/api/kyverno/v1"
|
2020-01-25 14:53:12 +05:30
|
|
|
policyvalidate "github.com/nirmata/kyverno/pkg/policy"
|
2019-07-15 16:07:56 -07:00
|
|
|
v1beta1 "k8s.io/api/admission/v1beta1"
|
2020-03-17 17:23:18 -07:00
|
|
|
|
2019-07-15 16:07:56 -07:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
|
|
)
|
|
|
|
|
|
|
|
//HandlePolicyValidation performs the validation check on policy resource
|
2019-08-27 16:44:10 -07:00
|
|
|
func (ws *WebhookServer) handlePolicyValidation(request *v1beta1.AdmissionRequest) *v1beta1.AdmissionResponse {
|
2020-03-17 11:05:20 -07:00
|
|
|
logger := ws.log.WithValues("action", "policyvalidation", "uid", request.UID, "kind", request.Kind, "namespace", request.Namespace, "name", request.Name, "operation", request.Operation)
|
2019-09-03 14:51:51 -07:00
|
|
|
var policy *kyverno.ClusterPolicy
|
2019-08-08 13:09:40 -07:00
|
|
|
admissionResp := &v1beta1.AdmissionResponse{
|
|
|
|
Allowed: true,
|
|
|
|
}
|
2019-08-21 16:42:42 -07:00
|
|
|
|
2019-08-27 16:44:10 -07:00
|
|
|
//TODO: can this happen? wont this be picked by OpenAPI spec schema ?
|
2019-08-21 16:42:42 -07:00
|
|
|
raw := request.Object.Raw
|
2019-08-08 13:09:40 -07:00
|
|
|
if err := json.Unmarshal(raw, &policy); err != nil {
|
2020-03-17 11:05:20 -07:00
|
|
|
logger.Error(err, "failed to unmarshal incoming resource to policy type")
|
2019-08-21 12:38:15 -07:00
|
|
|
return &v1beta1.AdmissionResponse{Allowed: false,
|
|
|
|
Result: &metav1.Status{
|
|
|
|
Message: fmt.Sprintf("Failed to unmarshal policy admission request err %v", err),
|
|
|
|
}}
|
2019-08-08 13:09:40 -07:00
|
|
|
}
|
2020-03-27 19:06:06 +05:30
|
|
|
if err := policyvalidate.Validate(*policy, ws.client, false, ws.openAPIController); err != nil {
|
2019-09-26 18:02:24 -07:00
|
|
|
admissionResp = &v1beta1.AdmissionResponse{
|
|
|
|
Allowed: false,
|
|
|
|
Result: &metav1.Status{
|
|
|
|
Message: err.Error(),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
2019-09-04 13:43:12 -07:00
|
|
|
if admissionResp.Allowed {
|
2019-12-04 12:31:27 -08:00
|
|
|
// if the policy contains mutating & validation rules and it config does not exist we create one
|
2020-01-07 10:33:28 -08:00
|
|
|
// queue the request
|
|
|
|
ws.resourceWebhookWatcher.RegisterResourceWebhook()
|
2019-09-04 13:43:12 -07:00
|
|
|
}
|
2019-08-07 18:01:28 -07:00
|
|
|
return admissionResp
|
2019-07-15 16:07:56 -07:00
|
|
|
}
|