2019-08-13 13:15:04 -07:00
|
|
|
package policy
|
|
|
|
|
|
|
|
import (
|
2021-03-25 12:28:03 -07:00
|
|
|
"context"
|
2019-08-13 13:15:04 -07:00
|
|
|
"fmt"
|
2021-03-25 12:28:03 -07:00
|
|
|
"strings"
|
|
|
|
"time"
|
2019-08-13 13:15:04 -07:00
|
|
|
|
2020-03-17 16:25:34 -07:00
|
|
|
"github.com/go-logr/logr"
|
2021-03-25 12:28:03 -07:00
|
|
|
v1alpha1 "github.com/kyverno/kyverno/pkg/api/policyreport/v1alpha1"
|
|
|
|
kyvernoclient "github.com/kyverno/kyverno/pkg/client/clientset/versioned"
|
|
|
|
policyreportlister "github.com/kyverno/kyverno/pkg/client/listers/policyreport/v1alpha1"
|
2020-10-07 11:12:31 -07:00
|
|
|
"github.com/kyverno/kyverno/pkg/engine/response"
|
|
|
|
"github.com/kyverno/kyverno/pkg/event"
|
2020-11-09 11:26:12 -08:00
|
|
|
"github.com/kyverno/kyverno/pkg/policyreport"
|
2021-03-25 12:28:03 -07:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
|
|
"k8s.io/apimachinery/pkg/labels"
|
2019-08-13 13:15:04 -07:00
|
|
|
)
|
|
|
|
|
2020-12-23 15:10:07 -08:00
|
|
|
func (pc *PolicyController) report(policy string, engineResponses []*response.EngineResponse, logger logr.Logger) {
|
2020-12-21 11:04:19 -08:00
|
|
|
eventInfos := generateEvents(logger, engineResponses)
|
2019-11-12 14:41:29 -08:00
|
|
|
pc.eventGen.Add(eventInfos...)
|
2020-12-21 11:04:19 -08:00
|
|
|
|
2020-11-09 11:26:12 -08:00
|
|
|
pvInfos := policyreport.GeneratePRsFromEngineResponse(engineResponses, logger)
|
2020-02-26 00:26:09 +05:30
|
|
|
|
2020-12-21 11:04:19 -08:00
|
|
|
// as engineResponses holds the results for all matched resources in one namespace
|
|
|
|
// we can merge pvInfos into a single object to reduce update frequency (throttling request) on RCR
|
|
|
|
info := mergePvInfos(pvInfos)
|
|
|
|
pc.prGenerator.Add(info)
|
|
|
|
logger.V(4).Info("added a request to RCR generator", "key", info.ToKey())
|
2019-11-12 14:41:29 -08:00
|
|
|
}
|
|
|
|
|
2021-03-25 12:28:03 -07:00
|
|
|
// forceReconciliation forces a background scan by adding all policies to the workqueue
|
|
|
|
func (pc *PolicyController) forceReconciliation(reconcileCh <-chan bool, stopCh <-chan struct{}) {
|
|
|
|
logger := pc.log.WithName("forceReconciliation")
|
|
|
|
ticker := time.NewTicker(pc.reconcilePeriod)
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ticker.C:
|
|
|
|
logger.Info("performing the background scan", "scan interval", pc.reconcilePeriod.String())
|
|
|
|
if err := pc.policyReportEraser.EraseResultsEntries(eraseResultsEntries); err != nil {
|
|
|
|
logger.Error(err, "continue reconciling policy reports")
|
|
|
|
}
|
|
|
|
|
|
|
|
pc.requeuePolicies()
|
|
|
|
|
|
|
|
case erase := <-reconcileCh:
|
|
|
|
logger.Info("received the reconcile signal, reconciling policy report")
|
|
|
|
if erase {
|
|
|
|
if err := pc.policyReportEraser.EraseResultsEntries(eraseResultsEntries); err != nil {
|
|
|
|
logger.Error(err, "continue reconciling policy reports")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pc.requeuePolicies()
|
|
|
|
|
|
|
|
case <-stopCh:
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func eraseResultsEntries(pclient *kyvernoclient.Clientset, reportLister policyreportlister.PolicyReportLister, clusterReportLister policyreportlister.ClusterPolicyReportLister) error {
|
|
|
|
var errors []string
|
|
|
|
|
|
|
|
if polrs, err := reportLister.List(labels.Everything()); err != nil {
|
|
|
|
errors = append(errors, err.Error())
|
|
|
|
} else {
|
|
|
|
for _, polr := range polrs {
|
|
|
|
polr.Results = []*v1alpha1.PolicyReportResult{}
|
|
|
|
polr.Summary = v1alpha1.PolicyReportSummary{}
|
|
|
|
if _, err = pclient.Wgpolicyk8sV1alpha1().PolicyReports(polr.GetNamespace()).Update(context.TODO(), polr, metav1.UpdateOptions{}); err != nil {
|
|
|
|
errors = append(errors, fmt.Sprintf("%s/%s/%s: %v", polr.Kind, polr.Namespace, polr.Name, err))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if cpolrs, err := clusterReportLister.List(labels.Everything()); err != nil {
|
|
|
|
errors = append(errors, err.Error())
|
|
|
|
} else {
|
|
|
|
for _, cpolr := range cpolrs {
|
|
|
|
cpolr.Results = []*v1alpha1.PolicyReportResult{}
|
|
|
|
cpolr.Summary = v1alpha1.PolicyReportSummary{}
|
|
|
|
if _, err = pclient.Wgpolicyk8sV1alpha1().ClusterPolicyReports().Update(context.TODO(), cpolr, metav1.UpdateOptions{}); err != nil {
|
|
|
|
errors = append(errors, fmt.Sprintf("%s/%s: %v", cpolr.Kind, cpolr.Name, err))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(errors) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return fmt.Errorf("failed to erase results entries %v", strings.Join(errors, ";"))
|
|
|
|
}
|
|
|
|
|
|
|
|
func (pc *PolicyController) requeuePolicies() {
|
|
|
|
logger := pc.log.WithName("requeuePolicies")
|
|
|
|
if cpols, err := pc.pLister.List(labels.Everything()); err == nil {
|
|
|
|
for _, cpol := range cpols {
|
|
|
|
if !pc.canBackgroundProcess(cpol) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
pc.enqueuePolicy(cpol)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
logger.Error(err, "unable to list ClusterPolicies")
|
|
|
|
}
|
|
|
|
|
|
|
|
namespaces, err := pc.nsLister.List(labels.Everything())
|
|
|
|
if err != nil {
|
|
|
|
logger.Error(err, "unable to list namespaces")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, ns := range namespaces {
|
|
|
|
pols, err := pc.npLister.Policies(ns.GetName()).List(labels.Everything())
|
|
|
|
if err != nil {
|
|
|
|
logger.Error(err, "unable to list Policies", "namespace", ns.GetName())
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, p := range pols {
|
|
|
|
pol := ConvertPolicyToClusterPolicy(p)
|
|
|
|
if !pc.canBackgroundProcess(pol) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
pc.enqueuePolicy(pol)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-23 15:10:07 -08:00
|
|
|
func generateEvents(log logr.Logger, ers []*response.EngineResponse) []event.Info {
|
2019-11-12 14:41:29 -08:00
|
|
|
var eventInfos []event.Info
|
|
|
|
for _, er := range ers {
|
2020-06-30 11:53:27 -07:00
|
|
|
if er.IsSuccessful() {
|
2019-11-12 14:41:29 -08:00
|
|
|
continue
|
|
|
|
}
|
2020-03-17 16:25:34 -07:00
|
|
|
eventInfos = append(eventInfos, generateEventsPerEr(log, er)...)
|
2019-11-12 14:41:29 -08:00
|
|
|
}
|
|
|
|
return eventInfos
|
|
|
|
}
|
2019-08-13 13:15:04 -07:00
|
|
|
|
2020-12-23 15:10:07 -08:00
|
|
|
func generateEventsPerEr(log logr.Logger, er *response.EngineResponse) []event.Info {
|
2019-11-12 14:41:29 -08:00
|
|
|
var eventInfos []event.Info
|
2020-07-20 08:00:02 -07:00
|
|
|
|
|
|
|
logger := log.WithValues("policy", er.PolicyResponse.Policy, "kind", er.PolicyResponse.Resource.Kind, "namespace", er.PolicyResponse.Resource.Namespace, "name", er.PolicyResponse.Resource.Name)
|
2020-03-17 16:25:34 -07:00
|
|
|
logger.V(4).Info("reporting results for policy")
|
2020-07-20 08:00:02 -07:00
|
|
|
|
2019-11-12 14:41:29 -08:00
|
|
|
for _, rule := range er.PolicyResponse.Rules {
|
|
|
|
if rule.Success {
|
|
|
|
continue
|
|
|
|
}
|
2019-08-13 13:15:04 -07:00
|
|
|
// generate event on resource for each failed rule
|
2020-03-17 16:25:34 -07:00
|
|
|
logger.V(4).Info("generating event on resource")
|
2019-08-26 13:34:42 -07:00
|
|
|
e := event.Info{}
|
2019-11-12 14:41:29 -08:00
|
|
|
e.Kind = er.PolicyResponse.Resource.Kind
|
|
|
|
e.Namespace = er.PolicyResponse.Resource.Namespace
|
|
|
|
e.Name = er.PolicyResponse.Resource.Name
|
2019-11-18 17:13:48 -08:00
|
|
|
e.Reason = event.PolicyViolation.String()
|
2019-12-26 11:50:41 -08:00
|
|
|
e.Source = event.PolicyController
|
2020-07-20 08:00:02 -07:00
|
|
|
e.Message = fmt.Sprintf("policy '%s' (%s) rule '%s' failed. %v", er.PolicyResponse.Policy, rule.Type, rule.Name, rule.Message)
|
2019-11-12 14:41:29 -08:00
|
|
|
eventInfos = append(eventInfos, e)
|
|
|
|
}
|
|
|
|
|
|
|
|
return eventInfos
|
2019-08-13 13:15:04 -07:00
|
|
|
}
|
2020-12-21 11:04:19 -08:00
|
|
|
|
|
|
|
func mergePvInfos(infos []policyreport.Info) policyreport.Info {
|
|
|
|
aggregatedInfo := policyreport.Info{}
|
|
|
|
if len(infos) == 0 {
|
|
|
|
return aggregatedInfo
|
|
|
|
}
|
|
|
|
|
|
|
|
var results []policyreport.EngineResponseResult
|
|
|
|
for _, info := range infos {
|
|
|
|
for _, res := range info.Results {
|
|
|
|
results = append(results, res)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
aggregatedInfo.PolicyName = infos[0].PolicyName
|
|
|
|
aggregatedInfo.Namespace = infos[0].Namespace
|
|
|
|
aggregatedInfo.Results = results
|
|
|
|
return aggregatedInfo
|
|
|
|
}
|