2019-11-09 02:57:27 +00:00
|
|
|
package engine
|
|
|
|
|
|
|
|
import (
|
2022-05-17 11:12:43 +00:00
|
|
|
kyvernov1 "github.com/kyverno/kyverno/api/kyverno/v1"
|
|
|
|
kyvernov1beta1 "github.com/kyverno/kyverno/api/kyverno/v1beta1"
|
2022-08-31 06:03:47 +00:00
|
|
|
"github.com/kyverno/kyverno/pkg/clients/dclient"
|
2022-12-02 08:14:23 +00:00
|
|
|
"github.com/kyverno/kyverno/pkg/config"
|
2020-10-07 18:12:31 +00:00
|
|
|
"github.com/kyverno/kyverno/pkg/engine/context"
|
2022-12-02 08:14:23 +00:00
|
|
|
enginectx "github.com/kyverno/kyverno/pkg/engine/context"
|
|
|
|
"github.com/kyverno/kyverno/pkg/utils"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
admissionv1 "k8s.io/api/admission/v1"
|
2019-11-09 02:57:27 +00:00
|
|
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
|
|
|
)
|
|
|
|
|
2022-12-02 08:14:23 +00:00
|
|
|
// ExcludeFunc is a function used to determine if a resource is excluded
|
|
|
|
type ExcludeFunc = func(kind, namespace, name string) bool
|
|
|
|
|
2019-11-09 02:57:27 +00:00
|
|
|
// PolicyContext contains the contexts for engine to process
|
|
|
|
type PolicyContext struct {
|
2022-12-02 08:14:23 +00:00
|
|
|
// policy is the policy to be processed
|
|
|
|
policy kyvernov1.PolicyInterface
|
2020-12-16 20:29:16 +00:00
|
|
|
|
2022-12-02 08:14:23 +00:00
|
|
|
// newResource is the resource to be processed
|
|
|
|
newResource unstructured.Unstructured
|
2020-12-16 20:29:16 +00:00
|
|
|
|
2022-12-02 08:14:23 +00:00
|
|
|
// oldResource is the prior resource for an update, or nil
|
|
|
|
oldResource unstructured.Unstructured
|
2020-12-16 20:29:16 +00:00
|
|
|
|
2022-12-02 08:14:23 +00:00
|
|
|
// element is set when the context is used for processing a foreach loop
|
|
|
|
element unstructured.Unstructured
|
2021-10-02 23:53:02 +00:00
|
|
|
|
2022-12-02 08:14:23 +00:00
|
|
|
// admissionInfo contains the admission request information
|
|
|
|
admissionInfo kyvernov1beta1.RequestInfo
|
2020-12-16 20:29:16 +00:00
|
|
|
|
2022-04-25 12:20:40 +00:00
|
|
|
// Dynamic client - used for api lookups
|
2022-12-02 08:14:23 +00:00
|
|
|
client dclient.Interface
|
2020-12-16 20:29:16 +00:00
|
|
|
|
2020-08-08 00:09:24 +00:00
|
|
|
// Config handler
|
2022-12-02 08:14:23 +00:00
|
|
|
excludeGroupRole []string
|
|
|
|
|
|
|
|
excludeResourceFunc ExcludeFunc
|
|
|
|
|
|
|
|
// jsonContext is the variable context
|
|
|
|
jsonContext context.Interface
|
|
|
|
|
|
|
|
// namespaceLabels stores the label of namespace to be processed by namespace selector
|
|
|
|
namespaceLabels map[string]string
|
|
|
|
|
|
|
|
// admissionOperation represents if the caller is from the webhook server
|
|
|
|
admissionOperation bool
|
|
|
|
}
|
|
|
|
|
|
|
|
// Getters
|
|
|
|
|
|
|
|
func (c *PolicyContext) Policy() kyvernov1.PolicyInterface {
|
|
|
|
return c.policy
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *PolicyContext) NewResource() unstructured.Unstructured {
|
|
|
|
return c.newResource
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *PolicyContext) OldResource() unstructured.Unstructured {
|
|
|
|
return c.oldResource
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *PolicyContext) AdmissionInfo() kyvernov1beta1.RequestInfo {
|
|
|
|
return c.admissionInfo
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *PolicyContext) JSONContext() context.Interface {
|
|
|
|
return c.jsonContext
|
|
|
|
}
|
|
|
|
|
|
|
|
// Mutators
|
|
|
|
|
|
|
|
func (c *PolicyContext) WithPolicy(policy kyvernov1.PolicyInterface) *PolicyContext {
|
|
|
|
copy := c.Copy()
|
|
|
|
copy.policy = policy
|
|
|
|
return copy
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *PolicyContext) WithNamespaceLabels(namespaceLabels map[string]string) *PolicyContext {
|
|
|
|
copy := c.Copy()
|
|
|
|
copy.namespaceLabels = namespaceLabels
|
|
|
|
return copy
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *PolicyContext) WithAdmissionInfo(admissionInfo kyvernov1beta1.RequestInfo) *PolicyContext {
|
|
|
|
copy := c.Copy()
|
|
|
|
copy.admissionInfo = admissionInfo
|
|
|
|
return copy
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *PolicyContext) WithNewResource(resource unstructured.Unstructured) *PolicyContext {
|
|
|
|
copy := c.Copy()
|
|
|
|
copy.newResource = resource
|
|
|
|
return copy
|
|
|
|
}
|
2020-09-22 21:11:49 +00:00
|
|
|
|
2022-12-02 08:14:23 +00:00
|
|
|
func (c *PolicyContext) WithOldResource(resource unstructured.Unstructured) *PolicyContext {
|
|
|
|
copy := c.Copy()
|
|
|
|
copy.oldResource = resource
|
|
|
|
return copy
|
|
|
|
}
|
2020-12-16 20:29:16 +00:00
|
|
|
|
2022-12-02 08:14:23 +00:00
|
|
|
func (c *PolicyContext) WithResources(newResource unstructured.Unstructured, oldResource unstructured.Unstructured) *PolicyContext {
|
|
|
|
return c.WithNewResource(newResource).WithOldResource(oldResource)
|
|
|
|
}
|
2021-02-03 21:09:42 +00:00
|
|
|
|
2022-12-02 08:14:23 +00:00
|
|
|
func (c *PolicyContext) WithClient(client dclient.Interface) *PolicyContext {
|
|
|
|
copy := c.Copy()
|
|
|
|
copy.client = client
|
|
|
|
return copy
|
|
|
|
}
|
2022-04-25 12:20:40 +00:00
|
|
|
|
2022-12-02 08:14:23 +00:00
|
|
|
func (c *PolicyContext) WithExcludeGroupRole(excludeGroupRole ...string) *PolicyContext {
|
|
|
|
copy := c.Copy()
|
|
|
|
copy.excludeGroupRole = excludeGroupRole
|
|
|
|
return copy
|
2019-11-09 02:57:27 +00:00
|
|
|
}
|
2021-09-27 21:28:55 +00:00
|
|
|
|
2022-12-02 08:14:23 +00:00
|
|
|
func (c *PolicyContext) WithExcludeResourceFunc(excludeResourceFunc ExcludeFunc) *PolicyContext {
|
|
|
|
copy := c.Copy()
|
|
|
|
copy.excludeResourceFunc = excludeResourceFunc
|
|
|
|
return copy
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *PolicyContext) WithConfiguration(configuration config.Configuration) *PolicyContext {
|
|
|
|
return c.WithExcludeResourceFunc(configuration.ToFilter).WithExcludeGroupRole(configuration.GetExcludeGroupRole()...)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *PolicyContext) WithAdmissionOperation(admissionOperation bool) *PolicyContext {
|
|
|
|
copy := c.Copy()
|
|
|
|
copy.admissionOperation = admissionOperation
|
|
|
|
return copy
|
|
|
|
}
|
|
|
|
|
|
|
|
// Constructors
|
|
|
|
|
|
|
|
func NewPolicyContextWithJsonContext(jsonContext context.Interface) *PolicyContext {
|
2021-09-27 21:28:55 +00:00
|
|
|
return &PolicyContext{
|
2022-12-02 08:14:23 +00:00
|
|
|
jsonContext: jsonContext,
|
|
|
|
excludeGroupRole: []string{},
|
|
|
|
excludeResourceFunc: func(string, string, string) bool {
|
|
|
|
return false
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewPolicyContext() *PolicyContext {
|
|
|
|
return NewPolicyContextWithJsonContext(context.NewContext())
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewPolicyContextFromAdmissionRequest(
|
|
|
|
request *admissionv1.AdmissionRequest,
|
|
|
|
admissionInfo kyvernov1beta1.RequestInfo,
|
|
|
|
configuration config.Configuration,
|
|
|
|
client dclient.Interface,
|
|
|
|
) (*PolicyContext, error) {
|
|
|
|
ctx, err := newVariablesContext(request, &admissionInfo)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "failed to create policy rule context")
|
|
|
|
}
|
|
|
|
newResource, oldResource, err := utils.ExtractResources(nil, request)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "failed to parse resource")
|
|
|
|
}
|
|
|
|
if err := ctx.AddImageInfos(&newResource); err != nil {
|
|
|
|
return nil, errors.Wrap(err, "failed to add image information to the policy rule context")
|
|
|
|
}
|
|
|
|
policyContext := NewPolicyContextWithJsonContext(ctx).
|
|
|
|
WithNewResource(newResource).
|
|
|
|
WithOldResource(oldResource).
|
|
|
|
WithAdmissionInfo(admissionInfo).
|
|
|
|
WithConfiguration(configuration).
|
|
|
|
WithClient(client).
|
|
|
|
WithAdmissionOperation(true)
|
|
|
|
return policyContext, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c PolicyContext) Copy() *PolicyContext {
|
|
|
|
return &c
|
|
|
|
}
|
|
|
|
|
|
|
|
func newVariablesContext(request *admissionv1.AdmissionRequest, userRequestInfo *kyvernov1beta1.RequestInfo) (enginectx.Interface, error) {
|
|
|
|
ctx := enginectx.NewContext()
|
|
|
|
if err := ctx.AddRequest(request); err != nil {
|
|
|
|
return nil, errors.Wrap(err, "failed to load incoming request in context")
|
|
|
|
}
|
|
|
|
if err := ctx.AddUserInfo(*userRequestInfo); err != nil {
|
|
|
|
return nil, errors.Wrap(err, "failed to load userInfo in context")
|
|
|
|
}
|
|
|
|
if err := ctx.AddServiceAccount(userRequestInfo.AdmissionUserInfo.Username); err != nil {
|
|
|
|
return nil, errors.Wrap(err, "failed to load service account in context")
|
2021-09-27 21:28:55 +00:00
|
|
|
}
|
2022-12-02 08:14:23 +00:00
|
|
|
return ctx, nil
|
2021-09-28 06:40:05 +00:00
|
|
|
}
|