1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-09 17:37:12 +00:00
kyverno/pkg/jobs/controller.go

291 lines
6 KiB
Go
Raw Normal View History

2020-08-27 13:19:41 +05:30
package jobs
import (
"fmt"
2020-08-30 23:57:30 +05:30
v1 "k8s.io/api/batch/v1"
"reflect"
2020-08-27 13:19:41 +05:30
"github.com/nirmata/kyverno/pkg/config"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
apiv1 "k8s.io/api/core/v1"
"sync"
"github.com/go-logr/logr"
policyreportclient "github.com/nirmata/kyverno/pkg/client/clientset/versioned"
"github.com/nirmata/kyverno/pkg/constant"
dclient "github.com/nirmata/kyverno/pkg/dclient"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
"k8s.io/apimachinery/pkg/util/wait"
"k8s.io/client-go/util/workqueue"
)
const workQueueName = "policy-violation-controller"
const workQueueRetryLimit = 3
2020-08-30 04:13:22 +05:30
//Job creates PV
type Job struct {
2020-08-27 13:19:41 +05:30
dclient *dclient.Client
log logr.Logger
queue workqueue.RateLimitingInterface
dataStore *dataStore
mux sync.Mutex
}
type JobInfo struct {
JobType string
Policy string
}
func (i JobInfo) toKey() string {
if i.Policy != "" {
return fmt.Sprintf("%s-%s",i.JobType,i.Policy)
}
return fmt.Sprintf("%s",i.JobType)
}
//NewDataStore returns an instance of data store
func newDataStore() *dataStore {
ds := dataStore{
data: make(map[string]JobInfo),
}
return &ds
}
type dataStore struct {
data map[string]JobInfo
mu sync.RWMutex
}
func (ds *dataStore) add(keyHash string, info JobInfo) {
ds.mu.Lock()
defer ds.mu.Unlock()
// queue the key hash
ds.data[keyHash] = info
}
func (ds *dataStore) lookup(keyHash string) JobInfo {
ds.mu.RLock()
defer ds.mu.RUnlock()
return ds.data[keyHash]
}
func (ds *dataStore) delete(keyHash string) {
ds.mu.Lock()
defer ds.mu.Unlock()
delete(ds.data, keyHash)
}
// make the struct hashable
//JobsInterface provides API to create PVs
type JobsInterface interface {
Add(infos ...JobInfo)
}
2020-08-30 04:13:22 +05:30
// NewJobsJob returns a new instance of policy violation generator
2020-08-30 23:57:30 +05:30
func NewJobsJob(dclient *dclient.Client,
2020-08-30 04:13:22 +05:30
log logr.Logger) *Job {
gen := Job{
2020-08-27 13:19:41 +05:30
dclient: dclient,
queue: workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), workQueueName),
dataStore: newDataStore(),
log: log,
}
return &gen
}
2020-08-30 23:57:30 +05:30
func (j *Job) enqueue(info JobInfo) {
2020-08-27 13:19:41 +05:30
// add to data map
keyHash := info.toKey()
// add to
// queue the key hash
2020-08-30 23:57:30 +05:30
j.dataStore.add(keyHash, info)
j.queue.Add(keyHash)
2020-08-27 13:19:41 +05:30
}
//Add queues a policy violation create request
2020-08-30 23:57:30 +05:30
func (j *Job) Add(infos ...JobInfo) {
2020-08-27 13:19:41 +05:30
for _, info := range infos {
2020-08-30 23:57:30 +05:30
j.enqueue(info)
2020-08-27 13:19:41 +05:30
}
}
// Run starts the workers
2020-08-30 23:57:30 +05:30
func (j *Job) Run(workers int, stopCh <-chan struct{}) {
logger := j.log
2020-08-27 13:19:41 +05:30
defer utilruntime.HandleCrash()
logger.Info("start")
defer logger.Info("shutting down")
for i := 0; i < workers; i++ {
2020-08-30 23:57:30 +05:30
go wait.Until(j.runWorker, constant.PolicyViolationControllerResync, stopCh)
2020-08-27 13:19:41 +05:30
}
<-stopCh
}
2020-08-30 23:57:30 +05:30
func (j *Job) runWorker() {
for j.processNextWorkItem() {
2020-08-27 13:19:41 +05:30
}
}
2020-08-30 23:57:30 +05:30
func (j *Job) handleErr(err error, key interface{}) {
logger := j.log
2020-08-27 13:19:41 +05:30
if err == nil {
2020-08-30 23:57:30 +05:30
j.queue.Forget(key)
2020-08-27 13:19:41 +05:30
return
}
// retires requests if there is error
2020-08-30 23:57:30 +05:30
if j.queue.NumRequeues(key) < workQueueRetryLimit {
2020-08-27 13:19:41 +05:30
logger.Error(err, "failed to sync policy violation", "key", key)
// Re-enqueue the key rate limited. Based on the rate limiter on the
// queue and the re-enqueue history, the key will be processed later again.
2020-08-30 23:57:30 +05:30
j.queue.AddRateLimited(key)
2020-08-27 13:19:41 +05:30
return
}
2020-08-30 23:57:30 +05:30
j.queue.Forget(key)
2020-08-27 13:19:41 +05:30
// remove from data store
if keyHash, ok := key.(string); ok {
2020-08-30 23:57:30 +05:30
j.dataStore.delete(keyHash)
2020-08-27 13:19:41 +05:30
}
logger.Error(err, "dropping key out of the queue", "key", key)
}
2020-08-30 23:57:30 +05:30
func (j *Job) processNextWorkItem() bool {
logger := j.log
obj, shutdown := j.queue.Get()
2020-08-27 13:19:41 +05:30
if shutdown {
return false
}
err := func(obj interface{}) error {
2020-08-30 23:57:30 +05:30
defer j.queue.Done(obj)
2020-08-27 13:19:41 +05:30
var keyHash string
var ok bool
if keyHash, ok = obj.(string); !ok {
2020-08-30 23:57:30 +05:30
j.queue.Forget(obj)
2020-08-27 13:19:41 +05:30
logger.Info("incorrect type; expecting type 'string'", "obj", obj)
return nil
}
// lookup data store
2020-08-30 23:57:30 +05:30
info := j.dataStore.lookup(keyHash)
2020-08-27 13:19:41 +05:30
if reflect.DeepEqual(info, JobInfo{}) {
// empty key
2020-08-30 23:57:30 +05:30
j.queue.Forget(obj)
2020-08-27 13:19:41 +05:30
logger.Info("empty key")
return nil
}
2020-08-30 23:57:30 +05:30
err := j.syncHandler(info)
j.handleErr(err, obj)
2020-08-27 13:19:41 +05:30
return nil
}(obj)
if err != nil {
logger.Error(err, "failed to process item")
return true
}
return true
}
2020-08-30 23:57:30 +05:30
func (j *Job) syncHandler(info JobInfo) error {
2020-08-27 13:19:41 +05:30
defer func(){
2020-08-30 23:57:30 +05:30
j.mux.Unlock()
2020-08-27 13:19:41 +05:30
}()
2020-08-30 23:57:30 +05:30
j.mux.Lock()
2020-08-27 13:19:41 +05:30
if len(info.Policy) > 0 {
var wg sync.WaitGroup
wg.Add(3)
2020-08-30 23:57:30 +05:30
go j.syncNamespace(&wg,"HELM","POLICY",info.Policy)
go j.syncNamespace(&wg,"NAMESPACE","POLICY",info.Policy)
go j.syncNamespace(&wg,"CLUSTER","POLICY",info.Policy)
2020-08-27 13:19:41 +05:30
wg.Wait()
return nil
}
var wg sync.WaitGroup
wg.Add(3)
2020-08-30 23:57:30 +05:30
go j.syncNamespace(&wg,"HELM","SYNC",info.Policy)
go j.syncNamespace(&wg,"NAMESPACE","SYNC",info.Policy)
go j.syncNamespace(&wg,"CLUSTER","SYNC",info.Policy)
2020-08-27 13:19:41 +05:30
wg.Wait()
return nil
return nil
}
2020-08-30 23:57:30 +05:30
func(j *Job) syncNamespace(wg *sync.WaitGroup,jobType,scope,policy string){
2020-08-27 13:19:41 +05:30
defer func(){
wg.Done()
}()
var args []string{}
2020-08-30 23:57:30 +05:30
var mode string
2020-08-27 13:19:41 +05:30
if len(policy) > 0 {
2020-08-30 23:57:30 +05:30
mode = "cli"
2020-08-27 13:19:41 +05:30
}else{
2020-08-30 23:57:30 +05:30
mode = "configmap"
2020-08-27 13:19:41 +05:30
}
2020-08-30 23:57:30 +05:30
var job *v1.Job
2020-08-27 13:19:41 +05:30
switch jobType {
case "HELM":
2020-08-30 23:57:30 +05:30
args = []string{
"report",
"helm",
fmt.Sprintf("--mode=%s",mode),
}
2020-08-27 13:19:41 +05:30
job = CreateJob(append(args,"helm"),jobType,scope)
break;
case "NAMESPACE" :
2020-08-30 23:57:30 +05:30
args = []string{
"report",
"namespace",
fmt.Sprintf("--mode=%s",,mode),
}
2020-08-27 13:19:41 +05:30
job = CreateJob(append(args,"namespace"),jobType,scope)
break;
case "CLUSTER":
2020-08-30 23:57:30 +05:30
args = []string{
"report",
"cluster",
fmt.Sprintf("--mode=%s",,mode),
}
2020-08-27 13:19:41 +05:30
job = CreateJob(append(args,"cluster"),jobType,scope)
break
}
2020-08-30 23:57:30 +05:30
_, err := j.dclient.UpdateStatusResource("","Job",config.KubePolicyNamespace,job,false)
2020-08-27 13:19:41 +05:30
if err != nil {
return
}
return
}
2020-08-30 23:57:30 +05:30
func CreateJob(args []string,jobType,scope string) *v1.Job {
return &v1.Job{
2020-08-27 13:19:41 +05:30
ObjectMeta: metav1.ObjectMeta{
Name: fmt.Sprintf("%s-%s",jobType,scope),
Namespace: config.KubePolicyNamespace,
},
2020-08-30 23:57:30 +05:30
Spec: v1.JobSpec{
2020-08-27 13:19:41 +05:30
Template: apiv1.PodTemplateSpec{
Spec: apiv1.PodSpec{
Containers: []apiv1.Container{
{
Name: fmt.Sprintf("%s-%s",jobType,scope),
Image: "nirmata/kyverno-cli:latest",
Args: args,
},
},
},
},
},
}
}