2019-05-13 18:17:28 -07:00
|
|
|
package engine
|
2019-05-13 21:27:47 +03:00
|
|
|
|
|
|
|
import (
|
2019-05-15 11:24:27 -07:00
|
|
|
"errors"
|
2019-05-13 21:27:47 +03:00
|
|
|
"fmt"
|
2019-05-14 18:20:41 -07:00
|
|
|
"log"
|
2019-05-13 21:27:47 +03:00
|
|
|
|
2019-05-15 11:24:27 -07:00
|
|
|
client "github.com/nirmata/kube-policy/client"
|
2019-05-13 21:27:47 +03:00
|
|
|
kubepolicy "github.com/nirmata/kube-policy/pkg/apis/policy/v1alpha1"
|
2019-05-13 18:17:28 -07:00
|
|
|
"github.com/nirmata/kube-policy/pkg/engine/mutation"
|
2019-05-14 18:20:41 -07:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
2019-05-13 21:27:47 +03:00
|
|
|
)
|
|
|
|
|
2019-05-14 18:20:41 -07:00
|
|
|
// Generate should be called to process generate rules on the resource
|
2019-05-15 11:24:27 -07:00
|
|
|
func Generate(client *client.Client, logger *log.Logger, policy kubepolicy.Policy, rawResource []byte, gvk metav1.GroupVersionKind) {
|
2019-05-13 21:27:47 +03:00
|
|
|
// configMapGenerator and secretGenerator can be applied only to namespaces
|
2019-05-14 18:20:41 -07:00
|
|
|
if gvk.Kind != "Namespace" {
|
2019-05-15 11:24:27 -07:00
|
|
|
return
|
2019-05-14 18:20:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
for i, rule := range policy.Spec.Rules {
|
|
|
|
// Checks for preconditions
|
|
|
|
// TODO: Rework PolicyEngine interface that it receives not a policy, but mutation object for
|
|
|
|
// Mutate, validation for Validate and so on. It will allow to bring this checks outside of PolicyEngine
|
|
|
|
// to common part as far as they present for all: mutation, validation, generation
|
|
|
|
|
|
|
|
err := rule.Validate()
|
|
|
|
if err != nil {
|
2019-05-15 11:24:27 -07:00
|
|
|
logger.Printf("Rule has invalid structure: rule number = %d, rule name = %s in policy %s, err: %v\n", i, rule.Name, policy.ObjectMeta.Name, err)
|
2019-05-14 18:20:41 -07:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
ok, err := mutation.ResourceMeetsRules(rawResource, rule.ResourceDescription, gvk)
|
|
|
|
if err != nil {
|
2019-05-15 11:24:27 -07:00
|
|
|
logger.Printf("Rule has invalid data: rule number = %d, rule name = %s in policy %s, err: %v\n", i, rule.Name, policy.ObjectMeta.Name, err)
|
2019-05-14 18:20:41 -07:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if !ok {
|
2019-05-15 11:24:27 -07:00
|
|
|
logger.Printf("Rule is not applicable to the request: rule name = %s in policy %s \n", rule.Name, policy.ObjectMeta.Name)
|
2019-05-14 18:20:41 -07:00
|
|
|
continue
|
|
|
|
}
|
2019-05-13 21:27:47 +03:00
|
|
|
|
2019-05-15 11:24:27 -07:00
|
|
|
err = applyRuleGenerator(client, rawResource, rule.Generation, gvk)
|
2019-05-14 18:20:41 -07:00
|
|
|
if err != nil {
|
2019-05-15 11:24:27 -07:00
|
|
|
logger.Printf("Failed to apply rule generator: %v", err)
|
2019-05-13 21:27:47 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-14 18:20:41 -07:00
|
|
|
// Applies "configMapGenerator" and "secretGenerator" described in PolicyRule
|
|
|
|
// TODO: plan to support all kinds of generator
|
2019-05-15 11:24:27 -07:00
|
|
|
func applyRuleGenerator(client *client.Client, rawResource []byte, generator *kubepolicy.Generation, gvk metav1.GroupVersionKind) error {
|
2019-05-13 21:27:47 +03:00
|
|
|
if generator == nil {
|
2019-05-15 11:24:27 -07:00
|
|
|
return nil
|
2019-05-13 21:27:47 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
err := generator.Validate()
|
|
|
|
if err != nil {
|
2019-05-15 11:24:27 -07:00
|
|
|
return fmt.Errorf("Generator for '%s' is invalid: %s", generator.Kind, err)
|
2019-05-13 21:27:47 +03:00
|
|
|
}
|
|
|
|
|
2019-05-14 18:20:41 -07:00
|
|
|
namespaceName := mutation.ParseNameFromObject(rawResource)
|
2019-05-15 11:24:27 -07:00
|
|
|
// Generate the resource
|
|
|
|
switch gvk.Kind {
|
|
|
|
case "configmap":
|
|
|
|
err = client.GenerateConfigMap(*generator, namespaceName)
|
|
|
|
case "secret":
|
|
|
|
err = client.GenerateSecret(*generator, namespaceName)
|
|
|
|
case "default":
|
|
|
|
err = errors.New("resource not supported")
|
|
|
|
}
|
|
|
|
return err
|
2019-05-13 21:27:47 +03:00
|
|
|
}
|