2022-05-16 16:36:21 +02:00
|
|
|
package resource
|
2022-04-25 20:20:40 +08:00
|
|
|
|
|
|
|
import (
|
2022-11-28 11:30:14 +01:00
|
|
|
"context"
|
2022-04-25 20:20:40 +08:00
|
|
|
"fmt"
|
2024-04-17 09:46:18 +02:00
|
|
|
"sync"
|
2022-04-25 20:20:40 +08:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/go-logr/logr"
|
2022-05-17 13:12:43 +02:00
|
|
|
kyvernov1 "github.com/kyverno/kyverno/api/kyverno/v1"
|
2024-06-20 11:44:43 +02:00
|
|
|
kyvernov2 "github.com/kyverno/kyverno/api/kyverno/v2"
|
2023-12-15 16:42:10 +02:00
|
|
|
"github.com/kyverno/kyverno/pkg/autogen"
|
2023-01-30 12:41:09 +01:00
|
|
|
engineapi "github.com/kyverno/kyverno/pkg/engine/api"
|
2022-05-17 07:56:48 +02:00
|
|
|
"github.com/kyverno/kyverno/pkg/event"
|
2023-12-15 16:42:10 +02:00
|
|
|
datautils "github.com/kyverno/kyverno/pkg/utils/data"
|
2024-03-29 19:07:15 +05:30
|
|
|
"github.com/kyverno/kyverno/pkg/webhooks/handlers"
|
2022-09-09 16:19:38 +02:00
|
|
|
"github.com/kyverno/kyverno/pkg/webhooks/resource/generation"
|
2023-12-15 16:42:10 +02:00
|
|
|
webhookutils "github.com/kyverno/kyverno/pkg/webhooks/utils"
|
2022-04-25 20:20:40 +08:00
|
|
|
admissionv1 "k8s.io/api/admission/v1"
|
|
|
|
)
|
|
|
|
|
2023-02-22 18:49:09 +08:00
|
|
|
// handleBackgroundApplies applies generate and mutateExisting policies, and creates update requests for background reconcile
|
2024-04-17 09:46:18 +02:00
|
|
|
func (h *resourceHandlers) handleBackgroundApplies(ctx context.Context, logger logr.Logger, request handlers.AdmissionRequest, generatePolicies, mutatePolicies []kyvernov1.PolicyInterface, ts time.Time, wg *sync.WaitGroup) {
|
|
|
|
go h.handleMutateExisting(ctx, logger, request, mutatePolicies, ts, wg)
|
|
|
|
go h.handleGenerate(ctx, logger, request, generatePolicies, ts, wg)
|
2022-04-25 20:20:40 +08:00
|
|
|
}
|
|
|
|
|
2024-04-17 09:46:18 +02:00
|
|
|
func (h *resourceHandlers) handleMutateExisting(ctx context.Context, logger logr.Logger, request handlers.AdmissionRequest, policies []kyvernov1.PolicyInterface, admissionRequestTimestamp time.Time, wg *sync.WaitGroup) {
|
2024-04-17 14:43:19 +05:30
|
|
|
if wg != nil { // for unit testing purposes
|
|
|
|
defer wg.Done()
|
|
|
|
}
|
|
|
|
|
2024-03-29 19:07:15 +05:30
|
|
|
policyContext, err := h.buildPolicyContextFromAdmissionRequest(logger, request)
|
|
|
|
if err != nil {
|
|
|
|
logger.Error(err, "failed to create policy context")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if request.AdmissionRequest.Operation == admissionv1.Delete {
|
2022-12-02 09:14:23 +01:00
|
|
|
policyContext = policyContext.WithNewResource(policyContext.OldResource())
|
2022-04-25 20:20:40 +08:00
|
|
|
}
|
|
|
|
|
2023-01-30 12:41:09 +01:00
|
|
|
var engineResponses []*engineapi.EngineResponse
|
2022-04-25 20:20:40 +08:00
|
|
|
for _, policy := range policies {
|
2023-12-22 21:07:17 +08:00
|
|
|
if !policy.GetSpec().HasMutateExisting() {
|
2022-05-06 13:46:36 +08:00
|
|
|
continue
|
|
|
|
}
|
2023-12-19 14:25:12 +08:00
|
|
|
|
|
|
|
policyNew := skipBackgroundRequests(policy, logger, h.backgroundServiceAccountName, policyContext.AdmissionInfo().AdmissionUserInfo.Username)
|
2024-01-04 18:47:58 +08:00
|
|
|
if policyNew == nil {
|
|
|
|
continue
|
|
|
|
}
|
2022-11-12 01:00:54 +05:30
|
|
|
logger.V(4).Info("update request for mutateExisting policy")
|
2022-05-06 13:46:36 +08:00
|
|
|
|
2023-12-15 16:42:10 +02:00
|
|
|
// skip rules that don't specify the DELETE operation in case the admission request is of type DELETE
|
|
|
|
var skipped []string
|
2024-04-04 10:09:30 +02:00
|
|
|
for _, rule := range autogen.ComputeRules(policy, "") {
|
2024-03-29 19:07:15 +05:30
|
|
|
if request.AdmissionRequest.Operation == admissionv1.Delete && !webhookutils.MatchDeleteOperation(rule) {
|
2023-12-15 16:42:10 +02:00
|
|
|
skipped = append(skipped, rule.Name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-01-30 12:41:09 +01:00
|
|
|
var rules []engineapi.RuleResponse
|
2023-12-19 14:25:12 +08:00
|
|
|
policyContext := policyContext.WithPolicy(policyNew)
|
2023-02-08 06:55:03 +01:00
|
|
|
engineResponse := h.engine.ApplyBackgroundChecks(ctx, policyContext)
|
2022-04-25 20:20:40 +08:00
|
|
|
|
|
|
|
for _, rule := range engineResponse.PolicyResponse.Rules {
|
2023-12-15 16:42:10 +02:00
|
|
|
if rule.Status() == engineapi.RuleStatusPass && !datautils.SliceContains(skipped, rule.Name()) {
|
2022-04-25 20:20:40 +08:00
|
|
|
rules = append(rules, rule)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(rules) > 0 {
|
|
|
|
engineResponse.PolicyResponse.Rules = rules
|
2023-03-22 15:55:00 +01:00
|
|
|
engineResponses = append(engineResponses, &engineResponse)
|
2022-04-25 20:20:40 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-06-20 11:44:43 +02:00
|
|
|
if failedResponse := applyUpdateRequest(ctx, request.AdmissionRequest, kyvernov2.Mutate, h.urGenerator, policyContext.AdmissionInfo(), request.Operation, engineResponses...); failedResponse != nil {
|
2022-04-29 19:05:49 +08:00
|
|
|
for _, failedUR := range failedResponse {
|
2022-05-01 22:14:32 -07:00
|
|
|
err := fmt.Errorf("failed to create update request: %v", failedUR.err)
|
2023-07-26 17:06:51 +03:00
|
|
|
|
|
|
|
var policy kyvernov1.PolicyInterface
|
|
|
|
for _, pol := range policies {
|
|
|
|
if pol.GetName() != failedUR.ur.Policy {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
policy = pol
|
|
|
|
}
|
2022-12-02 09:14:23 +01:00
|
|
|
resource := policyContext.NewResource()
|
2023-07-26 17:06:51 +03:00
|
|
|
events := event.NewBackgroundFailedEvent(err, policy, "", event.GeneratePolicyController,
|
|
|
|
kyvernov1.ResourceSpec{Kind: resource.GetKind(), Namespace: resource.GetNamespace(), Name: resource.GetName()})
|
2022-05-16 16:36:21 +02:00
|
|
|
h.eventGen.Add(events...)
|
2022-04-25 20:20:40 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-02-22 18:49:09 +08:00
|
|
|
|
2024-04-17 09:46:18 +02:00
|
|
|
func (h *resourceHandlers) handleGenerate(ctx context.Context, logger logr.Logger, request handlers.AdmissionRequest, generatePolicies []kyvernov1.PolicyInterface, ts time.Time, wg *sync.WaitGroup) {
|
2024-04-17 14:43:19 +05:30
|
|
|
if wg != nil { // for unit testing purposes
|
|
|
|
defer wg.Done()
|
|
|
|
}
|
|
|
|
|
2024-03-29 19:07:15 +05:30
|
|
|
policyContext, err := h.buildPolicyContextFromAdmissionRequest(logger, request)
|
|
|
|
if err != nil {
|
|
|
|
logger.Error(err, "failed to create policy context")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-08-20 01:55:32 -07:00
|
|
|
gh := generation.NewGenerationHandler(logger, h.engine, h.client, h.kyvernoClient, h.nsLister, h.urLister, h.cpolLister, h.polLister, h.urGenerator, h.eventGen, h.metricsConfig, h.backgroundServiceAccountName, h.reportsServiceAccountName)
|
2023-12-19 14:25:12 +08:00
|
|
|
var policies []kyvernov1.PolicyInterface
|
|
|
|
for _, p := range generatePolicies {
|
|
|
|
new := skipBackgroundRequests(p, logger, h.backgroundServiceAccountName, policyContext.AdmissionInfo().AdmissionUserInfo.Username)
|
2024-01-04 18:47:58 +08:00
|
|
|
if new != nil {
|
|
|
|
policies = append(policies, new)
|
|
|
|
}
|
2023-12-19 14:25:12 +08:00
|
|
|
}
|
2024-04-17 09:46:18 +02:00
|
|
|
gh.Handle(ctx, request.AdmissionRequest, policies, policyContext)
|
2023-02-22 18:49:09 +08:00
|
|
|
}
|