1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-31 03:45:17 +00:00

introduce equality anchor

This commit is contained in:
shivkumar dudhani 2019-10-01 12:35:14 -07:00
parent 5f686f782e
commit 17d80a08c0
8 changed files with 99 additions and 45 deletions

View file

@ -6,6 +6,12 @@ The ```mutate``` rule contains actions that will be applied to matching resource
Resource mutation occurs before validation, so the validation rules should not contradict the changes performed by the mutation section.
## Anchors
| Anchor | Tag | Behavior |
|------------- |----- |--------------------------------------------- |
| Conditional | () | Add the specified tag |
| Add | +() | Add if the tag if not specified |
## Patches
This patch adds an init container to all deployments.

View file

@ -33,6 +33,12 @@ A validation rule is expressed as an overlay pattern that expresses the desired
There is no operator for `equals` as providing a field value in the pattern requires equality to the value.
## Anchors
| Anchor | Tag | Behavior |
|------------- |----- |---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| Conditional | () | If tag with the given value is specified, then following resource elements must satisfy the conditions.<br>e.g. <br><code> (image):"*:latest" <br>imagePullPolicy: "!IfNotPresent"</code><br> If image has tag latest then, imagePullPolicy cannot be IfNotPresent. |
| Equality | ~() | if tag is specified, then it should have the provided value.<br>e.g.<br><code> ~(hostPath):<br> path: "!/var/lib" </code><br> If hostPath is defined then the path cannot be /var/lib |
| Existance | ^() | It can be specified on the list/array type only. If there exists at least one resource in the list that satisfies the pattern.<br>e.g. <br><code> ^(containers):<br> - image: nginx:latest </code><br> There must exist at least one container with image nginx:latest. |
## Example
The next rule prevents the creation of Deployment, StatefuleSet and DaemonSet resources without label 'app' in selector:
````yaml

View file

@ -14,5 +14,5 @@ spec:
pattern:
spec:
volumes:
- (hostPath):
- ~(hostPath):
path: "!/var/lib"

View file

@ -7,5 +7,4 @@ metadata:
spec:
containers:
- name: nginx
image: nginx:latest
imagePullPolicy: NotPresent
image: nginx:latest

View file

@ -19,11 +19,44 @@ func CreateElementHandler(element string, pattern interface{}, path string) Vali
return NewConditionAnchorHandler(element, pattern, path)
case isExistanceAnchor(element):
return NewExistanceHandler(element, pattern, path)
case isEqualityAnchor(element):
return NewEqualityHandler(element, pattern, path)
default:
return NewDefaultHandler(element, pattern, path)
}
}
func NewEqualityHandler(anchor string, pattern interface{}, path string) ValidationHandler {
return EqualityHandler{
anchor: anchor,
pattern: pattern,
path: path,
}
}
//EqualityHandler provides handler for non anchor element
type EqualityHandler struct {
anchor string
pattern interface{}
path string
}
//Handle processed condition anchor
func (eh EqualityHandler) Handle(resourceMap map[string]interface{}, originPattern interface{}) (string, error) {
anchorKey := removeAnchor(eh.anchor)
currentPath := eh.path + anchorKey + "/"
// check if anchor is present in resource
if value, ok := resourceMap[anchorKey]; ok {
// validate the values of the pattern
returnPath, err := validateResourceElement(value, eh.pattern, originPattern, currentPath)
if err != nil {
return returnPath, err
}
return "", nil
}
return "", nil
}
//NewDefaultHandler returns handler for non anchor elements
func NewDefaultHandler(element string, pattern interface{}, path string) ValidationHandler {
return DefaultHandler{
@ -159,7 +192,7 @@ func getAnchorsResourcesFromMap(patternMap map[string]interface{}) (map[string]i
anchors := map[string]interface{}{}
resources := map[string]interface{}{}
for key, value := range patternMap {
if isConditionAnchor(key) || isExistanceAnchor(key) {
if isConditionAnchor(key) || isExistanceAnchor(key) || isEqualityAnchor(key) {
anchors[key] = value
continue
}

View file

@ -295,6 +295,16 @@ func isExistanceAnchor(str string) bool {
return (str[:len(left)] == left && str[len(str)-len(right):] == right)
}
func isEqualityAnchor(str string) bool {
left := "~("
right := ")"
if len(str) < len(left)+len(right) {
return false
}
//TODO: trim spaces ?
return (str[:len(left)] == left && str[len(str)-len(right):] == right)
}
func isAddingAnchor(key string) bool {
const left = "+("
const right = ")"
@ -330,7 +340,7 @@ func removeAnchor(key string) string {
return key[1 : len(key)-1]
}
if isExistanceAnchor(key) || isAddingAnchor(key) {
if isExistanceAnchor(key) || isAddingAnchor(key) || isEqualityAnchor(key) {
return key[2 : len(key)-1]
}

View file

@ -193,17 +193,20 @@ func validateMap(resourceMap, patternMap map[string]interface{}, origPattern int
// Evaluate anchors
for key, patternElement := range anchors {
// get handler for each pattern in the pattern
// - Anchor
// - Conditional
// - Existance
// - Equality
handler := CreateElementHandler(key, patternElement, path)
handlerPath, err := handler.Handle(resourceMap, origPattern)
// if there are resource values at same level, then anchor acts as conditional instead of a strict check
// but if there are non then its a if then check
if err != nil {
if len(resources) == 0 {
return handlerPath, err
// If Conditional anchor fails then we dont process the resources
if isConditionAnchor(key) {
glog.V(4).Infof("condition anchor did not satisfy, wont process the resources: %s", err)
return "", nil
}
return "", nil
return handlerPath, err
}
}
// Evaluate resources

View file

@ -1816,15 +1816,14 @@ func TestValidate_image_tag_fail(t *testing.T) {
resourceUnstructured, err := ConvertToUnstructured(rawResource)
assert.NilError(t, err)
// msgs := []string{
// "Validation rule 'validate-tag' failed at '/spec/containers/0/image/' for resource Pod//myapp-pod. An image tag is required",
// "Validation rule 'validate-latest' succesfully validated",
// }
msgs := []string{
"Validation rule 'validate-tag' succesfully validated",
"Validation rule 'validate-latest' failed at '/spec/containers/0/imagePullPolicy/' for resource Pod//myapp-pod. imagePullPolicy 'Always' required with tag 'latest'",
}
er := Validate(policy, *resourceUnstructured)
// for _, r := range er.PolicyResponse.Rules {
// t.Log(r.Message)
// // assert.Equal(t, r.Message, msgs[index])
// }
for index, r := range er.PolicyResponse.Rules {
assert.Equal(t, r.Message, msgs[index])
}
assert.Assert(t, !er.IsSuccesful())
}
@ -1915,15 +1914,14 @@ func TestValidate_image_tag_pass(t *testing.T) {
resourceUnstructured, err := ConvertToUnstructured(rawResource)
assert.NilError(t, err)
// msgs := []string{
// "Validation rule 'validate-tag' failed at '/spec/containers/0/image/' for resource Pod//myapp-pod. An image tag is required",
// "Validation rule 'validate-latest' succesfully validated",
// }
msgs := []string{
"Validation rule 'validate-tag' succesfully validated",
"Validation rule 'validate-latest' succesfully validated",
}
er := Validate(policy, *resourceUnstructured)
// for _, r := range er.PolicyResponse.Rules {
// t.Log(r.Message)
// // assert.Equal(t, r.Message, msgs[index])
// }
for index, r := range er.PolicyResponse.Rules {
assert.Equal(t, r.Message, msgs[index])
}
assert.Assert(t, er.IsSuccesful())
}
@ -2109,7 +2107,7 @@ func TestValidate_anchor_arraymap_pass(t *testing.T) {
"volumes": [
{
"name": "*",
"(hostPath)": {
"~(hostPath)": {
"path": "!/var/lib"
}
}
@ -2197,7 +2195,7 @@ func TestValidate_anchor_arraymap_fail(t *testing.T) {
"spec": {
"volumes": [
{
"(hostPath)": {
"~(hostPath)": {
"path": "!/var/lib"
}
}
@ -2283,7 +2281,7 @@ func TestValidate_anchor_map_notfound(t *testing.T) {
"message": "pod: validate run as non root user",
"pattern": {
"spec": {
"(securityContext)": {
"~(securityContext)": {
"runAsNonRoot": true
}
}
@ -2352,7 +2350,7 @@ func TestValidate_anchor_map_found_valid(t *testing.T) {
"message": "pod: validate run as non root user",
"pattern": {
"spec": {
"(securityContext)": {
"~(securityContext)": {
"runAsNonRoot": true
}
}
@ -2424,7 +2422,7 @@ func TestValidate_anchor_map_found_invalid(t *testing.T) {
"message": "pod: validate run as non root user",
"pattern": {
"spec": {
"(securityContext)": {
"~(securityContext)": {
"runAsNonRoot": true
}
}
@ -2496,7 +2494,7 @@ func TestValidate_AnchorList_pass(t *testing.T) {
"validate": {
"pattern": {
"spec": {
"(containers)": [
"~(containers)": [
{
"name": "nginx"
}
@ -2539,12 +2537,12 @@ func TestValidate_AnchorList_pass(t *testing.T) {
resourceUnstructured, err := ConvertToUnstructured(rawResource)
assert.NilError(t, err)
er := Validate(policy, *resourceUnstructured)
// msgs := []string{"Validation rule 'pod rule 2' failed at '/spec/securityContext/runAsNonRoot/' for resource Pod//myapp-pod. pod: validate run as non root user"}
msgs := []string{"Validation rule 'pod image rule' succesfully validated"}
// for _, r := range er.PolicyResponse.Rules {
// // t.Error(r.Message)
// // assert.Equal(t, r.Message, msgs[index])
// }
for index, r := range er.PolicyResponse.Rules {
t.Log(r.Message)
assert.Equal(t, r.Message, msgs[index])
}
assert.Assert(t, er.IsSuccesful())
}
@ -2570,7 +2568,7 @@ func TestValidate_AnchorList_fail(t *testing.T) {
"validate": {
"pattern": {
"spec": {
"(containers)": [
"~(containers)": [
{
"name": "nginx"
}
@ -2614,8 +2612,8 @@ func TestValidate_AnchorList_fail(t *testing.T) {
assert.NilError(t, err)
er := Validate(policy, *resourceUnstructured)
// msgs := []string{"Validation rule 'pod image rule' failed at '/spec/containers/1/name/' for resource Pod//myapp-pod."}
// for index, r := range er.PolicyResponse.Rules {
// // t.Log(r.Message)
// assert.Equal(t, r.Message, msgs[index])
// }
assert.Assert(t, !er.IsSuccesful())
@ -2687,10 +2685,10 @@ func TestValidate_existenceAnchor_fail(t *testing.T) {
resourceUnstructured, err := ConvertToUnstructured(rawResource)
assert.NilError(t, err)
er := Validate(policy, *resourceUnstructured)
// msgs := []string{"Validation rule 'pod image rule' failed at '/spec/containers/' for resource Pod//myapp-pod"}
// msgs := []string{"Validation rule 'pod image rule' failed at '/spec/containers/' for resource Pod//myapp-pod."}
// for index, r := range er.PolicyResponse.Rules {
// // t.Error(r.Message)
// t.Log(r.Message)
// assert.Equal(t, r.Message, msgs[index])
// }
assert.Assert(t, !er.IsSuccesful())
@ -2762,11 +2760,10 @@ func TestValidate_existenceAnchor_pass(t *testing.T) {
resourceUnstructured, err := ConvertToUnstructured(rawResource)
assert.NilError(t, err)
er := Validate(policy, *resourceUnstructured)
// msgs := []string{"Validation rule 'pod rule 2' failed at '/spec/securityContext/runAsNonRoot/' for resource Pod//myapp-pod. pod: validate run as non root user"}
msgs := []string{"Validation rule 'pod image rule' succesfully validated"}
// for _, r := range er.PolicyResponse.Rules {
// t.Error(r.Message)
// // assert.Equal(t, r.Message, msgs[index])
// }
for index, r := range er.PolicyResponse.Rules {
assert.Equal(t, r.Message, msgs[index])
}
assert.Assert(t, er.IsSuccesful())
}