mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-31 03:45:17 +00:00
Merge pull request #540 from nirmata/499_policy_validation_userinfo
499 policy validation userinfo
This commit is contained in:
commit
5c089deaaa
2 changed files with 118 additions and 0 deletions
|
@ -6,9 +6,11 @@ import (
|
|||
"reflect"
|
||||
"regexp"
|
||||
"strconv"
|
||||
"strings"
|
||||
|
||||
kyverno "github.com/nirmata/kyverno/pkg/api/kyverno/v1"
|
||||
"github.com/nirmata/kyverno/pkg/engine/anchor"
|
||||
rbacv1 "k8s.io/api/rbac/v1"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
)
|
||||
|
||||
|
@ -60,6 +62,11 @@ func Validate(p kyverno.ClusterPolicy) error {
|
|||
}
|
||||
|
||||
func validateResources(rule kyverno.Rule) (string, error) {
|
||||
// validate userInfo in match and exclude
|
||||
if path, err := validateUserInfo(rule); err != nil {
|
||||
return fmt.Sprintf("resources.%s", path), err
|
||||
}
|
||||
|
||||
// matched resources
|
||||
if path, err := validateMatchedResourceDescription(rule.MatchResources.ResourceDescription); err != nil {
|
||||
return fmt.Sprintf("resources.%s", path), err
|
||||
|
@ -127,6 +134,57 @@ func validateMatchedResourceDescription(rd kyverno.ResourceDescription) (string,
|
|||
return "", nil
|
||||
}
|
||||
|
||||
func validateUserInfo(rule kyverno.Rule) (string, error) {
|
||||
if err := validateRoles(rule.MatchResources.Roles); err != nil {
|
||||
return "match.roles", err
|
||||
}
|
||||
|
||||
if err := validateSubjects(rule.MatchResources.Subjects); err != nil {
|
||||
return "match.subjects", err
|
||||
}
|
||||
|
||||
if err := validateRoles(rule.ExcludeResources.Roles); err != nil {
|
||||
return "exclude.roles", err
|
||||
}
|
||||
|
||||
if err := validateSubjects(rule.ExcludeResources.Subjects); err != nil {
|
||||
return "exclude.subjects", err
|
||||
}
|
||||
|
||||
return "", nil
|
||||
}
|
||||
|
||||
// a role must in format namespace:name
|
||||
func validateRoles(roles []string) error {
|
||||
if len(roles) == 0 {
|
||||
return nil
|
||||
}
|
||||
|
||||
for _, r := range roles {
|
||||
role := strings.Split(r, ":")
|
||||
if len(role) != 2 {
|
||||
return fmt.Errorf("invalid role %s, expect namespace:name", r)
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// a namespace should be set in kind ServiceAccount of a subject
|
||||
func validateSubjects(subjects []rbacv1.Subject) error {
|
||||
if len(subjects) == 0 {
|
||||
return nil
|
||||
}
|
||||
|
||||
for _, subject := range subjects {
|
||||
if subject.Kind == "ServiceAccount" {
|
||||
if subject.Namespace == "" {
|
||||
return fmt.Errorf("service account %s in subject expects a namespace", subject.Name)
|
||||
}
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func validateExcludeResourceDescription(rd kyverno.ResourceDescription) (string, error) {
|
||||
if reflect.DeepEqual(rd, kyverno.ResourceDescription{}) {
|
||||
// exclude is not mandatory
|
||||
|
|
|
@ -1120,3 +1120,63 @@ func Test_Validate_ErrorFormat(t *testing.T) {
|
|||
err = Validate(policy)
|
||||
assert.Assert(t, err != nil)
|
||||
}
|
||||
|
||||
func Test_Validate_EmptyUserInfo(t *testing.T) {
|
||||
rawRule := []byte(`
|
||||
{
|
||||
"name": "test",
|
||||
"match": {
|
||||
"subjects": null
|
||||
}
|
||||
}`)
|
||||
|
||||
var rule kyverno.Rule
|
||||
err := json.Unmarshal(rawRule, &rule)
|
||||
assert.NilError(t, err)
|
||||
|
||||
_, errNew := validateUserInfo(rule)
|
||||
assert.NilError(t, errNew)
|
||||
}
|
||||
|
||||
func Test_Validate_Roles(t *testing.T) {
|
||||
rawRule := []byte(`{
|
||||
"name": "test",
|
||||
"match": {
|
||||
"roles": [
|
||||
"namespace1:name1",
|
||||
"name2"
|
||||
]
|
||||
}
|
||||
}`)
|
||||
|
||||
var rule kyverno.Rule
|
||||
err := json.Unmarshal(rawRule, &rule)
|
||||
assert.NilError(t, err)
|
||||
|
||||
path, err := validateUserInfo(rule)
|
||||
assert.Assert(t, err != nil)
|
||||
assert.Assert(t, path == "match.roles")
|
||||
}
|
||||
|
||||
func Test_Validate_ServiceAccount(t *testing.T) {
|
||||
rawRule := []byte(`
|
||||
{
|
||||
"name": "test",
|
||||
"exclude": {
|
||||
"subjects": [
|
||||
{
|
||||
"kind": "ServiceAccount",
|
||||
"name": "testname"
|
||||
}
|
||||
]
|
||||
}
|
||||
}`)
|
||||
|
||||
var rule kyverno.Rule
|
||||
err := json.Unmarshal(rawRule, &rule)
|
||||
assert.NilError(t, err)
|
||||
|
||||
path, err := validateUserInfo(rule)
|
||||
assert.Assert(t, err != nil)
|
||||
assert.Assert(t, path == "exclude.subjects")
|
||||
}
|
||||
|
|
Loading…
Add table
Reference in a new issue