1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-31 03:45:17 +00:00

working version of CRD validation for CLI

This commit is contained in:
NoSkillGirl 2020-08-30 20:43:05 +05:30
parent b61412ca7a
commit 6b6897f6e2
5 changed files with 209 additions and 173 deletions

View file

@ -95,7 +95,7 @@ func (t *LastReqTime) Run(pLister kyvernolister.ClusterPolicyLister, eventGen ev
timeDiff := time.Since(t.Time())
if timeDiff > maxDeadline {
err := fmt.Errorf("Admission control configuration error")
err := fmt.Errorf("admission control configuration error")
logger.Error(err, "webhook check failed", "deadline", maxDeadline)
if err := statuscontrol.FailedStatus(); err != nil {
logger.Error(err, "error setting webhook check status to failed")

View file

@ -4,11 +4,7 @@ import (
"bufio"
"bytes"
"encoding/json"
"errors"
"fmt"
"github.com/go-openapi/spec"
"github.com/go-openapi/strfmt"
"github.com/go-openapi/validate"
"io"
"io/ioutil"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
@ -16,10 +12,9 @@ import (
"path/filepath"
"regexp"
"strings"
//openapi_v2 "github.com/googleapis/gnostic/OpenAPIv2"
//"github.com/googleapis/gnostic/compiler"
yaml_v2 "sigs.k8s.io/yaml"
"errors"
jsonpatch "github.com/evanphx/json-patch"
"github.com/go-logr/logr"
v1 "github.com/nirmata/kyverno/pkg/api/kyverno/v1"
@ -220,167 +215,201 @@ func MutatePolicy(policy *v1.ClusterPolicy, logger logr.Logger) (*v1.ClusterPoli
return &p, nil
}
func ValidatePolicyAgainstCrd(policy *v1.ClusterPolicy, path string) error {
func ConvertFileToUnstructed(path string) (*unstructured.Unstructured, error) {
log := log.Log
path = filepath.Clean(path)
fileDesc, err := os.Stat(path)
if err != nil {
log.Error(err, "failed to describe crd file")
return err
log.Error(err, "failed to describe file", "file", path)
return nil, err
}
if fileDesc.IsDir() {
return errors.New("crd path should be a file")
return nil, errors.New("path should be a file")
}
bytes, err := ioutil.ReadFile(path)
if err != nil {
log.Error(err, "failed to crd read file")
return err
log.Error(err, "failed to read file", "file", path)
return nil, err
}
var crd unstructured.Unstructured
err = yaml_v2.Unmarshal(bytes, &crd)
var u unstructured.Unstructured
err = yaml_v2.Unmarshal(bytes, &u)
if err != nil {
return err
log.Error(err, "failed to convert file into unstructured object", "file", path)
return nil, err
}
log.Info("coming till here .................. 5")
// crdDefinitionPrior represents CRDs version prior to 1.16
var crdDefinitionPrior struct {
Spec struct {
Names struct {
Kind string `json:"kind"`
} `json:"names"`
Validation struct {
OpenAPIV3Schema interface{} `json:"openAPIV3Schema"`
} `json:"validation"`
} `json:"spec"`
}
// crdDefinitionNew represents CRDs version 1.16+
var crdDefinitionNew struct {
Spec struct {
Names struct {
Kind string `json:"kind"`
} `json:"names"`
Versions []struct {
Schema struct {
OpenAPIV3Schema interface{} `json:"openAPIV3Schema"`
} `json:"schema"`
Storage bool `json:"storage"`
} `json:"versions"`
} `json:"spec"`
}
log.Info("coming till here .................. 6")
crdRaw, _ := json.Marshal(crd.Object)
_ = json.Unmarshal(crdRaw, &crdDefinitionPrior)
log.Info("coming till here .................. 7")
openV3schema := crdDefinitionPrior.Spec.Validation.OpenAPIV3Schema
crdName := crdDefinitionPrior.Spec.Names.Kind
fmt.Println(crdName)
log.Info("coming till here .................. 8")
if openV3schema == nil {
log.Info("coming till here .................. coming into openV3Schema = nil")
_ = json.Unmarshal(crdRaw, &crdDefinitionNew)
for _, crdVersion := range crdDefinitionNew.Spec.Versions {
if crdVersion.Storage {
openV3schema = crdVersion.Schema.OpenAPIV3Schema
crdName = crdDefinitionNew.Spec.Names.Kind
break
}
}
}
log.Info("coming till here .................. 9")
log.Info("crd", "openV3schema", openV3schema)
schemaRaw, _ := json.Marshal(openV3schema)
if len(schemaRaw) < 1 {
//log.Log.V(3).Info("could not parse crd schema", "name", crdName)
return err
}
log.Info("coming till here .................. 10")
//schemaRaw, err = addingDefaultFieldsToSchema(schemaRaw)
//if err != nil {
// //log.Log.Error(err, "could not parse crd schema", "name", crdName)
// //return err
//}
log.Info("coming till here .................. 11")
schema := new(spec.Schema)
_ = json.Unmarshal(schemaRaw, schema)
// strfmt.Default is the registry of recognized formats
err = validate.AgainstSchema(schema, policy, strfmt.Default)
if err != nil {
fmt.Printf("JSON does not validate against schema: %v", err)
} else {
fmt.Printf("OK")
}
log.Info("coming till here .................. 14")
//var schema yaml_v2.MapSlice
//_ = yaml_v2.Unmarshal(schemaRaw, &schema)
//
//parsedSchema, err := openapi_v2.NewSchema(schema, compiler.NewContext("schema", nil))
//if err != nil {
// //log.Log.Error(err, "could not parse crd schema", "name", crdName)
// return
//}
//var spec yaml_v2.MapSlice
//err := yaml_v2.Unmarshal([]byte(data.SwaggerDoc), &spec)
//if err != nil {
// return err
//}
//
//crdDoc, err := openapi_v2.NewDocument(spec, compiler.NewContext("$root", nil))
//if err != nil {
// return err
//}
//
//crdDoc
return nil
return &u, nil
}
// addingDefaultFieldsToSchema will add any default missing fields like apiVersion, metadata
func addingDefaultFieldsToSchema(schemaRaw []byte) ([]byte, error) {
var schema struct {
Properties map[string]interface{} `json:"properties"`
}
_ = json.Unmarshal(schemaRaw, &schema)
if len(schema.Properties) < 1 {
return nil, errors.New("crd schema has no properties")
}
//func ValidatePolicyAgainstCrd(policy *v1.ClusterPolicy, path string) error {
// log := log.Log
// path = filepath.Clean(path)
//
// fileDesc, err := os.Stat(path)
// if err != nil {
// log.Error(err, "failed to describe crd file")
// return err
// }
//
// if fileDesc.IsDir() {
// return errors.New("crd path should be a file")
// }
//
// bytes, err := ioutil.ReadFile(path)
// if err != nil {
// log.Error(err, "failed to crd read file")
// return err
// }
//
// var crd unstructured.Unstructured
// err = yaml_v2.Unmarshal(bytes, &crd)
//
// if err != nil {
// return err
// }
// log.Info("coming till here .................. 5")
//
// // crdDefinitionPrior represents CRDs version prior to 1.16
// var crdDefinitionPrior struct {
// Spec struct {
// Names struct {
// Kind string `json:"kind"`
// } `json:"names"`
// Validation struct {
// OpenAPIV3Schema interface{} `json:"openAPIV3Schema"`
// } `json:"validation"`
// } `json:"spec"`
// }
//
// // crdDefinitionNew represents CRDs version 1.16+
// var crdDefinitionNew struct {
// Spec struct {
// Names struct {
// Kind string `json:"kind"`
// } `json:"names"`
// Versions []struct {
// Schema struct {
// OpenAPIV3Schema interface{} `json:"openAPIV3Schema"`
// } `json:"schema"`
// Storage bool `json:"storage"`
// } `json:"versions"`
// } `json:"spec"`
// }
//
// log.Info("coming till here .................. 6")
// crdRaw, _ := json.Marshal(crd.Object)
// _ = json.Unmarshal(crdRaw, &crdDefinitionPrior)
//
// log.Info("coming till here .................. 7")
// openV3schema := crdDefinitionPrior.Spec.Validation.OpenAPIV3Schema
// crdName := crdDefinitionPrior.Spec.Names.Kind
// fmt.Println(crdName)
//
// log.Info("coming till here .................. 8")
//
// if openV3schema == nil {
// log.Info("coming till here .................. coming into openV3Schema = nil")
// _ = json.Unmarshal(crdRaw, &crdDefinitionNew)
// for _, crdVersion := range crdDefinitionNew.Spec.Versions {
// if crdVersion.Storage {
// openV3schema = crdVersion.Schema.OpenAPIV3Schema
// crdName = crdDefinitionNew.Spec.Names.Kind
// break
// }
// }
// }
//
// log.Info("coming till here .................. 9")
// log.Info("crd", "openV3schema", openV3schema)
//
// schemaRaw, _ := json.Marshal(openV3schema)
// if len(schemaRaw) < 1 {
// //log.Log.V(3).Info("could not parse crd schema", "name", crdName)
// return err
// }
// log.Info("coming till here .................. 10")
//
// //schemaRaw, err = addingDefaultFieldsToSchema(schemaRaw)
// //if err != nil {
// // //log.Log.Error(err, "could not parse crd schema", "name", crdName)
// // //return err
// //}
// log.Info("coming till here .................. 11")
//
// schema := new(spec.Schema)
// _ = json.Unmarshal(schemaRaw, schema)
//
//
// // strfmt.Default is the registry of recognized formats
// err = validate.AgainstSchema(schema, policy, strfmt.Default)
// if err != nil {
// fmt.Printf("JSON does not validate against schema: %v", err)
// } else {
// fmt.Printf("OK")
// }
// log.Info("coming till here .................. 14")
//
// //var schema yaml_v2.MapSlice
// //_ = yaml_v2.Unmarshal(schemaRaw, &schema)
// //
// //parsedSchema, err := openapi_v2.NewSchema(schema, compiler.NewContext("schema", nil))
// //if err != nil {
// // //log.Log.Error(err, "could not parse crd schema", "name", crdName)
// // return
// //}
//
//
//
// //var spec yaml_v2.MapSlice
// //err := yaml_v2.Unmarshal([]byte(data.SwaggerDoc), &spec)
// //if err != nil {
// // return err
// //}
// //
// //crdDoc, err := openapi_v2.NewDocument(spec, compiler.NewContext("$root", nil))
// //if err != nil {
// // return err
// //}
// //
// //crdDoc
//
// return nil
//}
//
//// addingDefaultFieldsToSchema will add any default missing fields like apiVersion, metadata
//func addingDefaultFieldsToSchema(schemaRaw []byte) ([]byte, error) {
// var schema struct {
// Properties map[string]interface{} `json:"properties"`
// }
// _ = json.Unmarshal(schemaRaw, &schema)
//
// if len(schema.Properties) < 1 {
// return nil, errors.New("crd schema has no properties")
// }
//
// if schema.Properties["apiVersion"] == nil {
// apiVersionDefRaw := `{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"}`
// apiVersionDef := make(map[string]interface{})
// _ = json.Unmarshal([]byte(apiVersionDefRaw), &apiVersionDef)
// schema.Properties["apiVersion"] = apiVersionDef
// }
//
// if schema.Properties["metadata"] == nil {
// metadataDefRaw := `{"$ref":"#/definitions/io.k8s.apimachinery.pkg.apis.meta.v1.ObjectMeta","description":"Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata"}`
// metadataDef := make(map[string]interface{})
// _ = json.Unmarshal([]byte(metadataDefRaw), &metadataDef)
// schema.Properties["metadata"] = metadataDef
// }
//
// schemaWithDefaultFields, _ := json.Marshal(schema)
//
// return schemaWithDefaultFields, nil
//}
if schema.Properties["apiVersion"] == nil {
apiVersionDefRaw := `{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"}`
apiVersionDef := make(map[string]interface{})
_ = json.Unmarshal([]byte(apiVersionDefRaw), &apiVersionDef)
schema.Properties["apiVersion"] = apiVersionDef
}
if schema.Properties["metadata"] == nil {
metadataDefRaw := `{"$ref":"#/definitions/io.k8s.apimachinery.pkg.apis.meta.v1.ObjectMeta","description":"Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata"}`
metadataDef := make(map[string]interface{})
_ = json.Unmarshal([]byte(metadataDefRaw), &metadataDef)
schema.Properties["metadata"] = metadataDef
}
schemaWithDefaultFields, _ := json.Marshal(schema)
return schemaWithDefaultFields, nil
}

View file

@ -4,9 +4,8 @@ import (
"encoding/json"
"errors"
"fmt"
"os"
"github.com/nirmata/kyverno/pkg/utils"
"os"
"github.com/nirmata/kyverno/pkg/kyverno/common"
"github.com/nirmata/kyverno/pkg/kyverno/sanitizedError"
@ -21,16 +20,19 @@ import (
)
func Command() *cobra.Command {
var outputType, crdPath string
var outputType string
var crdPaths []string
cmd := &cobra.Command{
Use: "validate",
Short: "Validates kyverno policies",
Example: "kyverno validate /path/to/policy.yaml /path/to/folderOfPolicies",
RunE: func(cmd *cobra.Command, policyPaths []string) (err error) {
log := log.Log
defer func() {
if err != nil {
if !sanitizedError.IsErrorSanitized(err) {
log.Log.Error(err, "failed to sanitize")
log.Error(err, "failed to sanitize")
err = fmt.Errorf("internal error")
}
}
@ -47,28 +49,34 @@ func Command() *cobra.Command {
return err
}
// if CRD's are passed, add these to OpenAPIController
if len(crdPaths) > 0 {
//err := common.ValidatePolicyAgainstCrd(policy, crdPath)
//if err != nil {
// log.Log.Error(err, "policy "+policy.Name+" is invalid")
// //os.Exit(1)
// return err
//}
for _, path := range crdPaths {
crd, err := common.ConvertFileToUnstructed(path)
if err != nil {
log.Error(err, "crd is invalid", "file", path)
}
openAPIController.ParseCRD(*crd)
}
}
invalidPolicyFound := false
for _, policy := range policies {
// if crd is passed, then validate policy against the crd
if crdPath != "" {
err := common.ValidatePolicyAgainstCrd(policy, crdPath)
if err != nil {
log.Log.Error(err, "policy "+policy.Name+" is invalid")
//os.Exit(1)
return err
}
}
err := policy2.Validate(utils.MarshalPolicy(*policy), nil, true, openAPIController)
if err != nil {
fmt.Printf("Policy %s is invalid.\n", policy.Name)
log.Log.Error(err, "policy "+policy.Name+" is invalid")
log.Error(err, "policy "+policy.Name+" is invalid")
invalidPolicyFound = true
} else {
fmt.Printf("Policy %s is valid.\n\n", policy.Name)
if outputType != "" {
logger := log.Log.WithName("validate")
logger := log.WithName("validate")
p, err := common.MutatePolicy(policy, logger)
if err != nil {
if !sanitizedError.IsErrorSanitized(err) {
@ -85,7 +93,6 @@ func Command() *cobra.Command {
}
}
}
fmt.Println("-----------------------------------------------------------------------")
}
if invalidPolicyFound == true {
@ -95,6 +102,6 @@ func Command() *cobra.Command {
},
}
cmd.Flags().StringVarP(&outputType, "output", "o", "", "Prints the mutated policy")
cmd.Flags().StringVarP(&crdPath, "crd", "c", "", "Path to resource files")
cmd.Flags().StringArrayVarP(&crdPaths, "crd", "c", []string{}, "Path to CRD files")
return cmd
}

View file

@ -102,7 +102,7 @@ func (c *crdSync) sync() {
c.controller.deleteCRDFromPreviousSync()
for _, crd := range crds.Items {
c.controller.parseCRD(crd)
c.controller.ParseCRD(crd)
}
}
@ -115,7 +115,7 @@ func (o *Controller) deleteCRDFromPreviousSync() {
o.crdList = make([]string, 0)
}
func (o *Controller) parseCRD(crd unstructured.Unstructured) {
func (o *Controller) ParseCRD(crd unstructured.Unstructured) {
var err error
crdRaw, _ := json.Marshal(crd.Object)

View file

@ -288,7 +288,7 @@ func (ws *WebhookServer) ResourceMutation(request *v1beta1.AdmissionRequest) *v1
roles, clusterRoles, err = userinfo.GetRoleRef(ws.rbLister, ws.crbLister, request, ws.configHandler)
if err != nil {
// TODO(shuting): continue apply policy if error getting roleRef?
logger.Error(err, "failed to get RBAC infromation for request")
logger.Error(err, "failed to get RBAC information for request")
}
}
@ -508,7 +508,7 @@ func (ws *WebhookServer) RunAsync(stopCh <-chan struct{}) {
}(ws)
logger.Info("starting")
// verifys if the admission control is enabled and active
// verifies if the admission control is enabled and active
// resync: 60 seconds
// deadline: 60 seconds (send request)
// max deadline: deadline*3 (set the deployment annotation as false)