1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-31 03:45:17 +00:00

add special variable substitution logic for preconditions (#1930)

* add special variable substitution logic for preconditions

Signed-off-by: Max Goncharenko <kacejot@fex.net>

* handle NotFoundVariable error in proper way

Signed-off-by: Maxim Goncharenko <goncharenko.maxim@apriorit.com>

* remove excess log; fix grammar

Signed-off-by: Maxim Goncharenko <goncharenko.maxim@apriorit.com>

* removed isPrecondition flag; added test case for empty deny string; fixed related issue

Signed-off-by: Maxim Goncharenko <goncharenko.maxim@apriorit.com>

* fix test case

Signed-off-by: Maxim Goncharenko <goncharenko.maxim@apriorit.com>

* fix go lint

Signed-off-by: Maxim Goncharenko <goncharenko.maxim@apriorit.com>

* fix tests

Signed-off-by: Maxim Goncharenko <goncharenko.maxim@apriorit.com>
This commit is contained in:
Max Goncharenko 2021-07-28 19:54:50 +03:00 committed by GitHub
parent 4c99b51fb7
commit 903963c26d
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
15 changed files with 427 additions and 280 deletions

View file

@ -3,10 +3,11 @@ package context
import (
"encoding/json"
"fmt"
"github.com/pkg/errors"
"reflect"
"strings"
"github.com/pkg/errors"
jmespath "github.com/kyverno/kyverno/pkg/engine/jmespath"
)

View file

@ -60,6 +60,7 @@ func filterRule(rule kyverno.Rule, policyContext *PolicyContext) *response.RuleR
return nil
}
var err error
startTime := time.Now()
policy := policyContext.Policy
@ -74,10 +75,10 @@ func filterRule(rule kyverno.Rule, policyContext *PolicyContext) *response.RuleR
logger := log.Log.WithName("Generate").WithValues("policy", policy.Name,
"kind", newResource.GetKind(), "namespace", newResource.GetNamespace(), "name", newResource.GetName())
if err := MatchesResourceDescription(newResource, rule, admissionInfo, excludeGroupRole, namespaceLabels); err != nil {
if err = MatchesResourceDescription(newResource, rule, admissionInfo, excludeGroupRole, namespaceLabels); err != nil {
// if the oldResource matched, return "false" to delete GR for it
if err := MatchesResourceDescription(oldResource, rule, admissionInfo, excludeGroupRole, namespaceLabels); err == nil {
if err = MatchesResourceDescription(oldResource, rule, admissionInfo, excludeGroupRole, namespaceLabels); err == nil {
return &response.RuleResponse{
Name: rule.Name,
Type: "Generation",
@ -95,11 +96,17 @@ func filterRule(rule kyverno.Rule, policyContext *PolicyContext) *response.RuleR
policyContext.JSONContext.Checkpoint()
defer policyContext.JSONContext.Restore()
if err := LoadContext(logger, rule.Context, resCache, policyContext, rule.Name); err != nil {
if err = LoadContext(logger, rule.Context, resCache, policyContext, rule.Name); err != nil {
logger.V(4).Info("cannot add external data to the context", "reason", err.Error())
return nil
}
rule.AnyAllConditions, err = variables.SubstituteAllInPreconditions(logger, ctx, rule.AnyAllConditions)
if err != nil {
logger.V(4).Info("failed to substitute vars in preconditions, skip current rule", "rule name", rule.Name)
return nil
}
// operate on the copy of the conditions, as we perform variable substitution
copyConditions, err := copyConditions(rule.AnyAllConditions)
if err != nil {
@ -108,7 +115,7 @@ func filterRule(rule kyverno.Rule, policyContext *PolicyContext) *response.RuleR
}
// evaluate pre-conditions
if !variables.EvaluateConditions(logger, ctx, copyConditions, true) {
if !variables.EvaluateConditions(logger, ctx, copyConditions) {
logger.V(4).Info("preconditions not satisfied, skipping rule", "rule", rule.Name)
return nil
}

View file

@ -50,6 +50,8 @@ func Mutate(policyContext *PolicyContext) (resp *response.EngineResponse) {
policyContext.JSONContext.Checkpoint()
defer policyContext.JSONContext.Restore()
var err error
for _, rule := range policy.Spec.Rules {
if !rule.HasMutate() {
continue
@ -63,7 +65,7 @@ func Mutate(policyContext *PolicyContext) (resp *response.EngineResponse) {
excludeResource = policyContext.ExcludeGroupRole
}
if err := MatchesResourceDescription(patchedResource, rule, policyContext.AdmissionInfo, excludeResource, policyContext.NamespaceLabels); err != nil {
if err = MatchesResourceDescription(patchedResource, rule, policyContext.AdmissionInfo, excludeResource, policyContext.NamespaceLabels); err != nil {
logger.V(4).Info("rule not matched", "reason", err.Error())
continue
}
@ -91,6 +93,12 @@ func Mutate(policyContext *PolicyContext) (resp *response.EngineResponse) {
continue
}
rule.AnyAllConditions, err = variables.SubstituteAllInPreconditions(logger, ctx, rule.AnyAllConditions)
if err != nil {
logger.V(3).Info("failed to substitute vars in preconditions, skip current rule", "rule name", rule.Name)
continue
}
// operate on the copy of the conditions, as we perform variable substitution
copyConditions, err := copyConditions(rule.AnyAllConditions)
if err != nil {
@ -99,7 +107,7 @@ func Mutate(policyContext *PolicyContext) (resp *response.EngineResponse) {
}
// evaluate pre-conditions
// - handle variable substitutions
if !variables.EvaluateConditions(logger, ctx, copyConditions, true) {
if !variables.EvaluateConditions(logger, ctx, copyConditions) {
logger.V(3).Info("resource fails the preconditions")
continue
}

View file

@ -111,6 +111,12 @@ func validateResource(log logr.Logger, ctx *PolicyContext) *response.EngineRespo
log.V(3).Info("matched validate rule")
rule.AnyAllConditions, err = variables.SubstituteAllInPreconditions(log, ctx.JSONContext, rule.AnyAllConditions)
if err != nil {
log.V(4).Info("failed to substitute vars in preconditions, skip current rule", "rule name", rule.Name)
return nil
}
// operate on the copy of the conditions, as we perform variable substitution
preconditionsCopy, err := copyConditions(rule.AnyAllConditions)
if err != nil {
@ -119,32 +125,16 @@ func validateResource(log logr.Logger, ctx *PolicyContext) *response.EngineRespo
}
// evaluate pre-conditions
if !variables.EvaluateConditions(log, ctx.JSONContext, preconditionsCopy, true) {
if !variables.EvaluateConditions(log, ctx.JSONContext, preconditionsCopy) {
log.V(4).Info("resource fails the preconditions")
continue
}
if rule, err = variables.SubstituteAllInRule(log, ctx.JSONContext, rule); err != nil {
ruleResp := response.RuleResponse{
Name: rule.Name,
Type: utils.Validation.String(),
Message: fmt.Sprintf("variable substitution failed for rule %s: %s", rule.Name, err.Error()),
Success: true,
}
incrementAppliedCount(resp)
resp.PolicyResponse.Rules = append(resp.PolicyResponse.Rules, ruleResp)
switch err.(type) {
case gojmespath.NotFoundError:
log.V(2).Info("failed to substitute variables, skip current rule", "info", err.Error(), "rule name", rule.Name)
default:
log.Error(err, "failed to substitute variables, skip current rule", "rule name", rule.Name)
}
continue
}
if rule.Validation.Pattern != nil || rule.Validation.AnyPattern != nil {
if rule, err = substituteAll(log, ctx, rule, resp); err != nil {
continue
}
ruleResponse := validateResourceWithRule(log, ctx, rule)
if ruleResponse != nil {
if !common.IsConditionalAnchorError(ruleResponse.Message) {
@ -153,12 +143,22 @@ func validateResource(log logr.Logger, ctx *PolicyContext) *response.EngineRespo
}
}
} else if rule.Validation.Deny != nil {
rule.Validation.Deny.AnyAllConditions, err = variables.SubstituteAllInPreconditions(log, ctx.JSONContext, rule.Validation.Deny.AnyAllConditions)
if err != nil {
log.V(4).Info("failed to substitute vars in preconditions, skip current rule", "rule name", rule.Name)
continue
}
if rule, err = substituteAll(log, ctx, rule, resp); err != nil {
continue
}
denyConditionsCopy, err := copyConditions(rule.Validation.Deny.AnyAllConditions)
if err != nil {
log.V(2).Info("wrongfully configured data", "reason", err.Error())
continue
}
deny := variables.EvaluateConditions(log, ctx.JSONContext, denyConditionsCopy, false)
deny := variables.EvaluateConditions(log, ctx.JSONContext, denyConditionsCopy)
ruleResp := response.RuleResponse{
Name: rule.Name,
Type: utils.Validation.String(),
@ -329,3 +329,29 @@ func buildAnyPatternErrorMessage(rule kyverno.Rule, errors []string) string {
return fmt.Sprintf("validation error: %s. %s", rule.Validation.Message, errStr)
}
func substituteAll(log logr.Logger, ctx *PolicyContext, rule kyverno.Rule, resp *response.EngineResponse) (kyverno.Rule, error) {
var err error
if rule, err = variables.SubstituteAllInRule(log, ctx.JSONContext, rule); err != nil {
ruleResp := response.RuleResponse{
Name: rule.Name,
Type: utils.Validation.String(),
Message: fmt.Sprintf("variable substitution failed for rule %s: %s", rule.Name, err.Error()),
Success: true,
}
incrementAppliedCount(resp)
resp.PolicyResponse.Rules = append(resp.PolicyResponse.Rules, ruleResp)
switch err.(type) {
case gojmespath.NotFoundError:
log.V(2).Info("failed to substitute variables, skip current rule", "info", err.Error(), "rule name", rule.Name)
default:
log.Error(err, "failed to substitute variables, skip current rule", "rule name", rule.Name)
}
return rule, err
}
return rule, nil
}

View file

@ -1929,8 +1929,8 @@ func Test_Flux_Kustomization_PathNotPresent(t *testing.T) {
policyRaw: []byte(`{"apiVersion":"kyverno.io/v1","kind":"ClusterPolicy","metadata":{"name":"flux-multi-tenancy"},"spec":{"validationFailureAction":"enforce","rules":[{"name":"serviceAccountName","exclude":{"resources":{"namespaces":["flux-system"]}},"match":{"resources":{"kinds":["Kustomization","HelmRelease"]}},"validate":{"message":".spec.serviceAccountName is required","pattern":{"spec":{"serviceAccountName":"?*"}}}},{"name":"sourceRefNamespace","exclude":{"resources":{"namespaces":["flux-system"]}},"match":{"resources":{"kinds":["Kustomization","HelmRelease"]}},"validate":{"message":"spec.sourceRef.namespace must be the same as metadata.namespace","deny":{"conditions":[{"key":"{{request.object.spec.sourceRef.namespace}}","operator":"NotEquals","value":"{{request.object.metadata.namespace}}"}]}}}]}}`),
// referred variable path not present
resourceRaw: []byte(`{"apiVersion":"kustomize.toolkit.fluxcd.io/v1beta1","kind":"Kustomization","metadata":{"name":"dev-team","namespace":"apps"},"spec":{"serviceAccountName":"dev-team","interval":"5m","sourceRef":{"kind":"GitRepository","name":"dev-team"},"prune":true,"validation":"client"}}`),
expectedResult: true,
expectedMessage: "variable substitution failed for rule sourceRefNamespace: Unknown key \"namespace\" in path",
expectedResult: false,
expectedMessage: "spec.sourceRef.namespace must be the same as metadata.namespace",
},
{
name: "resource-with-violation",
@ -2242,3 +2242,178 @@ func TestValidate_context_variable_substitution_CLI(t *testing.T) {
}
assert.Assert(t, !er.IsSuccessful())
}
func Test_EmptyStringInDenyCondition(t *testing.T) {
policyRaw := []byte(`{
"apiVersion": "kyverno.io/v1",
"kind": "ClusterPolicy",
"metadata": {
"annotations": {
"meta.helm.sh/release-name": "kyverno-policies",
"meta.helm.sh/release-namespace": "kyverno",
"pod-policies.kyverno.io/autogen-controllers": "none"
},
"labels": {
"app.kubernetes.io/managed-by": "Helm"
},
"name": "if-baltic-restrict-external-load-balancer"
},
"spec": {
"background": true,
"rules": [
{
"match": {
"resources": {
"kinds": [
"Service"
]
}
},
"name": "match-service-type",
"preconditions": [
{
"key": "{{request.object.spec.type}}",
"operator": "Equals",
"value": "LoadBalancer"
}
],
"validate": {
"deny": {
"conditions": [
{
"key": "{{ request.object.metadata.annotations.\"service.beta.kubernetes.io/azure-load-balancer-internal\"}}",
"operator": "NotEquals",
"value": "true"
}
]
}
}
}
],
"validationFailureAction": "enforce"
}
}`)
resourceRaw := []byte(`{
"apiVersion": "v1",
"kind": "Service",
"metadata": {
"name": "example-service"
},
"spec": {
"selector": {
"app": "example"
},
"ports": [
{
"port": 8765,
"targetPort": 9376
}
],
"type": "LoadBalancer"
}
}`)
var policy kyverno.ClusterPolicy
err := json.Unmarshal(policyRaw, &policy)
assert.NilError(t, err)
ctx := context.NewContext()
err = ctx.AddResource(resourceRaw)
assert.NilError(t, err)
resourceUnstructured, err := utils.ConvertToUnstructured(resourceRaw)
assert.NilError(t, err)
er := Validate(&PolicyContext{Policy: policy, NewResource: *resourceUnstructured, JSONContext: ctx})
assert.Assert(t, !er.IsSuccessful())
}
func Test_StringInDenyCondition(t *testing.T) {
policyRaw := []byte(`{
"apiVersion": "kyverno.io/v1",
"kind": "ClusterPolicy",
"metadata": {
"annotations": {
"meta.helm.sh/release-name": "kyverno-policies",
"meta.helm.sh/release-namespace": "kyverno",
"pod-policies.kyverno.io/autogen-controllers": "none"
},
"labels": {
"app.kubernetes.io/managed-by": "Helm"
},
"name": "if-baltic-restrict-external-load-balancer"
},
"spec": {
"background": true,
"rules": [
{
"match": {
"resources": {
"kinds": [
"Service"
]
}
},
"name": "match-service-type",
"preconditions": [
{
"key": "{{request.object.spec.type}}",
"operator": "Equals",
"value": "LoadBalancer"
}
],
"validate": {
"deny": {
"conditions": [
{
"key": "{{ request.object.metadata.annotations.\"service.beta.kubernetes.io/azure-load-balancer-internal\"}}",
"operator": "NotEquals",
"value": "true"
}
]
}
}
}
],
"validationFailureAction": "enforce"
}
}`)
resourceRaw := []byte(`{
"apiVersion": "v1",
"kind": "Service",
"metadata": {
"name": "example-service",
"annotations": {
"service.beta.kubernetes.io/azure-load-balancer-internal": "true"
}
},
"spec": {
"selector": {
"app": "example"
},
"ports": [
{
"port": 8765,
"targetPort": 9376
}
],
"type": "LoadBalancer"
}
}`)
var policy kyverno.ClusterPolicy
err := json.Unmarshal(policyRaw, &policy)
assert.NilError(t, err)
ctx := context.NewContext()
err = ctx.AddResource(resourceRaw)
assert.NilError(t, err)
resourceUnstructured, err := utils.ConvertToUnstructured(resourceRaw)
assert.NilError(t, err)
er := Validate(&PolicyContext{Policy: policy, NewResource: *resourceUnstructured, JSONContext: ctx})
assert.Assert(t, er.IsSuccessful())
}

View file

@ -8,28 +8,28 @@ import (
)
//Evaluate evaluates the condition
func Evaluate(log logr.Logger, ctx context.EvalInterface, condition kyverno.Condition, isPreCondition bool) bool {
func Evaluate(log logr.Logger, ctx context.EvalInterface, condition kyverno.Condition) bool {
// get handler for the operator
handle := operator.CreateOperatorHandler(log, ctx, condition.Operator, SubstituteAll)
handle := operator.CreateOperatorHandler(log, ctx, condition.Operator)
if handle == nil {
return false
}
return handle.Evaluate(condition.Key, condition.Value, isPreCondition)
return handle.Evaluate(condition.Key, condition.Value)
}
//EvaluateConditions evalues all the conditions present in a slice, in a backwards compatible way
func EvaluateConditions(log logr.Logger, ctx context.EvalInterface, conditions interface{}, isPreCondition bool) bool {
func EvaluateConditions(log logr.Logger, ctx context.EvalInterface, conditions interface{}) bool {
switch typedConditions := conditions.(type) {
case kyverno.AnyAllConditions:
return evaluateAnyAllConditions(log, ctx, typedConditions, isPreCondition)
return evaluateAnyAllConditions(log, ctx, typedConditions)
case []kyverno.Condition: // backwards compatibility
return evaluateOldConditions(log, ctx, typedConditions, isPreCondition)
return evaluateOldConditions(log, ctx, typedConditions)
}
return false
}
//evaluateAnyAllConditions evaluates multiple conditions as a logical AND (all) or OR (any) operation depending on the conditions
func evaluateAnyAllConditions(log logr.Logger, ctx context.EvalInterface, conditions kyverno.AnyAllConditions, isPreCondition bool) bool {
func evaluateAnyAllConditions(log logr.Logger, ctx context.EvalInterface, conditions kyverno.AnyAllConditions) bool {
anyConditions, allConditions := conditions.AnyConditions, conditions.AllConditions
anyConditionsResult, allConditionsResult := true, true
@ -37,7 +37,7 @@ func evaluateAnyAllConditions(log logr.Logger, ctx context.EvalInterface, condit
if anyConditions != nil {
anyConditionsResult = false
for _, condition := range anyConditions {
if Evaluate(log, ctx, condition, isPreCondition) {
if Evaluate(log, ctx, condition) {
anyConditionsResult = true
break
}
@ -47,7 +47,7 @@ func evaluateAnyAllConditions(log logr.Logger, ctx context.EvalInterface, condit
// update the allConditionsResult if they are present
if allConditions != nil {
for _, condition := range allConditions {
if !Evaluate(log, ctx, condition, isPreCondition) {
if !Evaluate(log, ctx, condition) {
allConditionsResult = false
break
}
@ -59,9 +59,9 @@ func evaluateAnyAllConditions(log logr.Logger, ctx context.EvalInterface, condit
}
//evaluateOldConditions evaluates multiple conditions when those conditions are provided in the old manner i.e. without 'any' or 'all'
func evaluateOldConditions(log logr.Logger, ctx context.EvalInterface, conditions []kyverno.Condition, isPreCondition bool) bool {
func evaluateOldConditions(log logr.Logger, ctx context.EvalInterface, conditions []kyverno.Condition) bool {
for _, condition := range conditions {
if !Evaluate(log, ctx, condition, isPreCondition) {
if !Evaluate(log, ctx, condition) {
return false
}
}

View file

@ -6,6 +6,7 @@ import (
kyverno "github.com/kyverno/kyverno/pkg/api/kyverno/v1"
"github.com/kyverno/kyverno/pkg/engine/context"
"github.com/stretchr/testify/assert"
"sigs.k8s.io/controller-runtime/pkg/log"
)
@ -19,7 +20,7 @@ func Test_Eval_Equal_Const_String_Pass(t *testing.T) {
Value: "name",
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -33,7 +34,7 @@ func Test_Eval_Equal_Const_String_Fail(t *testing.T) {
Value: "name1",
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -47,7 +48,7 @@ func Test_Eval_NoEqual_Const_String_Pass(t *testing.T) {
Value: "name1",
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -61,7 +62,7 @@ func Test_Eval_NoEqual_Const_String_Fail(t *testing.T) {
Value: "name",
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -73,7 +74,7 @@ func Test_Eval_GreaterThanOrEquals_Const_string_Equal_Pass(t *testing.T) {
Operator: kyverno.GreaterThanOrEquals,
Value: 1.0,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -85,7 +86,7 @@ func Test_Eval_GreaterThanOrEquals_Const_string_Greater_Pass(t *testing.T) {
Operator: kyverno.GreaterThanOrEquals,
Value: 0,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -97,7 +98,7 @@ func Test_Eval_GreaterThanOrEquals_Const_string_Fail(t *testing.T) {
Operator: kyverno.GreaterThanOrEquals,
Value: "2",
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -109,7 +110,7 @@ func Test_Eval_GreaterThan_Const_string_Equal_Fail(t *testing.T) {
Operator: kyverno.GreaterThan,
Value: 1.0,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -121,7 +122,7 @@ func Test_Eval_GreaterThan_Const_string_Greater_Pass(t *testing.T) {
Operator: kyverno.GreaterThan,
Value: 0,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -133,7 +134,7 @@ func Test_Eval_GreaterThan_Const_string_Fail(t *testing.T) {
Operator: kyverno.GreaterThan,
Value: "2",
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -145,7 +146,7 @@ func Test_Eval_LessThanOrEquals_Const_string_Equal_Pass(t *testing.T) {
Operator: kyverno.LessThanOrEquals,
Value: 1.0,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -157,7 +158,7 @@ func Test_Eval_LessThanOrEquals_Const_string_Less_Pass(t *testing.T) {
Operator: kyverno.LessThanOrEquals,
Value: 1,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -169,7 +170,7 @@ func Test_Eval_LessThanOrEquals_Const_string_Fail(t *testing.T) {
Operator: kyverno.LessThanOrEquals,
Value: "1.1",
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -181,7 +182,7 @@ func Test_Eval_LessThan_Const_string_Equal_Pass(t *testing.T) {
Operator: kyverno.LessThan,
Value: 1.0,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -193,7 +194,7 @@ func Test_Eval_LessThan_Const_string_Less_Pass(t *testing.T) {
Operator: kyverno.LessThan,
Value: 1,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -205,7 +206,7 @@ func Test_Eval_LessThan_Const_string_Fail(t *testing.T) {
Operator: kyverno.LessThan,
Value: "1.1",
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -221,7 +222,7 @@ func Test_Eval_Equal_Const_Bool_Pass(t *testing.T) {
Value: true,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -235,7 +236,7 @@ func Test_Eval_Equal_Const_Bool_Fail(t *testing.T) {
Value: false,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -249,7 +250,7 @@ func Test_Eval_NoEqual_Const_Bool_Pass(t *testing.T) {
Value: false,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -263,7 +264,7 @@ func Test_Eval_NoEqual_Const_Bool_Fail(t *testing.T) {
Value: true,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -278,7 +279,7 @@ func Test_Eval_Equal_Const_int_Pass(t *testing.T) {
Value: 1,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -292,7 +293,7 @@ func Test_Eval_Equal_Const_int_Fail(t *testing.T) {
Value: 2,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -306,7 +307,7 @@ func Test_Eval_NoEqual_Const_int_Pass(t *testing.T) {
Value: 2,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -320,7 +321,7 @@ func Test_Eval_NoEqual_Const_int_Fail(t *testing.T) {
Value: 1,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -332,7 +333,7 @@ func Test_Eval_GreaterThanOrEquals_Const_int_Equal_Pass(t *testing.T) {
Operator: kyverno.GreaterThanOrEquals,
Value: 1.0,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -344,7 +345,7 @@ func Test_Eval_GreaterThanOrEquals_Const_int_Greater_Pass(t *testing.T) {
Operator: kyverno.GreaterThanOrEquals,
Value: 0,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -356,7 +357,7 @@ func Test_Eval_GreaterThanOrEquals_Const_int_Fail(t *testing.T) {
Operator: kyverno.GreaterThanOrEquals,
Value: "2",
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -368,7 +369,7 @@ func Test_Eval_GreaterThan_Const_int_Equal_Fail(t *testing.T) {
Operator: kyverno.GreaterThan,
Value: 1.0,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -380,7 +381,7 @@ func Test_Eval_GreaterThan_Const_int_Greater_Pass(t *testing.T) {
Operator: kyverno.GreaterThan,
Value: 0,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -392,7 +393,7 @@ func Test_Eval_GreaterThan_Const_int_Fail(t *testing.T) {
Operator: kyverno.GreaterThan,
Value: "2",
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -404,7 +405,7 @@ func Test_Eval_LessThanOrEquals_Const_int_Equal_Pass(t *testing.T) {
Operator: kyverno.LessThanOrEquals,
Value: 1.0,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -416,7 +417,7 @@ func Test_Eval_LessThanOrEquals_Const_int_Less_Pass(t *testing.T) {
Operator: kyverno.LessThanOrEquals,
Value: 1,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -428,7 +429,7 @@ func Test_Eval_LessThanOrEquals_Const_int_Fail(t *testing.T) {
Operator: kyverno.LessThanOrEquals,
Value: "1",
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -440,7 +441,7 @@ func Test_Eval_LessThan_Const_int_Equal_Fail(t *testing.T) {
Operator: kyverno.LessThan,
Value: 1.0,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -452,7 +453,7 @@ func Test_Eval_LessThan_Const_int_Less_Pass(t *testing.T) {
Operator: kyverno.LessThan,
Value: 1,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -464,7 +465,7 @@ func Test_Eval_LessThan_Const_int_Fail(t *testing.T) {
Operator: kyverno.LessThan,
Value: "1",
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -479,7 +480,7 @@ func Test_Eval_Equal_Const_int64_Pass(t *testing.T) {
Value: int64(1),
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -493,7 +494,7 @@ func Test_Eval_Equal_Const_int64_Fail(t *testing.T) {
Value: int64(2),
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -507,7 +508,7 @@ func Test_Eval_NoEqual_Const_int64_Pass(t *testing.T) {
Value: int64(2),
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -521,7 +522,7 @@ func Test_Eval_NoEqual_Const_int64_Fail(t *testing.T) {
Value: int64(1),
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -537,7 +538,7 @@ func Test_Eval_Equal_Const_float64_Pass(t *testing.T) {
Value: 1.5,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -551,7 +552,7 @@ func Test_Eval_Equal_Const_float64_Fail(t *testing.T) {
Value: 1.6,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -565,7 +566,7 @@ func Test_Eval_NoEqual_Const_float64_Pass(t *testing.T) {
Value: 1.6,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -579,7 +580,7 @@ func Test_Eval_NoEqual_Const_float64_Fail(t *testing.T) {
Value: 1.5,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -591,7 +592,7 @@ func Test_Eval_GreaterThanOrEquals_Const_float64_Equal_Pass(t *testing.T) {
Operator: kyverno.GreaterThanOrEquals,
Value: 1.0,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -603,7 +604,7 @@ func Test_Eval_GreaterThanOrEquals_Const_float64_Greater_Pass(t *testing.T) {
Operator: kyverno.GreaterThanOrEquals,
Value: 0,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -615,7 +616,7 @@ func Test_Eval_GreaterThanOrEquals_Const_float64_Fail(t *testing.T) {
Operator: kyverno.GreaterThanOrEquals,
Value: "2",
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -627,7 +628,7 @@ func Test_Eval_GreaterThan_Const_float64_Equal_Fail(t *testing.T) {
Operator: kyverno.GreaterThan,
Value: 1.0,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -639,7 +640,7 @@ func Test_Eval_GreaterThan_Const_float64_Greater_Pass(t *testing.T) {
Operator: kyverno.GreaterThan,
Value: "0",
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -651,7 +652,7 @@ func Test_Eval_GreaterThan_Const_float64_Fail(t *testing.T) {
Operator: kyverno.GreaterThan,
Value: "2.5",
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -663,7 +664,7 @@ func Test_Eval_LessThanOrEquals_Const_float64_Equal_Pass(t *testing.T) {
Operator: kyverno.LessThanOrEquals,
Value: 1.0,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -675,7 +676,7 @@ func Test_Eval_LessThanOrEquals_Const_float64_Less_Pass(t *testing.T) {
Operator: kyverno.LessThanOrEquals,
Value: 1,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -687,7 +688,7 @@ func Test_Eval_LessThanOrEquals_Const_float64_Fail(t *testing.T) {
Operator: kyverno.LessThanOrEquals,
Value: "1.95",
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -699,7 +700,7 @@ func Test_Eval_LessThan_Const_float64_Equal_Fail(t *testing.T) {
Operator: kyverno.LessThan,
Value: 1.0,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -711,7 +712,7 @@ func Test_Eval_LessThan_Const_float64_Less_Pass(t *testing.T) {
Operator: kyverno.LessThan,
Value: "1.5",
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -723,7 +724,7 @@ func Test_Eval_LessThan_Const_float64_Fail(t *testing.T) {
Operator: kyverno.LessThan,
Value: 1.95,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -753,7 +754,7 @@ func Test_Eval_Equal_Const_object_Pass(t *testing.T) {
Value: obj2,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -781,7 +782,7 @@ func Test_Eval_Equal_Const_object_Fail(t *testing.T) {
Value: obj2,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -809,7 +810,7 @@ func Test_Eval_NotEqual_Const_object_Pass(t *testing.T) {
Value: obj2,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -837,7 +838,7 @@ func Test_Eval_NotEqual_Const_object_Fail(t *testing.T) {
Value: obj2,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -867,7 +868,7 @@ func Test_Eval_Equal_Const_list_Pass(t *testing.T) {
Value: obj2,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -893,7 +894,7 @@ func Test_Eval_Equal_Const_list_Fail(t *testing.T) {
Value: obj2,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -919,7 +920,7 @@ func Test_Eval_NotEqual_Const_list_Pass(t *testing.T) {
Value: obj2,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -945,7 +946,7 @@ func Test_Eval_NotEqual_Const_list_Fail(t *testing.T) {
Value: obj2,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -978,9 +979,20 @@ func Test_Eval_Equal_Var_Pass(t *testing.T) {
Value: "temp",
}
if !Evaluate(log.Log, ctx, condition, true) {
t.Error("expected to pass")
}
conditionJSON, err := json.Marshal(condition)
assert.Nil(t, err)
var conditionMap interface{}
err = json.Unmarshal(conditionJSON, &conditionMap)
assert.Nil(t, err)
conditionWithResolvedVars, err := SubstituteAllInPreconditions(log.Log, ctx, conditionMap)
conditionJSON, err = json.Marshal(conditionWithResolvedVars)
assert.Nil(t, err)
err = json.Unmarshal(conditionJSON, &condition)
assert.Nil(t, err)
assert.True(t, Evaluate(log.Log, ctx, condition))
}
func Test_Eval_Equal_Var_Fail(t *testing.T) {
@ -1009,7 +1021,7 @@ func Test_Eval_Equal_Var_Fail(t *testing.T) {
Value: "temp1",
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -1036,7 +1048,7 @@ func Test_Eval_In_String_Set_Pass(t *testing.T) {
Value: valueInterface,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -1061,7 +1073,7 @@ func Test_Eval_In_String_Set_Fail(t *testing.T) {
Value: valueInterface,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}
@ -1086,7 +1098,7 @@ func Test_Eval_NotIn_String_Set_Pass(t *testing.T) {
Value: valueInterface,
}
if !Evaluate(log.Log, ctx, condition, true) {
if !Evaluate(log.Log, ctx, condition) {
t.Error("expected to pass")
}
}
@ -1111,7 +1123,7 @@ func Test_Eval_NotIn_String_Set_Fail(t *testing.T) {
Value: valueInterface,
}
if Evaluate(log.Log, ctx, condition, true) {
if Evaluate(log.Log, ctx, condition) {
t.Error("expected to fail")
}
}

View file

@ -13,45 +13,21 @@ import (
)
//NewEqualHandler returns handler to manage Equal operations
func NewEqualHandler(log logr.Logger, ctx context.EvalInterface, subHandler VariableSubstitutionHandler) OperatorHandler {
func NewEqualHandler(log logr.Logger, ctx context.EvalInterface) OperatorHandler {
return EqualHandler{
ctx: ctx,
subHandler: subHandler,
log: log,
ctx: ctx,
log: log,
}
}
//EqualHandler provides implementation to handle NotEqual Operator
type EqualHandler struct {
ctx context.EvalInterface
subHandler VariableSubstitutionHandler
log logr.Logger
ctx context.EvalInterface
log logr.Logger
}
//Evaluate evaluates expression with Equal Operator
func (eh EqualHandler) Evaluate(key, value interface{}, isPreCondition bool) bool {
var err error
//TODO: decouple variables from evaluation
// substitute the variables
if key, err = eh.subHandler(eh.log, eh.ctx, key); err != nil {
// Failed to resolve the variable
if isPreCondition {
eh.log.Info("Failed to resolve variable", "info", err.Error(), "variable", key)
} else {
eh.log.Error(err, "Failed to resolve variable", "variable", key)
}
return false
}
if value, err = eh.subHandler(eh.log, eh.ctx, value); err != nil {
// Failed to resolve the variable
if isPreCondition {
eh.log.Info("Failed to resolve variable", "info", err.Error(), "variable", value)
} else {
eh.log.Error(err, "Failed to resolve variable", "variable", value)
}
return false
}
func (eh EqualHandler) Evaluate(key, value interface{}) bool {
// key and value need to be of same type
switch typedKey := key.(type) {
case bool:

View file

@ -11,43 +11,21 @@ import (
)
//NewInHandler returns handler to manage In operations
func NewInHandler(log logr.Logger, ctx context.EvalInterface, subHandler VariableSubstitutionHandler) OperatorHandler {
func NewInHandler(log logr.Logger, ctx context.EvalInterface) OperatorHandler {
return InHandler{
ctx: ctx,
subHandler: subHandler,
log: log,
ctx: ctx,
log: log,
}
}
//InHandler provides implementation to handle In Operator
type InHandler struct {
ctx context.EvalInterface
subHandler VariableSubstitutionHandler
log logr.Logger
ctx context.EvalInterface
log logr.Logger
}
//Evaluate evaluates expression with In Operator
func (in InHandler) Evaluate(key, value interface{}, isPreCondition bool) bool {
var err error
// substitute the variables
if key, err = in.subHandler(in.log, in.ctx, key); err != nil {
if isPreCondition {
in.log.Info("Failed to resolve variable", "info", err.Error(), "variable", key)
} else {
in.log.Error(err, "Failed to resolve variable", "variable", key)
}
return false
}
if value, err = in.subHandler(in.log, in.ctx, value); err != nil {
if isPreCondition {
in.log.Info("Failed to resolve variable", "info", err.Error(), "variable", value)
} else {
in.log.Error(err, "Failed to resolve variable", "variable", value)
}
return false
}
func (in InHandler) Evaluate(key, value interface{}) bool {
switch typedKey := key.(type) {
case string:
return in.validateValueWithStringPattern(typedKey, value)

View file

@ -13,44 +13,21 @@ import (
)
//NewNotEqualHandler returns handler to manage NotEqual operations
func NewNotEqualHandler(log logr.Logger, ctx context.EvalInterface, subHandler VariableSubstitutionHandler) OperatorHandler {
func NewNotEqualHandler(log logr.Logger, ctx context.EvalInterface) OperatorHandler {
return NotEqualHandler{
ctx: ctx,
subHandler: subHandler,
log: log,
ctx: ctx,
log: log,
}
}
//NotEqualHandler provides implementation to handle NotEqual Operator
type NotEqualHandler struct {
ctx context.EvalInterface
subHandler VariableSubstitutionHandler
log logr.Logger
ctx context.EvalInterface
log logr.Logger
}
//Evaluate evaluates expression with NotEqual Operator
func (neh NotEqualHandler) Evaluate(key, value interface{}, isPreCondition bool) bool {
var err error
//TODO: decouple variables from evaluation
// substitute the variables
if key, err = neh.subHandler(neh.log, neh.ctx, key); err != nil {
// Failed to resolve the variable
if isPreCondition {
neh.log.Info("Failed to resolve variable", "info", err.Error(), "variable", key)
} else {
neh.log.Error(err, "Failed to resolve variable", "variable", key)
}
return false
}
if value, err = neh.subHandler(neh.log, neh.ctx, value); err != nil {
// Failed to resolve the variable
if isPreCondition {
neh.log.Info("Failed to resolve variable", "info", err.Error(), "variable", value)
} else {
neh.log.Error(err, "Failed to resolve variable", "variable", value)
}
return false
}
func (neh NotEqualHandler) Evaluate(key, value interface{}) bool {
// key and value need to be of same type
switch typedKey := key.(type) {
case bool:

View file

@ -8,44 +8,21 @@ import (
)
//NewNotInHandler returns handler to manage NotIn operations
func NewNotInHandler(log logr.Logger, ctx context.EvalInterface, subHandler VariableSubstitutionHandler) OperatorHandler {
func NewNotInHandler(log logr.Logger, ctx context.EvalInterface) OperatorHandler {
return NotInHandler{
ctx: ctx,
subHandler: subHandler,
log: log,
ctx: ctx,
log: log,
}
}
//NotInHandler provides implementation to handle NotIn Operator
type NotInHandler struct {
ctx context.EvalInterface
subHandler VariableSubstitutionHandler
log logr.Logger
ctx context.EvalInterface
log logr.Logger
}
//Evaluate evaluates expression with NotIn Operator
func (nin NotInHandler) Evaluate(key, value interface{}, isPreCondition bool) bool {
var err error
// substitute the variables
if key, err = nin.subHandler(nin.log, nin.ctx, key); err != nil {
if isPreCondition {
nin.log.Info("Failed to resolve variable", "info", err.Error(), "variable", key)
} else {
nin.log.Error(err, "Failed to resolve variable", "variable", key)
}
return false
}
if value, err = nin.subHandler(nin.log, nin.ctx, value); err != nil {
if isPreCondition {
nin.log.Info("Failed to resolve variable", "info", err.Error(), "variable", value)
} else {
nin.log.Error(err, "Failed to resolve variable", "variable", value)
}
return false
}
func (nin NotInHandler) Evaluate(key, value interface{}) bool {
switch typedKey := key.(type) {
case string:
return nin.validateValueWithStringPattern(typedKey, value)

View file

@ -10,21 +10,19 @@ import (
)
//NewNumericOperatorHandler returns handler to manage the provided numeric operations (>, >=, <=, <)
func NewNumericOperatorHandler(log logr.Logger, ctx context.EvalInterface, subHandler VariableSubstitutionHandler, op kyverno.ConditionOperator) OperatorHandler {
func NewNumericOperatorHandler(log logr.Logger, ctx context.EvalInterface, op kyverno.ConditionOperator) OperatorHandler {
return NumericOperatorHandler{
ctx: ctx,
subHandler: subHandler,
log: log,
condition: op,
ctx: ctx,
log: log,
condition: op,
}
}
//NumericOperatorHandler provides implementation to handle Numeric Operations associated with policies
type NumericOperatorHandler struct {
ctx context.EvalInterface
subHandler VariableSubstitutionHandler
log logr.Logger
condition kyverno.ConditionOperator
ctx context.EvalInterface
log logr.Logger
condition kyverno.ConditionOperator
}
// compareByCondition compares a float64 key with a float64 value on the basis of the provided operator
@ -44,27 +42,7 @@ func compareByCondition(key float64, value float64, op kyverno.ConditionOperator
}
}
func (noh NumericOperatorHandler) Evaluate(key, value interface{}, isPreCondition bool) bool {
var err error
if key, err = noh.subHandler(noh.log, noh.ctx, key); err != nil {
// Failed to resolve the variable
if isPreCondition {
noh.log.Info("Failed to resolve variable", "info", err.Error(), "variable", key)
} else {
noh.log.Error(err, "Failed to resolve variable", "variable", key)
}
return false
}
if value, err = noh.subHandler(noh.log, noh.ctx, value); err != nil {
// Failed to resolve the variable
if isPreCondition {
noh.log.Info("Failed to resolve variable", "info", err.Error(), "variable", value)
} else {
noh.log.Error(err, "Failed to resolve variable", "variable", value)
}
return false
}
func (noh NumericOperatorHandler) Evaluate(key, value interface{}) bool {
switch typedKey := key.(type) {
case int:
return noh.validateValueWithIntPattern(int64(typedKey), value)

View file

@ -10,7 +10,7 @@ import (
//OperatorHandler provides interface to manage types
type OperatorHandler interface {
Evaluate(key, value interface{}, isPreCondition bool) bool
Evaluate(key, value interface{}) bool
validateValueWithStringPattern(key string, value interface{}) bool
validateValueWithBoolPattern(key bool, value interface{}) bool
validateValueWithIntPattern(key int64, value interface{}) bool
@ -23,33 +23,33 @@ type OperatorHandler interface {
type VariableSubstitutionHandler = func(log logr.Logger, ctx context.EvalInterface, pattern interface{}) (interface{}, error)
//CreateOperatorHandler returns the operator handler based on the operator used in condition
func CreateOperatorHandler(log logr.Logger, ctx context.EvalInterface, op kyverno.ConditionOperator, subHandler VariableSubstitutionHandler) OperatorHandler {
func CreateOperatorHandler(log logr.Logger, ctx context.EvalInterface, op kyverno.ConditionOperator) OperatorHandler {
str := strings.ToLower(string(op))
switch str {
case strings.ToLower(string(kyverno.Equal)):
return NewEqualHandler(log, ctx, subHandler)
return NewEqualHandler(log, ctx)
case strings.ToLower(string(kyverno.Equals)):
return NewEqualHandler(log, ctx, subHandler)
return NewEqualHandler(log, ctx)
case strings.ToLower(string(kyverno.NotEqual)):
return NewNotEqualHandler(log, ctx, subHandler)
return NewNotEqualHandler(log, ctx)
case strings.ToLower(string(kyverno.NotEquals)):
return NewNotEqualHandler(log, ctx, subHandler)
return NewNotEqualHandler(log, ctx)
case strings.ToLower(string(kyverno.In)):
return NewInHandler(log, ctx, subHandler)
return NewInHandler(log, ctx)
case strings.ToLower(string(kyverno.NotIn)):
return NewNotInHandler(log, ctx, subHandler)
return NewNotInHandler(log, ctx)
case strings.ToLower(string(kyverno.GreaterThanOrEquals)),
strings.ToLower(string(kyverno.GreaterThan)),
strings.ToLower(string(kyverno.LessThanOrEquals)),
strings.ToLower(string(kyverno.LessThan)):
return NewNumericOperatorHandler(log, ctx, subHandler, op)
return NewNumericOperatorHandler(log, ctx, op)
default:
log.Info("operator not supported", "operator", str)

View file

@ -44,7 +44,30 @@ func SubstituteAll(log logr.Logger, ctx context.EvalInterface, document interfac
return kyverno.Rule{}, err
}
return substituteVars(log, ctx, document)
return substituteVars(log, ctx, document, DefaultVariableResolver)
}
func newPreconditionsVariableResolver(log logr.Logger) VariableResolver {
// PreconditionsVariableResolver is used to substitute vars in preconditions.
// It returns empty string if error occured during substitution
return func(ctx context.EvalInterface, variable string) (interface{}, error) {
value, err := DefaultVariableResolver(ctx, variable)
if err != nil {
log.Info(fmt.Sprintf("Variable \"%s\" is not resolved in preconditions. Considering it as an empty string", variable))
return "", nil
}
return value, nil
}
}
func SubstituteAllInPreconditions(log logr.Logger, ctx context.EvalInterface, document interface{}) (_ interface{}, err error) {
document, err = substituteReferences(log, document)
if err != nil {
return kyverno.Rule{}, err
}
return substituteVars(log, ctx, document, newPreconditionsVariableResolver(log))
}
func SubstituteAllForceMutate(log logr.Logger, ctx context.EvalInterface, typedRule kyverno.Rule) (_ kyverno.Rule, err error) {
@ -63,7 +86,7 @@ func SubstituteAllForceMutate(log logr.Logger, ctx context.EvalInterface, typedR
if ctx == nil {
rule = replaceSubstituteVariables(rule)
} else {
rule, err = substituteVars(log, ctx, rule)
rule, err = substituteVars(log, ctx, rule, DefaultVariableResolver)
if err != nil {
return kyverno.Rule{}, err
}
@ -74,8 +97,8 @@ func SubstituteAllForceMutate(log logr.Logger, ctx context.EvalInterface, typedR
//SubstituteVars replaces the variables with the values defined in the context
// - if any variable is invalid or has nil value, it is considered as a failed variable substitution
func substituteVars(log logr.Logger, ctx context.EvalInterface, rule interface{}) (interface{}, error) {
return jsonUtils.NewTraversal(rule, substituteVariablesIfAny(log, ctx)).TraverseJSON()
func substituteVars(log logr.Logger, ctx context.EvalInterface, rule interface{}, vr VariableResolver) (interface{}, error) {
return jsonUtils.NewTraversal(rule, substituteVariablesIfAny(log, ctx, vr)).TraverseJSON()
}
func substituteReferences(log logr.Logger, rule interface{}) (interface{}, error) {
@ -164,7 +187,15 @@ func substituteReferencesIfAny(log logr.Logger) jsonUtils.Action {
})
}
func substituteVariablesIfAny(log logr.Logger, ctx context.EvalInterface) jsonUtils.Action {
//VariableResolver defines the handler function for variable substitution
type VariableResolver = func(ctx context.EvalInterface, variable string) (interface{}, error)
// DefaultVariableResolver is used in all variable substitutions except preconditions
func DefaultVariableResolver(ctx context.EvalInterface, variable string) (interface{}, error) {
return ctx.Query(variable)
}
func substituteVariablesIfAny(log logr.Logger, ctx context.EvalInterface, vr VariableResolver) jsonUtils.Action {
return jsonUtils.OnlyForLeafs(func(data *jsonUtils.ActionData) (interface{}, error) {
value, ok := data.Element.(string)
if !ok {
@ -187,7 +218,8 @@ func substituteVariablesIfAny(log logr.Logger, ctx context.EvalInterface) jsonUt
variable = strings.ReplaceAll(variable, "request.object", "request.oldObject")
}
substitutedVar, err := ctx.Query(variable)
substitutedVar, err := vr(ctx, variable)
if err != nil {
switch err.(type) {
case context.InvalidVariableErr, gojmespath.NotFoundError:
@ -354,7 +386,7 @@ func SubstituteAllInRule(log logr.Logger, ctx context.EvalInterface, typedRule k
return typedRule, err
}
rule, err = substituteVars(log, ctx, rule)
rule, err = substituteVars(log, ctx, rule, DefaultVariableResolver)
if err != nil {
return typedRule, err
}

View file

@ -436,7 +436,7 @@ func Test_SubstituteSuccess(t *testing.T) {
patternRaw := []byte(`"{{request.object.metadata.annotations.test}}"`)
assert.Assert(t, json.Unmarshal(patternRaw, &pattern))
action := substituteVariablesIfAny(log.Log, ctx)
action := substituteVariablesIfAny(log.Log, ctx, DefaultVariableResolver)
results, err := action(&ju.ActionData{
Document: nil,
Element: string(patternRaw),
@ -460,7 +460,7 @@ func Test_SubstituteRecursiveErrors(t *testing.T) {
patternRaw := []byte(`"{{request.object.metadata.{{request.object.metadata.annotations.test2}}}}"`)
assert.Assert(t, json.Unmarshal(patternRaw, &pattern))
action := substituteVariablesIfAny(log.Log, ctx)
action := substituteVariablesIfAny(log.Log, ctx, DefaultVariableResolver)
results, err := action(&ju.ActionData{
Document: nil,
Element: string(patternRaw),
@ -473,7 +473,7 @@ func Test_SubstituteRecursiveErrors(t *testing.T) {
patternRaw = []byte(`"{{request.object.metadata2.{{request.object.metadata.annotations.test}}}}"`)
assert.Assert(t, json.Unmarshal(patternRaw, &pattern))
action = substituteVariablesIfAny(log.Log, ctx)
action = substituteVariablesIfAny(log.Log, ctx, DefaultVariableResolver)
results, err = action(&ju.ActionData{
Document: nil,
Element: string(patternRaw),
@ -492,7 +492,7 @@ func Test_SubstituteRecursive(t *testing.T) {
patternRaw := []byte(`"{{request.object.metadata.{{request.object.metadata.annotations.test}}}}"`)
assert.Assert(t, json.Unmarshal(patternRaw, &pattern))
action := substituteVariablesIfAny(log.Log, ctx)
action := substituteVariablesIfAny(log.Log, ctx, DefaultVariableResolver)
results, err := action(&ju.ActionData{
Document: nil,
Element: string(patternRaw),