mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-31 03:45:17 +00:00
fix: mutate existing policy does not get applied when background=false (#5439)
* fix mutate existing policies when background=false Signed-off-by: ShutingZhao <shuting@nirmata.com> * add the kuttl test Signed-off-by: ShutingZhao <shuting@nirmata.com> Signed-off-by: ShutingZhao <shuting@nirmata.com>
This commit is contained in:
parent
a6c8c401ff
commit
93eaead565
6 changed files with 70 additions and 2 deletions
|
@ -139,8 +139,10 @@ func NewPolicyController(
|
||||||
func (pc *PolicyController) canBackgroundProcess(p kyvernov1.PolicyInterface) bool {
|
func (pc *PolicyController) canBackgroundProcess(p kyvernov1.PolicyInterface) bool {
|
||||||
logger := pc.log.WithValues("policy", p.GetName())
|
logger := pc.log.WithValues("policy", p.GetName())
|
||||||
if !p.BackgroundProcessingEnabled() {
|
if !p.BackgroundProcessingEnabled() {
|
||||||
logger.V(4).Info("background processed is disabled")
|
if !p.GetSpec().HasGenerate() && !p.GetSpec().IsMutateExisting() {
|
||||||
return false
|
logger.V(4).Info("background processing is disabled")
|
||||||
|
return false
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := ValidateVariables(p, true); err != nil {
|
if err := ValidateVariables(p, true); err != nil {
|
||||||
|
|
|
@ -0,0 +1,9 @@
|
||||||
|
apiVersion: kyverno.io/v1
|
||||||
|
kind: ClusterPolicy
|
||||||
|
metadata:
|
||||||
|
name: add-privileged-existing-namespaces
|
||||||
|
status:
|
||||||
|
conditions:
|
||||||
|
- reason: Succeeded
|
||||||
|
status: "True"
|
||||||
|
type: Ready
|
|
@ -0,0 +1,36 @@
|
||||||
|
apiVersion: kyverno.io/v1
|
||||||
|
kind: ClusterPolicy
|
||||||
|
metadata:
|
||||||
|
name: add-privileged-existing-namespaces
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: Add Privileged Label to Existing Namespaces
|
||||||
|
policies.kyverno.io/category: Pod Security Admission
|
||||||
|
policies.kyverno.io/severity: medium
|
||||||
|
policies.kyverno.io/subject: Namespace
|
||||||
|
kyverno.io/kyverno-version: 1.8.0
|
||||||
|
policies.kyverno.io/minversion: 1.7.0
|
||||||
|
kyverno.io/kubernetes-version: "1.24"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
When Pod Security Admission is configured with a cluster-wide AdmissionConfiguration file
|
||||||
|
which sets either baseline or restricted, for example in many PaaS CIS profiles, it may
|
||||||
|
be necessary to relax this to privileged on a per-Namespace basis so that more
|
||||||
|
granular control can be provided. This policy labels new and existing Namespaces, except
|
||||||
|
that of kube-system, with the `pod-security.kubernetes.io/enforce: privileged` label.
|
||||||
|
spec:
|
||||||
|
mutateExistingOnPolicyUpdate: true
|
||||||
|
background: false
|
||||||
|
rules:
|
||||||
|
- name: label-privileged-namespaces
|
||||||
|
match:
|
||||||
|
any:
|
||||||
|
- resources:
|
||||||
|
kinds:
|
||||||
|
- Namespace
|
||||||
|
mutate:
|
||||||
|
targets:
|
||||||
|
- apiVersion: v1
|
||||||
|
kind: Namespace
|
||||||
|
patchStrategicMerge:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
foo: bar
|
|
@ -0,0 +1,6 @@
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Namespace
|
||||||
|
metadata:
|
||||||
|
name: default
|
||||||
|
labels:
|
||||||
|
foo: bar
|
|
@ -0,0 +1,4 @@
|
||||||
|
apiVersion: kuttl.dev/v1beta1
|
||||||
|
kind: TestStep
|
||||||
|
commands:
|
||||||
|
- command: kubectl delete -f 01-manifests.yaml --force --wait=true --ignore-not-found=true
|
|
@ -0,0 +1,11 @@
|
||||||
|
## Description
|
||||||
|
|
||||||
|
This is a test for mutation of existing resources when background is set to false.
|
||||||
|
|
||||||
|
## Expected Behavior
|
||||||
|
|
||||||
|
The mutateExisting policy does not require `.spec.background=true` to be applied.
|
||||||
|
|
||||||
|
## Reference Issue(s)
|
||||||
|
|
||||||
|
5430
|
Loading…
Add table
Reference in a new issue