mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-31 03:45:17 +00:00
create violation on existing namespace that dont satisfy the generate rules
This commit is contained in:
parent
15092f6927
commit
cc907bccba
2 changed files with 14 additions and 16 deletions
|
@ -4,7 +4,6 @@ metadata:
|
||||||
name: "defaultnetworkpolicy"
|
name: "defaultnetworkpolicy"
|
||||||
spec:
|
spec:
|
||||||
rules:
|
rules:
|
||||||
validationFailureAction: audit
|
|
||||||
- name: "default-networkPolicy"
|
- name: "default-networkPolicy"
|
||||||
match:
|
match:
|
||||||
resources:
|
resources:
|
||||||
|
|
|
@ -2,13 +2,14 @@ package engine
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"errors"
|
"fmt"
|
||||||
|
|
||||||
"github.com/golang/glog"
|
"github.com/golang/glog"
|
||||||
v1alpha1 "github.com/nirmata/kyverno/pkg/apis/policy/v1alpha1"
|
v1alpha1 "github.com/nirmata/kyverno/pkg/apis/policy/v1alpha1"
|
||||||
client "github.com/nirmata/kyverno/pkg/dclient"
|
client "github.com/nirmata/kyverno/pkg/dclient"
|
||||||
"github.com/nirmata/kyverno/pkg/info"
|
"github.com/nirmata/kyverno/pkg/info"
|
||||||
"github.com/nirmata/kyverno/pkg/utils"
|
"github.com/nirmata/kyverno/pkg/utils"
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
||||||
"k8s.io/apimachinery/pkg/runtime"
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
)
|
)
|
||||||
|
@ -21,7 +22,7 @@ func Generate(client *client.Client, policy *v1alpha1.Policy, ns unstructured.Un
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
ri := info.NewRuleInfo(rule.Name, info.Generation)
|
ri := info.NewRuleInfo(rule.Name, info.Generation)
|
||||||
err := applyRuleGenerator(client, ns, rule.Generation, policy.Spec.ValidationFailureAction)
|
err := applyRuleGenerator(client, ns, rule.Generation, policy.GetCreationTimestamp())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ri.Fail()
|
ri.Fail()
|
||||||
ri.Addf("Rule %s: Failed to apply rule generator, err %v.", rule.Name, err)
|
ri.Addf("Rule %s: Failed to apply rule generator, err %v.", rule.Name, err)
|
||||||
|
@ -34,11 +35,15 @@ func Generate(client *client.Client, policy *v1alpha1.Policy, ns unstructured.Un
|
||||||
return ris
|
return ris
|
||||||
}
|
}
|
||||||
|
|
||||||
func applyRuleGenerator(client *client.Client, ns unstructured.Unstructured, gen *v1alpha1.Generation, validationFailureAction string) error {
|
func applyRuleGenerator(client *client.Client, ns unstructured.Unstructured, gen *v1alpha1.Generation, policyCreationTime metav1.Time) error {
|
||||||
var err error
|
var err error
|
||||||
resource := &unstructured.Unstructured{}
|
resource := &unstructured.Unstructured{}
|
||||||
var rdata map[string]interface{}
|
var rdata map[string]interface{}
|
||||||
|
// To manage existing resource , we compare the creation time for the default resource to be generate and policy creation time
|
||||||
|
processExisting := func() bool {
|
||||||
|
nsCreationTime := ns.GetCreationTimestamp()
|
||||||
|
return nsCreationTime.Before(&policyCreationTime)
|
||||||
|
}()
|
||||||
if gen.Data != nil {
|
if gen.Data != nil {
|
||||||
// 1> Check if resource exists
|
// 1> Check if resource exists
|
||||||
obj, err := client.GetResource(gen.Kind, ns.GetName(), gen.Name)
|
obj, err := client.GetResource(gen.Kind, ns.GetName(), gen.Name)
|
||||||
|
@ -51,7 +56,7 @@ func applyRuleGenerator(client *client.Client, ns unstructured.Unstructured, gen
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if !ok {
|
if !ok {
|
||||||
return errors.New("rule configuration not present in resource")
|
return fmt.Errorf("rule configuration not present in resource %s/%s", ns.GetName(), gen.Name)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
@ -74,21 +79,15 @@ func applyRuleGenerator(client *client.Client, ns unstructured.Unstructured, gen
|
||||||
}
|
}
|
||||||
rdata = resource.UnstructuredContent()
|
rdata = resource.UnstructuredContent()
|
||||||
}
|
}
|
||||||
|
if processExisting {
|
||||||
|
// for existing resources we generate an error which indirectly generates a policy violation
|
||||||
|
return fmt.Errorf("resource %s not found in existing namespace %s", gen.Name, ns.GetName())
|
||||||
|
}
|
||||||
resource.SetUnstructuredContent(rdata)
|
resource.SetUnstructuredContent(rdata)
|
||||||
resource.SetName(gen.Name)
|
resource.SetName(gen.Name)
|
||||||
resource.SetNamespace(ns.GetName())
|
resource.SetNamespace(ns.GetName())
|
||||||
// Reset resource version
|
// Reset resource version
|
||||||
resource.SetResourceVersion("")
|
resource.SetResourceVersion("")
|
||||||
// TODO based on https://github.com/nirmata/kyverno/issues/268
|
|
||||||
// if validationFailureAction != "audit" {
|
|
||||||
// // if not audit, then enforce..
|
|
||||||
// // with enforce we will block the creation of resource and instead generate an error
|
|
||||||
// // the error will then create a policyViolation so that the resource owner can add the defaults
|
|
||||||
// return errors.New("policy flag validationFailureAction:'audit' blocked the creation of default resource for the namespace")
|
|
||||||
// }
|
|
||||||
// for "audit" mode, the resource will create the resource
|
|
||||||
// but wont generate a policy violation as the generate controller doesnt know if the generate request
|
|
||||||
// is a new resource via admission controller or via syncing its cache after a controller
|
|
||||||
_, err = client.CreateResource(gen.Kind, ns.GetName(), resource, false)
|
_, err = client.CreateResource(gen.Kind, ns.GetName(), resource, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
|
Loading…
Add table
Reference in a new issue