1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-31 03:45:17 +00:00

Improved testing to allow 'skip' status and fail if tested results do not exist (#1881)

* Improved testing to allow 'skip' status and fail if tested results do not exist

Signed-off-by: Trey Dockendorf <tdockendorf@osc.edu>

* Ensure exit 0 is seen as failure when should be failure

Signed-off-by: Trey Dockendorf <tdockendorf@osc.edu>
This commit is contained in:
treydock 2021-05-07 19:27:15 -04:00 committed by GitHub
parent dfaf675185
commit f956a3034f
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
14 changed files with 309 additions and 51 deletions

View file

@ -176,10 +176,12 @@ test-e2e:
$(eval export E2E="") $(eval export E2E="")
#Test TestCmd Policy #Test TestCmd Policy
run_testcmd_policy: run_testcmd_policy: cli
go build -o kyvernoctl cmd/cli/kubectl-kyverno/main.go $(PWD)/$(CLI_PATH)/kyverno test https://github.com/kyverno/policies/main
./kyvernoctl test https://github.com/kyverno/policies/main $(PWD)/$(CLI_PATH)/kyverno test ./test/cli/test
./kyvernoctl test ./test/cli/test $(PWD)/$(CLI_PATH)/kyverno test ./test/cli/test-fail/missing-policy && exit 1 || exit 0
$(PWD)/$(CLI_PATH)/kyverno test ./test/cli/test-fail/missing-rule && exit 1 || exit 0
$(PWD)/$(CLI_PATH)/kyverno test ./test/cli/test-fail/missing-resource && exit 1 || exit 0
# godownloader create downloading script for kyverno-cli # godownloader create downloading script for kyverno-cli
godownloader: godownloader:

View file

@ -26,6 +26,7 @@ import (
"github.com/kyverno/kyverno/pkg/openapi" "github.com/kyverno/kyverno/pkg/openapi"
policy2 "github.com/kyverno/kyverno/pkg/policy" policy2 "github.com/kyverno/kyverno/pkg/policy"
"github.com/kyverno/kyverno/pkg/policyreport" "github.com/kyverno/kyverno/pkg/policyreport"
util "github.com/kyverno/kyverno/pkg/utils"
"github.com/lensesio/tableprinter" "github.com/lensesio/tableprinter"
"github.com/spf13/cobra" "github.com/spf13/cobra"
corev1 "k8s.io/api/core/v1" corev1 "k8s.io/api/core/v1"
@ -76,10 +77,10 @@ type SkippedPolicy struct {
} }
type TestResults struct { type TestResults struct {
Policy string `json:"policy"` Policy string `json:"policy"`
Rule string `json:"rule"` Rule string `json:"rule"`
Status string `json:"status"` Status report.PolicyStatus `json:"status"`
Resource string `json:"resource"` Resource string `json:"resource"`
} }
type ReportResult struct { type ReportResult struct {
@ -107,6 +108,7 @@ type Values struct {
} }
type resultCounts struct { type resultCounts struct {
skip int
pass int pass int
fail int fail int
} }
@ -219,26 +221,52 @@ func getLocalDirTestFiles(fs billy.Filesystem, path, fileName, valuesFile string
return errors return errors
} }
func buildPolicyResults(resps []*response.EngineResponse) map[string][]interface{} { func buildPolicyResults(resps []*response.EngineResponse, testResults []TestResults) map[string]report.PolicyReportResult {
results := make(map[string][]interface{}) results := make(map[string]report.PolicyReportResult)
infos := policyreport.GeneratePRsFromEngineResponse(resps, log.Log) infos := policyreport.GeneratePRsFromEngineResponse(resps, log.Log)
for _, resp := range resps {
policyName := resp.PolicyResponse.Policy
resourceName := resp.PolicyResponse.Resource.Name
var rules []string
for _, rule := range resp.PolicyResponse.Rules {
rules = append(rules, rule.Name)
}
result := report.PolicyReportResult{
Policy: policyName,
Resources: []*corev1.ObjectReference{
{
Name: resourceName,
},
},
}
for _, test := range testResults {
if test.Policy == policyName && test.Resource == resourceName {
if !util.ContainsString(rules, test.Rule) {
result.Status = report.StatusSkip
}
resultsKey := fmt.Sprintf("%s-%s-%s", test.Policy, test.Rule, test.Resource)
if _, ok := results[resultsKey]; !ok {
results[resultsKey] = result
}
}
}
}
for _, info := range infos { for _, info := range infos {
for _, infoResult := range info.Results { for _, infoResult := range info.Results {
for _, rule := range infoResult.Rules { for _, rule := range infoResult.Rules {
if rule.Type != utils.Validation.String() { if rule.Type != utils.Validation.String() {
continue continue
} }
result := report.PolicyReportResult{ var result report.PolicyReportResult
Policy: info.PolicyName, resultsKey := fmt.Sprintf("%s-%s-%s", info.PolicyName, rule.Name, infoResult.Resource.Name)
Resources: []*corev1.ObjectReference{ if val, ok := results[resultsKey]; ok {
{ result = val
Name: infoResult.Resource.Name, } else {
}, continue
},
} }
result.Rule = rule.Name result.Rule = rule.Name
result.Status = report.PolicyStatus(rule.Check) result.Status = report.PolicyStatus(rule.Check)
results[rule.Name] = append(results[rule.Name], result) results[resultsKey] = result
} }
} }
} }
@ -357,7 +385,7 @@ func applyPoliciesFromPath(fs billy.Filesystem, policyBytes []byte, valuesFile s
validateEngineResponses = append(validateEngineResponses, validateErs) validateEngineResponses = append(validateEngineResponses, validateErs)
} }
} }
resultsMap := buildPolicyResults(validateEngineResponses) resultsMap := buildPolicyResults(validateEngineResponses, values.Results)
resultErr := printTestResult(resultsMap, values.Results, rc) resultErr := printTestResult(resultsMap, values.Results, rc)
if resultErr != nil { if resultErr != nil {
return sanitizederror.NewWithError("Unable to genrate result. Error:", resultErr) return sanitizederror.NewWithError("Unable to genrate result. Error:", resultErr)
@ -365,9 +393,10 @@ func applyPoliciesFromPath(fs billy.Filesystem, policyBytes []byte, valuesFile s
return return
} }
func printTestResult(resps map[string][]interface{}, testResults []TestResults, rc *resultCounts) error { func printTestResult(resps map[string]report.PolicyReportResult, testResults []TestResults, rc *resultCounts) error {
printer := tableprinter.New(os.Stdout) printer := tableprinter.New(os.Stdout)
table := []*Table{} table := []*Table{}
boldGreen := color.New(color.FgGreen).Add(color.Bold)
boldRed := color.New(color.FgRed).Add(color.Bold) boldRed := color.New(color.FgRed).Add(color.Bold)
boldYellow := color.New(color.FgYellow).Add(color.Bold) boldYellow := color.New(color.FgYellow).Add(color.Bold)
boldFgCyan := color.New(color.FgCyan).Add(color.Bold) boldFgCyan := color.New(color.FgCyan).Add(color.Bold)
@ -375,32 +404,27 @@ func printTestResult(resps map[string][]interface{}, testResults []TestResults,
res := new(Table) res := new(Table)
res.ID = i + 1 res.ID = i + 1
res.Resource = boldFgCyan.Sprintf(v.Resource) + " with " + boldFgCyan.Sprintf(v.Policy) + "/" + boldFgCyan.Sprintf(v.Rule) res.Resource = boldFgCyan.Sprintf(v.Resource) + " with " + boldFgCyan.Sprintf(v.Policy) + "/" + boldFgCyan.Sprintf(v.Rule)
n := resps[v.Rule] resultKey := fmt.Sprintf("%s-%s-%s", v.Policy, v.Rule, v.Resource)
data, _ := json.Marshal(n) var testRes report.PolicyReportResult
valuesBytes, err := yaml.ToJSON(data) if val, ok := resps[resultKey]; ok {
if err != nil { testRes = val
return sanitizederror.NewWithError("failed to convert json", err) } else {
res.Result = boldYellow.Sprintf("Not found")
rc.fail++
table = append(table, res)
continue
} }
var r []ReportResult if testRes.Status == v.Status {
json.Unmarshal(valuesBytes, &r) if testRes.Status == report.StatusSkip {
res.Result = boldYellow.Sprintf("Not found") res.Result = boldGreen.Sprintf("Skip")
if len(r) != 0 { rc.skip++
var resource TestResults } else {
for _, testRes := range r { res.Result = boldGreen.Sprintf("Pass")
if testRes.Resources[0].Name == v.Resource { rc.pass++
resource.Policy = testRes.Policy
resource.Rule = testRes.Rule
resource.Status = testRes.Status
resource.Resource = testRes.Resources[0].Name
if v == resource {
res.Result = "Pass"
rc.pass++
} else {
res.Result = boldRed.Sprintf("Fail")
rc.fail++
}
}
} }
} else {
res.Result = boldRed.Sprintf("Fail")
rc.fail++
} }
table = append(table, res) table = append(table, res)
} }

View file

@ -0,0 +1,39 @@
apiVersion: kyverno.io/v1
kind: ClusterPolicy
metadata:
name: disallow-latest-tag
annotations:
policies.kyverno.io/category: Best Practices
policies.kyverno.io/description: >-
The ':latest' tag is mutable and can lead to unexpected errors if the
image changes. A best practice is to use an immutable tag that maps to
a specific version of an application pod.
spec:
validationFailureAction: audit
rules:
- name: require-image-tag
match:
resources:
kinds:
- Pod
namespaces:
- test
validate:
message: "An image tag is required."
pattern:
spec:
containers:
- image: "*:*"
- name: validate-image-tag
match:
resources:
kinds:
- Pod
namespaces:
- test
validate:
message: "Using a mutable image tag e.g. 'latest' is not allowed."
pattern:
spec:
containers:
- image: "!*:latest"

View file

@ -0,0 +1,11 @@
apiVersion: v1
kind: Pod
metadata:
name: test-ignore
namespace: default
labels:
app: app
spec:
containers:
- name: nginx
image: nginx:latest

View file

@ -0,0 +1,10 @@
name: test-simple
policies:
- policy.yaml
resources:
- resources.yaml
results:
- policy: missing
rule: validate-image-tag
resource: test
status: pass

View file

@ -0,0 +1,39 @@
apiVersion: kyverno.io/v1
kind: ClusterPolicy
metadata:
name: disallow-latest-tag
annotations:
policies.kyverno.io/category: Best Practices
policies.kyverno.io/description: >-
The ':latest' tag is mutable and can lead to unexpected errors if the
image changes. A best practice is to use an immutable tag that maps to
a specific version of an application pod.
spec:
validationFailureAction: audit
rules:
- name: require-image-tag
match:
resources:
kinds:
- Pod
namespaces:
- test
validate:
message: "An image tag is required."
pattern:
spec:
containers:
- image: "*:*"
- name: validate-image-tag
match:
resources:
kinds:
- Pod
namespaces:
- test
validate:
message: "Using a mutable image tag e.g. 'latest' is not allowed."
pattern:
spec:
containers:
- image: "!*:latest"

View file

@ -0,0 +1,11 @@
apiVersion: v1
kind: Pod
metadata:
name: test-ignore
namespace: default
labels:
app: app
spec:
containers:
- name: nginx
image: nginx:latest

View file

@ -0,0 +1,10 @@
name: test-simple
policies:
- policy.yaml
resources:
- resources.yaml
results:
- policy: disallow-latest-tag
rule: validate-image-tag
resource: missing
status: pass

View file

@ -0,0 +1,39 @@
apiVersion: kyverno.io/v1
kind: ClusterPolicy
metadata:
name: disallow-latest-tag
annotations:
policies.kyverno.io/category: Best Practices
policies.kyverno.io/description: >-
The ':latest' tag is mutable and can lead to unexpected errors if the
image changes. A best practice is to use an immutable tag that maps to
a specific version of an application pod.
spec:
validationFailureAction: audit
rules:
- name: require-image-tag
match:
resources:
kinds:
- Pod
namespaces:
- test
validate:
message: "An image tag is required."
pattern:
spec:
containers:
- image: "*:*"
- name: validate-image-tag
match:
resources:
kinds:
- Pod
namespaces:
- test
validate:
message: "Using a mutable image tag e.g. 'latest' is not allowed."
pattern:
spec:
containers:
- image: "!*:latest"

View file

@ -0,0 +1,11 @@
apiVersion: v1
kind: Pod
metadata:
name: test-ignore
namespace: default
labels:
app: app
spec:
containers:
- name: nginx
image: nginx:latest

View file

@ -0,0 +1,10 @@
name: test-simple
policies:
- policy.yaml
resources:
- resources.yaml
results:
- policy: disallow-latest-tag
rule: missing
resource: test
status: pass

View file

@ -27,6 +27,8 @@ spec:
resources: resources:
kinds: kinds:
- Pod - Pod
namespaces:
- test
validate: validate:
message: "Using a mutable image tag e.g. 'latest' is not allowed." message: "Using a mutable image tag e.g. 'latest' is not allowed."
pattern: pattern:

View file

@ -1,10 +1,11 @@
apiVersion: v1 apiVersion: v1
kind: Pod kind: Pod
metadata: metadata:
name: test-web name: test-require-image-tag-pass
namespace: test
labels: labels:
app: app app: app
spec: spec:
containers: containers:
- name: nginx - name: nginx
image: nginx:latest image: nginx:latest
@ -12,10 +13,47 @@ spec:
apiVersion: v1 apiVersion: v1
kind: Pod kind: Pod
metadata: metadata:
name: test-app name: test-require-image-tag-fail
namespace: test
labels: labels:
app: app app: app
spec: spec:
containers:
- name: nginx
image: nginx
---
apiVersion: v1
kind: Pod
metadata:
name: test-validate-image-tag-ignore
namespace: default
labels:
app: app
spec:
containers:
- name: nginx
image: nginx:latest
---
apiVersion: v1
kind: Pod
metadata:
name: test-validate-image-tag-fail
namespace: test
labels:
app: app
spec:
containers:
- name: nginx
image: nginx:latest
---
apiVersion: v1
kind: Pod
metadata:
name: test-validate-image-tag-pass
namespace: test
labels:
app: app
spec:
containers: containers:
- name: nginx - name: nginx
image: nginx:1.12 image: nginx:1.12

View file

@ -5,10 +5,22 @@ resources:
- resources.yaml - resources.yaml
results: results:
- policy: disallow-latest-tag - policy: disallow-latest-tag
rule: validate-image-tag rule: require-image-tag
resource: test-web resource: test-require-image-tag-pass
status: pass
- policy: disallow-latest-tag
rule: require-image-tag
resource: test-require-image-tag-fail
status: fail status: fail
- policy: disallow-latest-tag - policy: disallow-latest-tag
rule: validate-image-tag rule: validate-image-tag
resource: test-app resource: test-validate-image-tag-ignore
status: skip
- policy: disallow-latest-tag
rule: validate-image-tag
resource: test-validate-image-tag-fail
status: fail
- policy: disallow-latest-tag
rule: validate-image-tag
resource: test-validate-image-tag-pass
status: pass status: pass