From fb3a90c7037e627019411860515ec094b7992608 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Charles-Edouard=20Br=C3=A9t=C3=A9ch=C3=A9?= <charled.breteche@gmail.com> Date: Mon, 27 Feb 2023 14:45:00 +0100 Subject: [PATCH] refactor: remove MutateResourceWithImageInfo (#6397) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * refactor: remove new resource from policy context Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * fallback Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * test something else Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * fix test Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * fix test Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * fix test Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * fix Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * fix Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * fix kuttl test Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * fix cli tests Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * clean Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * changelog Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> --------- Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> --- CHANGELOG.md | 1 + .../kubectl-kyverno/utils/common/common.go | 4 --- pkg/engine/context/imageutils.go | 32 ------------------- pkg/engine/mutation_test.go | 17 +--------- pkg/webhooks/resource/handlers.go | 5 --- pkg/webhooks/resource/handlers_test.go | 2 +- .../e2e/patchesjson6902-simple/README.md | 2 +- .../resource-mutated.yaml | 2 +- 8 files changed, 5 insertions(+), 60 deletions(-) delete mode 100644 pkg/engine/context/imageutils.go diff --git a/CHANGELOG.md b/CHANGELOG.md index c3ed6c28ae..d4f2cfcf7a 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -6,6 +6,7 @@ - Removed `GenerateRequest` CRD. - Refactored `kyverno` chart, migration instructions are available in chart `README.md`. +- Image references in the json context are not mutated to canonical form anymore, do not assume a registry domain is always present. ## v1.9.0-rc.1 diff --git a/cmd/cli/kubectl-kyverno/utils/common/common.go b/cmd/cli/kubectl-kyverno/utils/common/common.go index 0c74234603..bded6663d1 100644 --- a/cmd/cli/kubectl-kyverno/utils/common/common.go +++ b/cmd/cli/kubectl-kyverno/utils/common/common.go @@ -457,10 +457,6 @@ OuterLoop: } } - if err := engineContext.MutateResourceWithImageInfo(resourceRaw, ctx); err != nil { - log.Log.Error(err, "failed to add image variables to context") - } - subresources := make([]engineapi.SubResource, 0) // If --cluster flag is not set, then we need to add subresources to the context diff --git a/pkg/engine/context/imageutils.go b/pkg/engine/context/imageutils.go deleted file mode 100644 index c6859982cd..0000000000 --- a/pkg/engine/context/imageutils.go +++ /dev/null @@ -1,32 +0,0 @@ -package context - -import ( - "fmt" - - engineutils "github.com/kyverno/kyverno/pkg/engine/utils" -) - -// MutateResourceWithImageInfo will set images to their canonical form so that they can be compared -// in a predictable manner. This sets the default registry as `docker.io` and the tag as `latest` if -// these are missing. -func MutateResourceWithImageInfo(raw []byte, ctx Interface) error { - images := ctx.ImageInfo() - if images == nil { - return nil - } - var patches [][]byte - buildJSONPatch := func(op, path, value string) []byte { - p := fmt.Sprintf(`{ "op": "%s", "path": "%s", "value":"%s" }`, op, path, value) - return []byte(p) - } - for _, infoMaps := range images { - for _, info := range infoMaps { - patches = append(patches, buildJSONPatch("replace", info.Pointer, info.String())) - } - } - patchedResource, err := engineutils.ApplyPatches(raw, patches) - if err != nil { - return err - } - return AddResource(ctx, patchedResource) -} diff --git a/pkg/engine/mutation_test.go b/pkg/engine/mutation_test.go index 54dadf406f..dda6455adc 100644 --- a/pkg/engine/mutation_test.go +++ b/pkg/engine/mutation_test.go @@ -329,7 +329,7 @@ func Test_chained_rules(t *testing.T) { "containers": [ { "(name)": "*", - "image": "{{regex_replace_all('^[^/]+','{{@}}','myregistry.corp.com')}}" + "image": "{{regex_replace_all('^([^/]+\\.[^/]+/)?(.*)$','{{@}}','myregistry.corp.com/$2')}}" } ] } @@ -396,9 +396,6 @@ func Test_chained_rules(t *testing.T) { err = ctx.AddImageInfos(resource, cfg) assert.NilError(t, err) - err = enginecontext.MutateResourceWithImageInfo(resourceRaw, ctx) - assert.NilError(t, err) - er := testMutate(context.TODO(), nil, registryclient.NewOrDie(), policyContext, nil) containers, _, err := unstructured.NestedSlice(er.PatchedResource.Object, "spec", "containers") assert.NilError(t, err) @@ -673,9 +670,6 @@ func Test_foreach(t *testing.T) { err = ctx.AddImageInfos(resource, cfg) assert.NilError(t, err) - err = enginecontext.MutateResourceWithImageInfo(resourceRaw, ctx) - assert.NilError(t, err) - er := testMutate(context.TODO(), nil, registryclient.NewOrDie(), policyContext, nil) assert.Equal(t, len(er.PolicyResponse.Rules), 1) @@ -780,9 +774,6 @@ func Test_foreach_element_mutation(t *testing.T) { err = ctx.AddImageInfos(resource, cfg) assert.NilError(t, err) - err = enginecontext.MutateResourceWithImageInfo(resourceRaw, ctx) - assert.NilError(t, err) - er := testMutate(context.TODO(), nil, registryclient.NewOrDie(), policyContext, nil) assert.Equal(t, len(er.PolicyResponse.Rules), 1) @@ -906,9 +897,6 @@ func Test_Container_InitContainer_foreach(t *testing.T) { err = ctx.AddImageInfos(resource, cfg) assert.NilError(t, err) - err = enginecontext.MutateResourceWithImageInfo(resourceRaw, ctx) - assert.NilError(t, err) - er := testMutate(context.TODO(), nil, registryclient.NewOrDie(), policyContext, nil) assert.Equal(t, len(er.PolicyResponse.Rules), 1) @@ -1056,9 +1044,6 @@ func testApplyPolicyToResource(t *testing.T, policyRaw, resourceRaw []byte) *eng err = ctx.AddImageInfos(resource, cfg) assert.NilError(t, err) - err = enginecontext.MutateResourceWithImageInfo(resourceRaw, ctx) - assert.NilError(t, err) - er := testMutate(context.TODO(), nil, registryclient.NewOrDie(), policyContext, nil) return er } diff --git a/pkg/webhooks/resource/handlers.go b/pkg/webhooks/resource/handlers.go index 4cb077c3b8..ea3cc93594 100644 --- a/pkg/webhooks/resource/handlers.go +++ b/pkg/webhooks/resource/handlers.go @@ -16,7 +16,6 @@ import ( "github.com/kyverno/kyverno/pkg/clients/dclient" "github.com/kyverno/kyverno/pkg/config" engineapi "github.com/kyverno/kyverno/pkg/engine/api" - enginectx "github.com/kyverno/kyverno/pkg/engine/context" "github.com/kyverno/kyverno/pkg/event" "github.com/kyverno/kyverno/pkg/metrics" "github.com/kyverno/kyverno/pkg/openapi" @@ -164,10 +163,6 @@ func (h *handlers) Mutate(ctx context.Context, logger logr.Logger, request *admi logger.Error(err, "failed to build policy context") return admissionutils.Response(request.UID, err) } - // update container images to a canonical form - if err := enginectx.MutateResourceWithImageInfo(request.Object.Raw, policyContext.JSONContext()); err != nil { - logger.Error(err, "failed to patch images info to resource, policies that mutate images may be impacted") - } mh := mutation.NewMutationHandler(logger, h.engine, h.eventGen, h.openApiManager, h.nsLister, h.metricsConfig) mutatePatches, mutateWarnings, err := mh.HandleMutation(ctx, request, mutatePolicies, policyContext, startTime) if err != nil { diff --git a/pkg/webhooks/resource/handlers_test.go b/pkg/webhooks/resource/handlers_test.go index 588c88062a..32aec953eb 100644 --- a/pkg/webhooks/resource/handlers_test.go +++ b/pkg/webhooks/resource/handlers_test.go @@ -166,7 +166,7 @@ var policyMutateAndVerify = ` "containers": [ { "name": "{{ element.name }}", - "image": "{{ regex_replace_all_literal('.*(.*)/', '{{element.image}}', 'ghcr.io/kyverno/' )}}" + "image": "{{ regex_replace_all('^([^/]+\\.[^/]+/)?(.*)$', '{{element.image}}', 'ghcr.io/kyverno/$2' )}}" } ] } diff --git a/test/conformance/kuttl/mutate/e2e/patchesjson6902-simple/README.md b/test/conformance/kuttl/mutate/e2e/patchesjson6902-simple/README.md index dc76b8b972..6e808bfeb4 100644 --- a/test/conformance/kuttl/mutate/e2e/patchesjson6902-simple/README.md +++ b/test/conformance/kuttl/mutate/e2e/patchesjson6902-simple/README.md @@ -4,7 +4,7 @@ This is a migrated test from e2e. It checks that simple JSON patches function pr ## Expected Behavior -If the Pod has a second environment variable added with the name `K8S_IMAGE` with value equal to `docker.io/busybox:1.11` then the test succeeds. If it does not, the test fails. Note that there is an initContainer present which based upon the policy definition should NOT be mutated. +If the Pod has a second environment variable added with the name `K8S_IMAGE` with value equal to `busybox:1.11` then the test succeeds. If it does not, the test fails. Note that there is an initContainer present which based upon the policy definition should NOT be mutated. ## Reference Issue(s) diff --git a/test/conformance/kuttl/mutate/e2e/patchesjson6902-simple/resource-mutated.yaml b/test/conformance/kuttl/mutate/e2e/patchesjson6902-simple/resource-mutated.yaml index 5ec53a9a7f..8d1da7023a 100644 --- a/test/conformance/kuttl/mutate/e2e/patchesjson6902-simple/resource-mutated.yaml +++ b/test/conformance/kuttl/mutate/e2e/patchesjson6902-simple/resource-mutated.yaml @@ -11,7 +11,7 @@ spec: - name: FOO value: bar - name: K8S_IMAGE - value: docker.io/busybox:1.11 + value: busybox:1.11 image: busybox:1.11 name: busybox securityContext: