package policyviolation import ( "fmt" "reflect" "github.com/golang/glog" kyverno "github.com/nirmata/kyverno/pkg/api/kyverno/v1alpha1" kyvernoclient "github.com/nirmata/kyverno/pkg/client/clientset/versioned" kyvernolister "github.com/nirmata/kyverno/pkg/client/listers/kyverno/v1alpha1" engine "github.com/nirmata/kyverno/pkg/engine" labels "k8s.io/apimachinery/pkg/labels" ) func CreateNamespacePV(pvLister kyvernolister.NamespacedPolicyViolationLister, client *kyvernoclient.Clientset, engineResponses []engine.EngineResponse) { var pvs []kyverno.NamespacedPolicyViolation for _, er := range engineResponses { // ignore creation of PV for resoruces that are yet to be assigned a name if er.PolicyResponse.Resource.Name == "" { glog.V(4).Infof("resource %v, has not been assigned a name, not creating a namespace policy violation for it", er.PolicyResponse.Resource) continue } if !er.IsSuccesful() { glog.V(4).Infof("Building namespace policy violation for engine response %v", er) if pv := buildNamespacedPVForPolicy(er); !reflect.DeepEqual(pv, kyverno.NamespacedPolicyViolation{}) { pvs = append(pvs, pv) } } } createNamespacedPV(pvLister, client, pvs) } func buildNamespacedPVForPolicy(er engine.EngineResponse) kyverno.NamespacedPolicyViolation { pvResourceSpec := kyverno.ResourceSpec{ Kind: er.PolicyResponse.Resource.Kind, Namespace: er.PolicyResponse.Resource.Namespace, Name: er.PolicyResponse.Resource.Name, } violatedRules := newViolatedRules(er, "") return buildNamespacedPolicyViolation(er.PolicyResponse.Policy, pvResourceSpec, violatedRules) } //buildNamespacedPolicyViolation returns an value of type PolicyViolation func buildNamespacedPolicyViolation(policy string, resource kyverno.ResourceSpec, fRules []kyverno.ViolatedRule) kyverno.NamespacedPolicyViolation { pv := kyverno.NamespacedPolicyViolation{ Spec: kyverno.PolicyViolationSpec{ Policy: policy, ResourceSpec: resource, ViolatedRules: fRules, }, } //TODO: check if this can be removed or use unstructured? // pv.SetGroupVersionKind(kyverno.SchemeGroupVersion.WithKind("NamespacedPolicyViolation")) pv.SetGenerateName("pv-") return pv } func createNamespacedPV(pvLister kyvernolister.NamespacedPolicyViolationLister, client *kyvernoclient.Clientset, pvs []kyverno.NamespacedPolicyViolation) { if len(pvs) == 0 { return } for _, newPv := range pvs { glog.V(4).Infof("creating namespaced policyViolation resource for policy %s and resource %s", newPv.Spec.Policy, newPv.Spec.ResourceSpec.ToKey()) // check if there was a previous policy voilation for policy & resource combination curPv, err := getExistingNamespacedPVIfAny(pvLister, newPv) if err != nil { glog.Error(err) continue } if curPv == nil { glog.V(4).Infof("creating new namespaced policy violation for policy %s & resource %s", newPv.Spec.Policy, newPv.Spec.ResourceSpec.ToKey()) // no existing policy violation, create a new one _, err := client.KyvernoV1alpha1().NamespacedPolicyViolations(newPv.Spec.ResourceSpec.Namespace).Create(&newPv) if err != nil { glog.Error(err) } else { glog.Infof("namespaced policy violation created for resource %s", newPv.Spec.ResourceSpec.ToKey()) } continue } // compare the policyviolation spec for existing resource if present else if reflect.DeepEqual(curPv.Spec, newPv.Spec) { // if they are equal there has been no change so dont update the polivy violation glog.V(3).Infof("namespaced policy violation '%s' spec did not change so not updating it", newPv.Spec.ToKey()) glog.V(4).Infof("namespaced policy violation spec %v did not change so not updating it", newPv.Spec) continue } // spec changed so update the policyviolation glog.V(4).Infof("creating new policy violation for policy %s & resource %s", curPv.Spec.Policy, curPv.Spec.ResourceSpec.ToKey()) //TODO: using a generic name, but would it be helpful to have naming convention for policy violations // as we can only have one policy violation for each (policy + resource) combination _, err = client.KyvernoV1alpha1().NamespacedPolicyViolations(newPv.Spec.ResourceSpec.Namespace).Update(&newPv) if err != nil { glog.Error(err) continue } glog.Infof("namespaced policy violation updated for resource %s", newPv.Spec.ResourceSpec.ToKey()) } } func getExistingNamespacedPVIfAny(nspvLister kyvernolister.NamespacedPolicyViolationLister, newPv kyverno.NamespacedPolicyViolation) (*kyverno.NamespacedPolicyViolation, error) { // TODO(shuting): list pvs by labels pvs, err := nspvLister.List(labels.NewSelector()) if err != nil { return nil, fmt.Errorf("failed to list namespaced policy violations err: %v", err) } for _, pv := range pvs { if pv.Spec.Policy == newPv.Spec.Policy && reflect.DeepEqual(pv.Spec.ResourceSpec, newPv.Spec.ResourceSpec) { return pv, nil } } return nil, nil }