package policy import ( "reflect" "strings" "sync" "time" listerv1 "k8s.io/client-go/listers/core/v1" "github.com/go-logr/logr" kyverno "github.com/kyverno/kyverno/pkg/api/kyverno/v1" "github.com/kyverno/kyverno/pkg/config" client "github.com/kyverno/kyverno/pkg/dclient" "github.com/kyverno/kyverno/pkg/engine" "github.com/kyverno/kyverno/pkg/engine/response" "github.com/kyverno/kyverno/pkg/utils" "github.com/minio/minio/pkg/wildcard" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" "k8s.io/apimachinery/pkg/labels" ) func (pc *PolicyController) processExistingResources(policy *kyverno.ClusterPolicy) []response.EngineResponse { logger := pc.log.WithValues("policy", policy.Name) // Parse through all the resources // drops the cache after configured rebuild time pc.rm.Drop() var engineResponses []response.EngineResponse // get resource that are satisfy the resource description defined in the rules resourceMap := pc.listResources(policy) for _, resource := range resourceMap { // pre-processing, check if the policy and resource version has been processed before if !pc.rm.ProcessResource(policy.Name, policy.ResourceVersion, resource.GetKind(), resource.GetNamespace(), resource.GetName(), resource.GetResourceVersion()) { logger.V(4).Info("policy and resource already processed", "policyResourceVersion", policy.ResourceVersion, "resourceResourceVersion", resource.GetResourceVersion(), "kind", resource.GetKind(), "namespace", resource.GetNamespace(), "name", resource.GetName()) continue } // apply the policy on each engineResponse := applyPolicy(*policy, resource, logger, pc.configHandler.GetExcludeGroupRole(), pc.resCache) // get engine response for mutation & validation independently engineResponses = append(engineResponses, engineResponse...) // post-processing, register the resource as processed pc.rm.RegisterResource(policy.GetName(), policy.GetResourceVersion(), resource.GetKind(), resource.GetNamespace(), resource.GetName(), resource.GetResourceVersion()) } return engineResponses } func (pc *PolicyController) listResources(policy *kyverno.ClusterPolicy) map[string]unstructured.Unstructured { pc.log.V(4).Info("list resources to be processed") // key uid resourceMap := map[string]unstructured.Unstructured{} for _, rule := range policy.Spec.Rules { for _, k := range rule.MatchResources.Kinds { resourceSchema, _, err := pc.client.DiscoveryClient.FindResource("", k) if err != nil { pc.log.Error(err, "failed to find resource", "kind", k) continue } if !resourceSchema.Namespaced { rMap := getResourcesPerNamespace(k, pc.client, "", rule, pc.configHandler, pc.log) mergeResources(resourceMap, rMap) } else { namespaces := getNamespacesForRule(&rule, pc.nsLister, pc.log) for _, ns := range namespaces { rMap := getResourcesPerNamespace(k, pc.client, ns, rule, pc.configHandler, pc.log) mergeResources(resourceMap, rMap) } } } } return excludeAutoGenResources(*policy, resourceMap, pc.log) } // excludeAutoGenResources filter out the pods / jobs with ownerReference func excludeAutoGenResources(policy kyverno.ClusterPolicy, resourceMap map[string]unstructured.Unstructured, log logr.Logger) map[string]unstructured.Unstructured { for uid, r := range resourceMap { if engine.SkipPolicyApplication(policy, r) { log.V(4).Info("exclude resource", "namespace", r.GetNamespace(), "kind", r.GetKind(), "name", r.GetName()) delete(resourceMap, uid) } } return resourceMap } func getNamespacesForRule(rule *kyverno.Rule, nslister listerv1.NamespaceLister, log logr.Logger) []string { if len(rule.MatchResources.Namespaces) == 0 { return getAllNamespaces(nslister, log) } var wildcards []string var results []string for _, nsName := range rule.MatchResources.Namespaces { if hasWildcard(nsName) { wildcards = append(wildcards, nsName) } results = append(results, nsName) } if len(wildcards) > 0 { wildcardMatches := getMatchingNamespaces(wildcards, nslister, log) results = append(results, wildcardMatches...) } return results } func hasWildcard(s string) bool { if s == "" { return false } return strings.Contains(s, "*") || strings.Contains(s, "?") } func getMatchingNamespaces(wildcards []string, nslister listerv1.NamespaceLister, log logr.Logger) []string { all := getAllNamespaces(nslister, log) if len(all) == 0 { return all } var results []string for _, wc := range wildcards { for _, ns := range all { if wildcard.Match(wc, ns) { results = append(results, ns) } } } return results } func getAllNamespaces(nslister listerv1.NamespaceLister, log logr.Logger) []string { var results []string namespaces, err := nslister.List(labels.NewSelector()) if err != nil { log.Error(err, "Failed to list namespaces") } for _, n := range namespaces { name := n.GetName() results = append(results, name) } return results } func getResourcesPerNamespace(kind string, client *client.Client, namespace string, rule kyverno.Rule, configHandler config.Interface, log logr.Logger) map[string]unstructured.Unstructured { resourceMap := map[string]unstructured.Unstructured{} ls := rule.MatchResources.Selector if kind == "Namespace" { namespace = "" } list, err := client.ListResource("", kind, namespace, ls) if err != nil { log.Error(err, "failed to list resources", "kind", kind, "namespace", namespace) return nil } // filter based on name for _, r := range list.Items { if r.GetDeletionTimestamp() != nil { continue } if r.GetKind() == "Pod" { if !isRunningPod(r) { continue } } // match name if rule.MatchResources.Name != "" { if !wildcard.Match(rule.MatchResources.Name, r.GetName()) { continue } } // Skip the filtered resources if configHandler.ToFilter(r.GetKind(), r.GetNamespace(), r.GetName()) { continue } //TODO check if the group version kind is present or not resourceMap[string(r.GetUID())] = r } // exclude the resources // skip resources to be filtered excludeResources(resourceMap, rule.ExcludeResources.ResourceDescription, configHandler, log) return resourceMap } func excludeResources(included map[string]unstructured.Unstructured, exclude kyverno.ResourceDescription, configHandler config.Interface, log logr.Logger) { if reflect.DeepEqual(exclude, (kyverno.ResourceDescription{})) { return } excludeName := func(name string) Condition { if exclude.Name == "" { return NotEvaluate } if wildcard.Match(exclude.Name, name) { return Skip } return Process } excludeNamespace := func(namespace string) Condition { if len(exclude.Namespaces) == 0 { return NotEvaluate } if utils.ContainsNamepace(exclude.Namespaces, namespace) { return Skip } return Process } excludeSelector := func(labelsMap map[string]string) Condition { if exclude.Selector == nil { return NotEvaluate } selector, err := metav1.LabelSelectorAsSelector(exclude.Selector) // if the label selector is incorrect, should be fail or if err != nil { log.Error(err, "failed to build label selector") return Skip } if selector.Matches(labels.Set(labelsMap)) { return Skip } return Process } findKind := func(kind string, kinds []string) bool { for _, k := range kinds { if k == kind { return true } } return false } excludeKind := func(kind string) Condition { if len(exclude.Kinds) == 0 { return NotEvaluate } if findKind(kind, exclude.Kinds) { return Skip } return Process } // check exclude condition for each resource for uid, resource := range included { // 0 -> dont check // 1 -> is not to be exclude // 2 -> to be exclude excludeEval := []Condition{} if ret := excludeName(resource.GetName()); ret != NotEvaluate { excludeEval = append(excludeEval, ret) } if ret := excludeNamespace(resource.GetNamespace()); ret != NotEvaluate { excludeEval = append(excludeEval, ret) } if ret := excludeSelector(resource.GetLabels()); ret != NotEvaluate { excludeEval = append(excludeEval, ret) } if ret := excludeKind(resource.GetKind()); ret != NotEvaluate { excludeEval = append(excludeEval, ret) } // exclude the filtered resources if configHandler.ToFilter(resource.GetKind(), resource.GetNamespace(), resource.GetName()) { delete(included, uid) continue } func() bool { for _, ret := range excludeEval { if ret == Process { // Process the resources continue } } // Skip the resource from processing delete(included, uid) return false }() } } //Condition defines condition type type Condition int const ( //NotEvaluate to not evaluate condition NotEvaluate Condition = 0 // Process to evaluate condition Process Condition = 1 // Skip to ignore/skip the condition Skip Condition = 2 ) // merge b into a map func mergeResources(a, b map[string]unstructured.Unstructured) { for k, v := range b { a[k] = v } } //NewResourceManager returns a new ResourceManager func NewResourceManager(rebuildTime int64) *ResourceManager { rm := ResourceManager{ data: make(map[string]interface{}), time: time.Now(), rebuildTime: rebuildTime, } // set time it was built return &rm } // ResourceManager stores the details on already processed resources for caching type ResourceManager struct { // we drop and re-build the cache // based on the memory consumer of by the map data map[string]interface{} mux sync.RWMutex time time.Time rebuildTime int64 // after how many seconds should we rebuild the cache } type resourceManager interface { ProcessResource(policy, pv, kind, ns, name, rv string) bool //TODO removeResource(kind, ns, name string) error RegisterResource(policy, pv, kind, ns, name, rv string) // reload Drop() } //Drop drop the cache after every rebuild interval mins //TODO: or drop based on the size func (rm *ResourceManager) Drop() { timeSince := time.Since(rm.time) if timeSince > time.Duration(rm.rebuildTime)*time.Second { rm.mux.Lock() defer rm.mux.Unlock() rm.data = map[string]interface{}{} rm.time = time.Now() } } var empty struct{} //RegisterResource stores if the policy is processed on this resource version func (rm *ResourceManager) RegisterResource(policy, pv, kind, ns, name, rv string) { rm.mux.Lock() defer rm.mux.Unlock() // add the resource key := buildKey(policy, pv, kind, ns, name, rv) rm.data[key] = empty } //ProcessResource returns true if the policy was not applied on the resource func (rm *ResourceManager) ProcessResource(policy, pv, kind, ns, name, rv string) bool { rm.mux.RLock() defer rm.mux.RUnlock() key := buildKey(policy, pv, kind, ns, name, rv) _, ok := rm.data[key] return !ok } func buildKey(policy, pv, kind, ns, name, rv string) string { return policy + "/" + pv + "/" + kind + "/" + ns + "/" + name + "/" + rv }