package validation import ( "context" "fmt" "strings" "sync" "github.com/go-logr/logr" "github.com/jmespath-community/go-jmespath/pkg/binding" gojmespath "github.com/kyverno/go-jmespath" "github.com/kyverno/kyverno-json/pkg/engine/assert" kyvernov1 "github.com/kyverno/kyverno/api/kyverno/v1" kyvernov2 "github.com/kyverno/kyverno/api/kyverno/v2" engineapi "github.com/kyverno/kyverno/pkg/engine/api" enginectx "github.com/kyverno/kyverno/pkg/engine/context" "github.com/kyverno/kyverno/pkg/engine/handlers" engineutils "github.com/kyverno/kyverno/pkg/engine/utils" "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" "k8s.io/client-go/tools/cache" ) type lazyBinding struct { resolver func() (any, error) } func (b *lazyBinding) Value() (any, error) { return b.resolver() } func newLazyBinding(jsonContext enginectx.EvalInterface, name string) binding.Binding { return &lazyBinding{ resolver: sync.OnceValues(func() (any, error) { return jsonContext.Query(name) }), } } type validateAssertHandler struct{} func NewValidateAssertHandler() (handlers.Handler, error) { return validateAssertHandler{}, nil } func (h validateAssertHandler) Process( ctx context.Context, logger logr.Logger, policyContext engineapi.PolicyContext, resource unstructured.Unstructured, rule kyvernov1.Rule, contextLoader engineapi.EngineContextLoader, exceptions []*kyvernov2.PolicyException, ) (unstructured.Unstructured, []engineapi.RuleResponse) { // check if there are policy exceptions that match the incoming resource matchedExceptions := engineutils.MatchesException(exceptions, policyContext, logger) if len(matchedExceptions) > 0 { var keys []string for i, exception := range matchedExceptions { key, err := cache.MetaNamespaceKeyFunc(&matchedExceptions[i]) if err != nil { logger.Error(err, "failed to compute policy exception key", "namespace", exception.GetNamespace(), "name", exception.GetName()) return resource, handlers.WithError(rule, engineapi.Validation, "failed to compute exception key", err) } keys = append(keys, key) } logger.V(3).Info("policy rule is skipped due to policy exceptions", "exceptions", keys) return resource, handlers.WithResponses( engineapi.RuleSkip(rule.Name, engineapi.Validation, "rule is skipped due to policy exceptions"+strings.Join(keys, ", "), rule.ReportProperties).WithExceptions(matchedExceptions), ) } // load context jsonContext := policyContext.JSONContext() jsonContext.Checkpoint() defer jsonContext.Restore() if err := contextLoader(ctx, rule.Context, jsonContext); err != nil { if _, ok := err.(gojmespath.NotFoundError); ok { logger.V(3).Info("failed to load context", "reason", err.Error()) } else { logger.Error(err, "failed to load context") } return resource, handlers.WithResponses( engineapi.RuleError(rule.Name, engineapi.Validation, "failed to load context", err, rule.ReportProperties), ) } // prepare bindings bindings := binding.NewBindings() for _, entry := range rule.Context { bindings = bindings.Register("$"+entry.Name, newLazyBinding(jsonContext, entry.Name)) } // execute assertion gvk, subResource := policyContext.ResourceKind() payload := map[string]any{ "object": policyContext.NewResource().Object, "oldObject": policyContext.OldResource().Object, "admissionInfo": policyContext.AdmissionInfo(), "operation": policyContext.Operation(), "namespaceLabels": policyContext.NamespaceLabels(), "admissionOperation": policyContext.AdmissionOperation(), "requestResource": policyContext.RequestResource(), "resourceKind": map[string]any{ "group": gvk.Group, "version": gvk.Version, "kind": gvk.Kind, "subResource": subResource, }, } asserttion := assert.Parse(ctx, rule.Validation.Assert.Value) errs, err := assert.Assert(ctx, nil, asserttion, payload, bindings) if err != nil { return resource, handlers.WithError(rule, engineapi.Validation, "failed to apply assertion", err) } // compose a response if len(errs) != 0 { var responses []*engineapi.RuleResponse for _, err := range errs { responses = append(responses, engineapi.RuleFail(rule.Name, engineapi.Validation, err.Error(), rule.ReportProperties)) } return resource, handlers.WithResponses(responses...) } msg := fmt.Sprintf("Validation rule '%s' passed.", rule.Name) return resource, handlers.WithResponses( engineapi.RulePass(rule.Name, engineapi.Validation, msg, rule.ReportProperties), ) }