mirror of
https://github.com/kyverno/kyverno.git
synced 2024-12-14 11:57:48 +00:00
d6062fdd47
* remove empty flag * format code * revert change in install.yaml
38 lines
1.3 KiB
Go
38 lines
1.3 KiB
Go
package webhooks
|
|
|
|
import (
|
|
"time"
|
|
|
|
policyvalidate "github.com/nirmata/kyverno/pkg/policy"
|
|
|
|
v1beta1 "k8s.io/api/admission/v1beta1"
|
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
)
|
|
|
|
//HandlePolicyValidation performs the validation check on policy resource
|
|
func (ws *WebhookServer) policyValidation(request *v1beta1.AdmissionRequest) *v1beta1.AdmissionResponse {
|
|
logger := ws.log.WithValues("action", "policyvalidation", "uid", request.UID, "kind", request.Kind, "namespace", request.Namespace, "name", request.Name, "operation", request.Operation)
|
|
|
|
startTime := time.Now()
|
|
logger.V(3).Info("start validating policy")
|
|
defer logger.V(3).Info("finished validating policy", "time", time.Since(startTime).String())
|
|
|
|
//TODO: can this happen? wont this be picked by OpenAPI spec schema ?
|
|
if err := policyvalidate.Validate(request.Object.Raw, ws.client, false, ws.openAPIController); err != nil {
|
|
logger.Error(err, "faield to validate policy")
|
|
return &v1beta1.AdmissionResponse{
|
|
Allowed: false,
|
|
Result: &metav1.Status{
|
|
Message: err.Error(),
|
|
},
|
|
}
|
|
}
|
|
|
|
// if the policy contains mutating & validation rules and it config does not exist we create one
|
|
// queue the request
|
|
ws.resourceWebhookWatcher.RegisterResourceWebhook()
|
|
return &v1beta1.AdmissionResponse{
|
|
Allowed: true,
|
|
}
|
|
}
|