mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-26 01:24:26 +00:00
* feat: update ivpol.status api Signed-off-by: ShutingZhao <shuting@nirmata.com> * chore: fix unit tests Signed-off-by: ShutingZhao <shuting@nirmata.com> * chore: update codegen Signed-off-by: ShutingZhao <shuting@nirmata.com> * chore: update codegen Signed-off-by: ShutingZhao <shuting@nirmata.com> * feat: reconcile ivpol.status Signed-off-by: ShutingZhao <shuting@nirmata.com> * fix: unit tests Signed-off-by: ShutingZhao <shuting@nirmata.com> * fix: linter issues Signed-off-by: ShutingZhao <shuting@nirmata.com> * fix: autogen fields replacement Signed-off-by: ShutingZhao <shuting@nirmata.com> * chore: add unit tests Signed-off-by: ShutingZhao <shuting@nirmata.com> * feat: update ivpol autogen rules Signed-off-by: ShutingZhao <shuting@nirmata.com> * feat: invoke ivpol webhook handler Signed-off-by: ShutingZhao <shuting@nirmata.com> --------- Signed-off-by: ShutingZhao <shuting@nirmata.com> Signed-off-by: shuting <shuting@nirmata.com>
76 lines
2.2 KiB
Go
76 lines
2.2 KiB
Go
package eval
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/kyverno/kyverno/api/policies.kyverno.io/v1alpha1"
|
|
"github.com/kyverno/kyverno/pkg/imageverification/imagedataloader"
|
|
admissionv1 "k8s.io/api/admission/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/apiserver/pkg/admission"
|
|
k8scorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
|
|
)
|
|
|
|
func Evaluate(ctx context.Context, ivpols []*v1alpha1.ImageVerificationPolicy, request interface{}, admissionAttr admission.Attributes, namespace runtime.Object, lister k8scorev1.SecretInterface, registryOpts ...imagedataloader.Option) (map[string]*EvaluationResult, error) {
|
|
ictx, err := imagedataloader.NewImageContext(lister, registryOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
isAdmissionRequest := false
|
|
var gvr *metav1.GroupVersionResource
|
|
if r, ok := request.(*admissionv1.AdmissionRequest); ok {
|
|
isAdmissionRequest = true
|
|
gvr = requestGVR(r)
|
|
}
|
|
|
|
policies := filterPolicies(ivpols, isAdmissionRequest)
|
|
|
|
c := NewCompiler(ictx, lister, gvr)
|
|
results := make(map[string]*EvaluationResult, len(policies))
|
|
for _, ivpol := range policies {
|
|
p, errList := c.Compile(ivpol)
|
|
if errList != nil {
|
|
return nil, fmt.Errorf("failed to compile policy %v", errList)
|
|
}
|
|
|
|
result, err := p.Evaluate(ctx, ictx, admissionAttr, request, namespace, isAdmissionRequest)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
results[ivpol.Name] = result
|
|
}
|
|
return results, nil
|
|
}
|
|
|
|
func isK8s(request interface{}) bool {
|
|
_, ok := request.(*admissionv1.AdmissionRequest)
|
|
return ok
|
|
}
|
|
|
|
func requestGVR(request *admissionv1.AdmissionRequest) *metav1.GroupVersionResource {
|
|
if request == nil {
|
|
return nil
|
|
}
|
|
|
|
return request.RequestResource
|
|
}
|
|
|
|
func filterPolicies(ivpols []*v1alpha1.ImageVerificationPolicy, isK8s bool) []*v1alpha1.ImageVerificationPolicy {
|
|
filteredPolicies := make([]*v1alpha1.ImageVerificationPolicy, 0)
|
|
|
|
for _, v := range ivpols {
|
|
if v == nil {
|
|
continue
|
|
}
|
|
|
|
if isK8s && v.Spec.EvaluationMode() == v1alpha1.EvaluationModeKubernetes {
|
|
filteredPolicies = append(filteredPolicies, v)
|
|
} else if !isK8s && v.Spec.EvaluationMode() == v1alpha1.EvaluationModeJSON {
|
|
filteredPolicies = append(filteredPolicies, v)
|
|
}
|
|
}
|
|
return filteredPolicies
|
|
}
|