mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-06 07:57:07 +00:00
* feat: Handle Exception Signed-off-by: Eileen Yu <eileenylj@gmail.com> * fixes Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> Signed-off-by: Eileen Yu <eileenylj@gmail.com> Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> Co-authored-by: Charles-Edouard Brétéché <charled.breteche@gmail.com> Co-authored-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> Co-authored-by: Jim Bugwadia <jim@nirmata.com>
292 lines
9.5 KiB
Go
292 lines
9.5 KiB
Go
package engine
|
|
|
|
import (
|
|
kyvernov1 "github.com/kyverno/kyverno/api/kyverno/v1"
|
|
kyvernov1beta1 "github.com/kyverno/kyverno/api/kyverno/v1beta1"
|
|
kyvernov2alpha1 "github.com/kyverno/kyverno/api/kyverno/v2alpha1"
|
|
kyvernov2alpha1listers "github.com/kyverno/kyverno/pkg/client/listers/kyverno/v2alpha1"
|
|
"github.com/kyverno/kyverno/pkg/clients/dclient"
|
|
"github.com/kyverno/kyverno/pkg/config"
|
|
enginectx "github.com/kyverno/kyverno/pkg/engine/context"
|
|
"github.com/kyverno/kyverno/pkg/engine/context/resolvers"
|
|
"github.com/kyverno/kyverno/pkg/utils"
|
|
"github.com/pkg/errors"
|
|
admissionv1 "k8s.io/api/admission/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
|
"k8s.io/apimachinery/pkg/labels"
|
|
"k8s.io/client-go/tools/cache"
|
|
)
|
|
|
|
// ExcludeFunc is a function used to determine if a resource is excluded
|
|
type ExcludeFunc = func(kind, namespace, name string) bool
|
|
|
|
// PolicyContext contains the contexts for engine to process
|
|
type PolicyContext struct {
|
|
// policy is the policy to be processed
|
|
policy kyvernov1.PolicyInterface
|
|
|
|
// newResource is the resource to be processed
|
|
newResource unstructured.Unstructured
|
|
|
|
// oldResource is the prior resource for an update, or nil
|
|
oldResource unstructured.Unstructured
|
|
|
|
// element is set when the context is used for processing a foreach loop
|
|
element unstructured.Unstructured
|
|
|
|
// admissionInfo contains the admission request information
|
|
admissionInfo kyvernov1beta1.RequestInfo
|
|
|
|
// requestResource is the fully-qualified resource of the original API request (for example, v1.pods).
|
|
// If this is specified and differs from the value in "resource", an equivalent match and conversion was performed.
|
|
//
|
|
// For example, if deployments can be modified via apps/v1 and apps/v1beta1, and a webhook registered a rule of
|
|
// `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]` and `matchPolicy: Equivalent`,
|
|
// an API request to apps/v1beta1 deployments would be converted and sent to the webhook
|
|
// with `resource: {group:"apps", version:"v1", resource:"deployments"}` (matching the resource the webhook registered for),
|
|
// and `requestResource: {group:"apps", version:"v1beta1", resource:"deployments"}` (indicating the resource of the original API request).
|
|
requestResource metav1.GroupVersionResource
|
|
|
|
// Dynamic client - used for api lookups
|
|
client dclient.Interface
|
|
|
|
// Config handler
|
|
excludeGroupRole []string
|
|
|
|
excludeResourceFunc ExcludeFunc
|
|
|
|
// jsonContext is the variable context
|
|
jsonContext enginectx.Interface
|
|
|
|
// namespaceLabels stores the label of namespace to be processed by namespace selector
|
|
namespaceLabels map[string]string
|
|
|
|
// admissionOperation represents if the caller is from the webhook server
|
|
admissionOperation bool
|
|
|
|
// informerCacheResolvers - used to get resources from informer cache
|
|
informerCacheResolvers resolvers.ConfigmapResolver
|
|
|
|
// subresource is the subresource being requested, if any (for example, "status" or "scale")
|
|
subresource string
|
|
|
|
// subresourcesInPolicy represents the APIResources that are subresources along with their parent resource.
|
|
// This is used to determine if a resource is a subresource. It is only used when the policy context is populated
|
|
// by kyverno CLI. In all other cases when connected to a cluster, this is empty.
|
|
subresourcesInPolicy []struct {
|
|
APIResource metav1.APIResource
|
|
ParentResource metav1.APIResource
|
|
}
|
|
|
|
// peLister list all policy exceptions
|
|
peLister kyvernov2alpha1listers.PolicyExceptionLister
|
|
}
|
|
|
|
// Getters
|
|
|
|
func (c *PolicyContext) Policy() kyvernov1.PolicyInterface {
|
|
return c.policy
|
|
}
|
|
|
|
func (c *PolicyContext) NewResource() unstructured.Unstructured {
|
|
return c.newResource
|
|
}
|
|
|
|
func (c *PolicyContext) OldResource() unstructured.Unstructured {
|
|
return c.oldResource
|
|
}
|
|
|
|
func (c *PolicyContext) AdmissionInfo() kyvernov1beta1.RequestInfo {
|
|
return c.admissionInfo
|
|
}
|
|
|
|
func (c *PolicyContext) JSONContext() enginectx.Interface {
|
|
return c.jsonContext
|
|
}
|
|
|
|
func (c *PolicyContext) FindExceptions(rule string) ([]*kyvernov2alpha1.PolicyException, error) {
|
|
if c.peLister == nil {
|
|
return nil, nil
|
|
}
|
|
polexs, err := c.peLister.List(labels.Everything())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
var result []*kyvernov2alpha1.PolicyException
|
|
policyName, err := cache.MetaNamespaceKeyFunc(c.policy)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to compute policy key")
|
|
}
|
|
for _, polex := range polexs {
|
|
if polex.Contains(policyName, rule) {
|
|
result = append(result, polex)
|
|
}
|
|
}
|
|
return result, nil
|
|
}
|
|
|
|
// Mutators
|
|
|
|
func (c *PolicyContext) WithPolicy(policy kyvernov1.PolicyInterface) *PolicyContext {
|
|
copy := c.Copy()
|
|
copy.policy = policy
|
|
return copy
|
|
}
|
|
|
|
func (c *PolicyContext) WithNamespaceLabels(namespaceLabels map[string]string) *PolicyContext {
|
|
copy := c.Copy()
|
|
copy.namespaceLabels = namespaceLabels
|
|
return copy
|
|
}
|
|
|
|
func (c *PolicyContext) WithAdmissionInfo(admissionInfo kyvernov1beta1.RequestInfo) *PolicyContext {
|
|
copy := c.Copy()
|
|
copy.admissionInfo = admissionInfo
|
|
return copy
|
|
}
|
|
|
|
func (c *PolicyContext) WithRequestResource(requestResource metav1.GroupVersionResource) *PolicyContext {
|
|
copy := c.Copy()
|
|
copy.requestResource = requestResource
|
|
return copy
|
|
}
|
|
|
|
func (c *PolicyContext) WithNewResource(resource unstructured.Unstructured) *PolicyContext {
|
|
copy := c.Copy()
|
|
copy.newResource = resource
|
|
return copy
|
|
}
|
|
|
|
func (c *PolicyContext) WithOldResource(resource unstructured.Unstructured) *PolicyContext {
|
|
copy := c.Copy()
|
|
copy.oldResource = resource
|
|
return copy
|
|
}
|
|
|
|
func (c *PolicyContext) WithResources(newResource unstructured.Unstructured, oldResource unstructured.Unstructured) *PolicyContext {
|
|
return c.WithNewResource(newResource).WithOldResource(oldResource)
|
|
}
|
|
|
|
func (c *PolicyContext) WithClient(client dclient.Interface) *PolicyContext {
|
|
copy := c.Copy()
|
|
copy.client = client
|
|
return copy
|
|
}
|
|
|
|
func (c *PolicyContext) WithExcludeGroupRole(excludeGroupRole ...string) *PolicyContext {
|
|
copy := c.Copy()
|
|
copy.excludeGroupRole = excludeGroupRole
|
|
return copy
|
|
}
|
|
|
|
func (c *PolicyContext) WithExcludeResourceFunc(excludeResourceFunc ExcludeFunc) *PolicyContext {
|
|
copy := c.Copy()
|
|
copy.excludeResourceFunc = excludeResourceFunc
|
|
return copy
|
|
}
|
|
|
|
func (c *PolicyContext) WithConfiguration(configuration config.Configuration) *PolicyContext {
|
|
return c.WithExcludeResourceFunc(configuration.ToFilter).WithExcludeGroupRole(configuration.GetExcludeGroupRole()...)
|
|
}
|
|
|
|
func (c *PolicyContext) WithAdmissionOperation(admissionOperation bool) *PolicyContext {
|
|
copy := c.Copy()
|
|
copy.admissionOperation = admissionOperation
|
|
return copy
|
|
}
|
|
|
|
func (c *PolicyContext) WithInformerCacheResolver(informerCacheResolver resolvers.ConfigmapResolver) *PolicyContext {
|
|
copy := c.Copy()
|
|
copy.informerCacheResolvers = informerCacheResolver
|
|
return copy
|
|
}
|
|
|
|
func (c *PolicyContext) WithSubresource(subresource string) *PolicyContext {
|
|
copy := c.Copy()
|
|
copy.subresource = subresource
|
|
return copy
|
|
}
|
|
|
|
func (c *PolicyContext) WithSubresourcesInPolicy(subresourcesInPolicy []struct {
|
|
APIResource metav1.APIResource
|
|
ParentResource metav1.APIResource
|
|
},
|
|
) *PolicyContext {
|
|
copy := c.Copy()
|
|
copy.subresourcesInPolicy = subresourcesInPolicy
|
|
return copy
|
|
}
|
|
|
|
func (c *PolicyContext) WithExceptions(peLister kyvernov2alpha1listers.PolicyExceptionLister) *PolicyContext {
|
|
copy := c.Copy()
|
|
copy.peLister = peLister
|
|
return copy
|
|
}
|
|
|
|
// Constructors
|
|
func NewPolicyContextWithJsonContext(jsonContext enginectx.Interface) *PolicyContext {
|
|
return &PolicyContext{
|
|
jsonContext: jsonContext,
|
|
excludeGroupRole: []string{},
|
|
excludeResourceFunc: func(string, string, string) bool {
|
|
return false
|
|
},
|
|
}
|
|
}
|
|
|
|
func NewPolicyContext() *PolicyContext {
|
|
return NewPolicyContextWithJsonContext(enginectx.NewContext())
|
|
}
|
|
|
|
func NewPolicyContextFromAdmissionRequest(
|
|
request *admissionv1.AdmissionRequest,
|
|
admissionInfo kyvernov1beta1.RequestInfo,
|
|
configuration config.Configuration,
|
|
client dclient.Interface,
|
|
informerCacheResolver resolvers.ConfigmapResolver,
|
|
peLister kyvernov2alpha1listers.PolicyExceptionLister,
|
|
) (*PolicyContext, error) {
|
|
ctx, err := newVariablesContext(request, &admissionInfo)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to create policy rule context")
|
|
}
|
|
newResource, oldResource, err := utils.ExtractResources(nil, request)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to parse resource")
|
|
}
|
|
if err := ctx.AddImageInfos(&newResource); err != nil {
|
|
return nil, errors.Wrap(err, "failed to add image information to the policy rule context")
|
|
}
|
|
requestResource := request.RequestResource.DeepCopy()
|
|
policyContext := NewPolicyContextWithJsonContext(ctx).
|
|
WithNewResource(newResource).
|
|
WithOldResource(oldResource).
|
|
WithAdmissionInfo(admissionInfo).
|
|
WithConfiguration(configuration).
|
|
WithClient(client).
|
|
WithAdmissionOperation(true).
|
|
WithInformerCacheResolver(informerCacheResolver).
|
|
WithRequestResource(*requestResource).
|
|
WithSubresource(request.SubResource).
|
|
WithExceptions(peLister)
|
|
return policyContext, nil
|
|
}
|
|
|
|
func (c PolicyContext) Copy() *PolicyContext {
|
|
return &c
|
|
}
|
|
|
|
func newVariablesContext(request *admissionv1.AdmissionRequest, userRequestInfo *kyvernov1beta1.RequestInfo) (enginectx.Interface, error) {
|
|
ctx := enginectx.NewContext()
|
|
if err := ctx.AddRequest(request); err != nil {
|
|
return nil, errors.Wrap(err, "failed to load incoming request in context")
|
|
}
|
|
if err := ctx.AddUserInfo(*userRequestInfo); err != nil {
|
|
return nil, errors.Wrap(err, "failed to load userInfo in context")
|
|
}
|
|
if err := ctx.AddServiceAccount(userRequestInfo.AdmissionUserInfo.Username); err != nil {
|
|
return nil, errors.Wrap(err, "failed to load service account in context")
|
|
}
|
|
return ctx, nil
|
|
}
|