1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-06 16:06:56 +00:00
kyverno/pkg/utils/report/results.go
Charles-Edouard Brétéché f18f155816
refactor: engine response policy (#7063)
Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com>
2023-05-03 13:05:01 +08:00

164 lines
5.1 KiB
Go

package report
import (
"sort"
"strings"
"time"
"github.com/go-logr/logr"
kyvernov1 "github.com/kyverno/kyverno/api/kyverno/v1"
kyvernov1alpha2 "github.com/kyverno/kyverno/api/kyverno/v1alpha2"
policyreportv1alpha2 "github.com/kyverno/kyverno/api/policyreport/v1alpha2"
engineapi "github.com/kyverno/kyverno/pkg/engine/api"
"golang.org/x/exp/slices"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/tools/cache"
)
func SortReportResults(results []policyreportv1alpha2.PolicyReportResult) {
slices.SortFunc(results, func(a policyreportv1alpha2.PolicyReportResult, b policyreportv1alpha2.PolicyReportResult) bool {
if a.Policy != b.Policy {
return a.Policy < b.Policy
}
if a.Rule != b.Rule {
return a.Rule < b.Rule
}
if len(a.Resources) != len(b.Resources) {
return len(a.Resources) < len(b.Resources)
}
for i := range a.Resources {
if a.Resources[i].UID != b.Resources[i].UID {
return a.Resources[i].UID < b.Resources[i].UID
}
}
return a.Timestamp.String() < b.Timestamp.String()
})
}
func CalculateSummary(results []policyreportv1alpha2.PolicyReportResult) (summary policyreportv1alpha2.PolicyReportSummary) {
for _, res := range results {
switch string(res.Result) {
case policyreportv1alpha2.StatusPass:
summary.Pass++
case policyreportv1alpha2.StatusFail:
summary.Fail++
case policyreportv1alpha2.StatusWarn:
summary.Warn++
case policyreportv1alpha2.StatusError:
summary.Error++
case policyreportv1alpha2.StatusSkip:
summary.Skip++
}
}
return
}
func toPolicyResult(status engineapi.RuleStatus) policyreportv1alpha2.PolicyResult {
switch status {
case engineapi.RuleStatusPass:
return policyreportv1alpha2.StatusPass
case engineapi.RuleStatusFail:
return policyreportv1alpha2.StatusFail
case engineapi.RuleStatusError:
return policyreportv1alpha2.StatusError
case engineapi.RuleStatusWarn:
return policyreportv1alpha2.StatusWarn
case engineapi.RuleStatusSkip:
return policyreportv1alpha2.StatusSkip
}
return ""
}
func severityFromString(severity string) policyreportv1alpha2.PolicySeverity {
switch severity {
case policyreportv1alpha2.SeverityHigh:
return policyreportv1alpha2.SeverityHigh
case policyreportv1alpha2.SeverityMedium:
return policyreportv1alpha2.SeverityMedium
case policyreportv1alpha2.SeverityLow:
return policyreportv1alpha2.SeverityLow
}
return ""
}
func EngineResponseToReportResults(response engineapi.EngineResponse) []policyreportv1alpha2.PolicyReportResult {
key, _ := cache.MetaNamespaceKeyFunc(response.Policy())
var results []policyreportv1alpha2.PolicyReportResult
for _, ruleResult := range response.PolicyResponse.Rules {
annotations := response.Policy().GetAnnotations()
result := policyreportv1alpha2.PolicyReportResult{
Source: kyvernov1.ValueKyvernoApp,
Policy: key,
Rule: ruleResult.Name(),
Message: ruleResult.Message(),
Result: toPolicyResult(ruleResult.Status()),
Scored: annotations[kyvernov1.AnnotationPolicyScored] != "false",
Timestamp: metav1.Timestamp{
Seconds: time.Now().Unix(),
},
Category: annotations[kyvernov1.AnnotationPolicyCategory],
Severity: severityFromString(annotations[kyvernov1.AnnotationPolicySeverity]),
}
pss := ruleResult.PodSecurityChecks()
if pss != nil {
var controls []string
for _, check := range pss.Checks {
if !check.CheckResult.Allowed {
controls = append(controls, check.ID)
}
}
if len(controls) > 0 {
sort.Strings(controls)
result.Properties = map[string]string{
"standard": string(pss.Level),
"version": pss.Version,
"controls": strings.Join(controls, ","),
}
}
}
if result.Result == "fail" && !result.Scored {
result.Result = "warn"
}
results = append(results, result)
}
return results
}
func SplitResultsByPolicy(logger logr.Logger, results []policyreportv1alpha2.PolicyReportResult) map[string][]policyreportv1alpha2.PolicyReportResult {
resultsMap := map[string][]policyreportv1alpha2.PolicyReportResult{}
keysMap := map[string]string{}
for _, result := range results {
if keysMap[result.Policy] == "" {
ns, n, err := cache.SplitMetaNamespaceKey(result.Policy)
if err != nil {
logger.Error(err, "failed to decode policy name", "key", result.Policy)
} else {
if ns == "" {
keysMap[result.Policy] = "cpol-" + n
} else {
keysMap[result.Policy] = "pol-" + n
}
}
}
}
for _, result := range results {
key := keysMap[result.Policy]
resultsMap[key] = append(resultsMap[key], result)
}
return resultsMap
}
func SetResults(report kyvernov1alpha2.ReportInterface, results ...policyreportv1alpha2.PolicyReportResult) {
SortReportResults(results)
report.SetResults(results)
report.SetSummary(CalculateSummary(results))
}
func SetResponses(report kyvernov1alpha2.ReportInterface, engineResponses ...engineapi.EngineResponse) {
var ruleResults []policyreportv1alpha2.PolicyReportResult
for _, result := range engineResponses {
SetPolicyLabel(report, result.Policy())
ruleResults = append(ruleResults, EngineResponseToReportResults(result)...)
}
SetResults(report, ruleResults...)
}