mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-06 16:06:56 +00:00
* add report in cli * policy report crd added * policy report added * configmap added * added jobs * added jobs * bug fixed * added logic for cli * common function added * sub command added for policy report * subcommand added for report * common package changed * configmap added * added logic for kyverno cli * added logic for jobs * added logic for jobs * added logic for jobs * added logic for cli * buf fix * cli changes * count bug fix * docs added for command * go fmt * refactor codebase * remove policy controller for policyreport * policy report removed * bug fixes * bug fixes * added job trigger if needed * job deletation logic added * build failed fix * fixed e2e test * remove hard coded variables * packages adde * improvment added in jobs sheduler * policy report yaml added * cronjob added * small fixes * remove background sync * documentation added for report command * remove extra log * small improvement * tested policy report * revert hardcoded changes * changes for demo * demo changes * resource aggrigation added * More changes * More changes * - resolve PR comments; - refactor jobs controller * set rbac for jobs * add clean up in job controller * add short names * remove application scope for policyreport * move job controller to policyreport * add report logic in command apply * - update policy report types; - upgrade k8s library; - update code gen * temporarily comment out code to pass CI build * generate / update policyreport to cluster * add unit test for CLI report * add test for apply - generate policy report * fix unit test * - remove job controller; - remove in-memory configmap; - clean up kustomize manifest * remove dependency * add reportRequest / clusterReportRequest * clean up policy report * generate report request * update crd clusterReportRequest * - update json tag of report summary; - update definition manifests; - fix dclient creation * aggregate reportRequest into policy report * fix unit tests * - update report summary to optional; - generate clusterPolicyReport; - remove reportRequests after merged to report * remove * generate reportRequest in kyverno namespace * update resource filter in helm chart * - rename reportRequest to reportChangeRequest; -rename clusterReportRequest to clusterReportChangeRequest * generate policy report in background scan * skip generating report change request if there's entry results * fix results entry removal when policy / rule gets deleted * rename apiversion from policy.kubernetes.io to policy.k8s.io * update summary.* to lower case * move reportChangeRequest to kyverno.io/v1alpha1 * remove policy report flag * fix report update * clean up policy violation CRD * remove violation CRD from manifest * clean up policy violation code - remove pvGenerator * change severity fields to lower case * update import library * set report category Co-authored-by: Yuvraj <yuvraj.yad001@gmail.com> Co-authored-by: Yuvraj <10830562+evalsocket@users.noreply.github.com> Co-authored-by: Jim Bugwadia <jim@nirmata.com>
63 lines
1.9 KiB
Go
63 lines
1.9 KiB
Go
package policy
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/go-logr/logr"
|
|
"github.com/kyverno/kyverno/pkg/engine/response"
|
|
"github.com/kyverno/kyverno/pkg/event"
|
|
"github.com/kyverno/kyverno/pkg/policyreport"
|
|
)
|
|
|
|
// for each policy-resource response
|
|
// - has violation -> report
|
|
// - no violation -> cleanup policy violations
|
|
func (pc *PolicyController) cleanupAndReport(engineResponses []response.EngineResponse) {
|
|
logger := pc.log
|
|
// generate Events
|
|
eventInfos := generateEvents(pc.log, engineResponses)
|
|
pc.eventGen.Add(eventInfos...)
|
|
// create policy violation
|
|
pvInfos := policyreport.GeneratePRsFromEngineResponse(engineResponses, logger)
|
|
for i := range pvInfos {
|
|
pvInfos[i].FromSync = true
|
|
}
|
|
|
|
pc.prGenerator.Add(pvInfos...)
|
|
}
|
|
|
|
func generateEvents(log logr.Logger, ers []response.EngineResponse) []event.Info {
|
|
var eventInfos []event.Info
|
|
for _, er := range ers {
|
|
if er.IsSuccessful() {
|
|
continue
|
|
}
|
|
eventInfos = append(eventInfos, generateEventsPerEr(log, er)...)
|
|
}
|
|
return eventInfos
|
|
}
|
|
|
|
func generateEventsPerEr(log logr.Logger, er response.EngineResponse) []event.Info {
|
|
var eventInfos []event.Info
|
|
|
|
logger := log.WithValues("policy", er.PolicyResponse.Policy, "kind", er.PolicyResponse.Resource.Kind, "namespace", er.PolicyResponse.Resource.Namespace, "name", er.PolicyResponse.Resource.Name)
|
|
logger.V(4).Info("reporting results for policy")
|
|
|
|
for _, rule := range er.PolicyResponse.Rules {
|
|
if rule.Success {
|
|
continue
|
|
}
|
|
// generate event on resource for each failed rule
|
|
logger.V(4).Info("generating event on resource")
|
|
e := event.Info{}
|
|
e.Kind = er.PolicyResponse.Resource.Kind
|
|
e.Namespace = er.PolicyResponse.Resource.Namespace
|
|
e.Name = er.PolicyResponse.Resource.Name
|
|
e.Reason = event.PolicyViolation.String()
|
|
e.Source = event.PolicyController
|
|
e.Message = fmt.Sprintf("policy '%s' (%s) rule '%s' failed. %v", er.PolicyResponse.Policy, rule.Type, rule.Name, rule.Message)
|
|
eventInfos = append(eventInfos, e)
|
|
}
|
|
|
|
return eventInfos
|
|
}
|