mirror of
https://github.com/kyverno/kyverno.git
synced 2024-12-14 11:57:48 +00:00
164 lines
4.2 KiB
Go
164 lines
4.2 KiB
Go
package webhooks
|
|
|
|
import (
|
|
"encoding/json"
|
|
"strings"
|
|
|
|
yamlv2 "gopkg.in/yaml.v2"
|
|
|
|
jsonpatch "github.com/evanphx/json-patch"
|
|
"github.com/go-logr/logr"
|
|
"github.com/nirmata/kyverno/pkg/engine"
|
|
"github.com/nirmata/kyverno/pkg/engine/response"
|
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
|
)
|
|
|
|
const (
|
|
policyAnnotation = "policies.kyverno.io~1patches"
|
|
)
|
|
|
|
type rulePatch struct {
|
|
RuleName string `json:"rulename"`
|
|
Op string `json:"op"`
|
|
Path string `json:"path"`
|
|
}
|
|
|
|
type annresponse struct {
|
|
Op string `json:"op"`
|
|
Path string `json:"path"`
|
|
Value interface{} `json:"value"`
|
|
}
|
|
|
|
var operationToPastTense = map[string]string{
|
|
"add": "added",
|
|
"remove": "removed",
|
|
"replace": "replaced",
|
|
"move": "moved",
|
|
"copy": "copied",
|
|
"test": "tested",
|
|
}
|
|
|
|
func generateAnnotationPatches(engineResponses []response.EngineResponse, log logr.Logger) []byte {
|
|
var annotations map[string]string
|
|
|
|
for _, er := range engineResponses {
|
|
if ann := er.PatchedResource.GetAnnotations(); ann != nil {
|
|
annotations = ann
|
|
break
|
|
}
|
|
}
|
|
|
|
if annotations == nil {
|
|
annotations = make(map[string]string)
|
|
}
|
|
|
|
var patchResponse annresponse
|
|
value := annotationFromEngineResponses(engineResponses, log)
|
|
if value == nil {
|
|
// no patches or error while processing patches
|
|
return nil
|
|
}
|
|
|
|
if _, ok := annotations[strings.ReplaceAll(policyAnnotation, "~1", "/")]; ok {
|
|
// create update patch string
|
|
patchResponse = annresponse{
|
|
Op: "replace",
|
|
Path: "/metadata/annotations/" + policyAnnotation,
|
|
Value: string(value),
|
|
}
|
|
} else {
|
|
// mutate rule has annotation patches
|
|
if len(annotations) > 0 {
|
|
patchResponse = annresponse{
|
|
Op: "add",
|
|
Path: "/metadata/annotations/" + policyAnnotation,
|
|
Value: string(value),
|
|
}
|
|
} else {
|
|
// insert 'policies.kyverno.patches' entry in annotation map
|
|
annotations[strings.ReplaceAll(policyAnnotation, "~1", "/")] = string(value)
|
|
patchResponse = annresponse{
|
|
Op: "add",
|
|
Path: "/metadata/annotations",
|
|
Value: annotations,
|
|
}
|
|
}
|
|
}
|
|
|
|
patchByte, _ := json.Marshal(patchResponse)
|
|
|
|
// check the patch
|
|
_, err := jsonpatch.DecodePatch([]byte("[" + string(patchByte) + "]"))
|
|
if err != nil {
|
|
log.Error(err, "failed o build JSON patch for annotation", "patch", string(patchByte))
|
|
}
|
|
|
|
return patchByte
|
|
}
|
|
|
|
func annotationFromEngineResponses(engineResponses []response.EngineResponse, log logr.Logger) []byte {
|
|
var annotationContent = make(map[string]string)
|
|
for _, engineResponse := range engineResponses {
|
|
if !engineResponse.IsSuccesful() {
|
|
log.V(3).Info("skip building annotation; policy failed to apply", "policy", engineResponse.PolicyResponse.Policy)
|
|
continue
|
|
}
|
|
|
|
rulePatches := annotationFromPolicyResponse(engineResponse.PolicyResponse, log)
|
|
if rulePatches == nil {
|
|
continue
|
|
}
|
|
|
|
policyName := engineResponse.PolicyResponse.Policy
|
|
for _, rulePatch := range rulePatches {
|
|
annotationContent[rulePatch.RuleName+"."+policyName+".kyverno.io"] = operationToPastTense[rulePatch.Op] + " " + rulePatch.Path
|
|
}
|
|
}
|
|
|
|
// return nil if there's no patches
|
|
// otherwise result = null, len(result) = 4
|
|
if len(annotationContent) == 0 {
|
|
return nil
|
|
}
|
|
|
|
result, _ := yamlv2.Marshal(annotationContent)
|
|
|
|
return result
|
|
}
|
|
|
|
func annotationFromPolicyResponse(policyResponse response.PolicyResponse, log logr.Logger) []rulePatch {
|
|
var rulePatches []rulePatch
|
|
for _, ruleInfo := range policyResponse.Rules {
|
|
for _, patch := range ruleInfo.Patches {
|
|
var patchmap map[string]interface{}
|
|
if err := json.Unmarshal(patch, &patchmap); err != nil {
|
|
log.Error(err, "Failed to parse JSON patch bytes")
|
|
continue
|
|
}
|
|
|
|
rp := rulePatch{
|
|
RuleName: ruleInfo.Name,
|
|
Op: patchmap["op"].(string),
|
|
Path: patchmap["path"].(string)}
|
|
|
|
rulePatches = append(rulePatches, rp)
|
|
log.V(4).Info("annotation value prepared", "patches", rulePatches)
|
|
}
|
|
}
|
|
if len(rulePatches) == 0 {
|
|
return nil
|
|
}
|
|
return rulePatches
|
|
}
|
|
|
|
// checkPodTemplateAnn checks if a Pod has annotation "pod-policies.kyverno.io/autogen-applied"
|
|
func checkPodTemplateAnnotation(resource unstructured.Unstructured) bool {
|
|
if resource.GetKind() == "Pod" {
|
|
ann := resource.GetAnnotations()
|
|
if _, ok := ann[engine.PodTemplateAnnotation]; ok {
|
|
return true
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|