1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-09 17:37:12 +00:00
kyverno/pkg/controllers/report/utils/scanner.go
Mariam Fahmy 76751b96b3
feat: support celexceptions in the CLI apply command (#12182)
* feat: support celexceptions in the CLI

Signed-off-by: Mariam Fahmy <mariam.fahmy@nirmata.com>

* feat: add unit tests

Signed-off-by: Mariam Fahmy <mariam.fahmy@nirmata.com>

---------

Signed-off-by: Mariam Fahmy <mariam.fahmy@nirmata.com>
2025-02-19 08:38:44 +00:00

243 lines
7.7 KiB
Go

package utils
import (
"context"
"github.com/go-logr/logr"
"github.com/kyverno/kyverno/api/kyverno"
kyvernov1 "github.com/kyverno/kyverno/api/kyverno/v1"
policiesv1alpha1 "github.com/kyverno/kyverno/api/policies.kyverno.io/v1alpha1"
"github.com/kyverno/kyverno/pkg/admissionpolicy"
celengine "github.com/kyverno/kyverno/pkg/cel/engine"
"github.com/kyverno/kyverno/pkg/cel/matching"
celpolicy "github.com/kyverno/kyverno/pkg/cel/policy"
"github.com/kyverno/kyverno/pkg/clients/dclient"
"github.com/kyverno/kyverno/pkg/config"
"github.com/kyverno/kyverno/pkg/engine"
engineapi "github.com/kyverno/kyverno/pkg/engine/api"
"github.com/kyverno/kyverno/pkg/engine/jmespath"
reportutils "github.com/kyverno/kyverno/pkg/utils/report"
"go.uber.org/multierr"
admissionv1 "k8s.io/api/admission/v1"
admissionregistrationv1 "k8s.io/api/admissionregistration/v1"
corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
"k8s.io/apimachinery/pkg/runtime/schema"
)
type scanner struct {
logger logr.Logger
engine engineapi.Engine
config config.Configuration
jp jmespath.Interface
client dclient.Interface
reportingConfig reportutils.ReportingConfiguration
}
type ScanResult struct {
EngineResponse *engineapi.EngineResponse
Error error
}
type Scanner interface {
ScanResource(
context.Context,
unstructured.Unstructured,
schema.GroupVersionResource,
string,
*corev1.Namespace,
[]admissionregistrationv1.ValidatingAdmissionPolicyBinding,
...engineapi.GenericPolicy,
) map[*engineapi.GenericPolicy]ScanResult
}
func NewScanner(
logger logr.Logger,
engine engineapi.Engine,
config config.Configuration,
jp jmespath.Interface,
client dclient.Interface,
reportingConfig reportutils.ReportingConfiguration,
) Scanner {
return &scanner{
logger: logger,
engine: engine,
config: config,
jp: jp,
client: client,
reportingConfig: reportingConfig,
}
}
func (s *scanner) ScanResource(
ctx context.Context,
resource unstructured.Unstructured,
gvr schema.GroupVersionResource,
subResource string,
ns *corev1.Namespace,
bindings []admissionregistrationv1.ValidatingAdmissionPolicyBinding,
policies ...engineapi.GenericPolicy,
) map[*engineapi.GenericPolicy]ScanResult {
var kpols, vpols, vaps []engineapi.GenericPolicy
// split policies per nature
for _, policy := range policies {
if pol := policy.AsKyvernoPolicy(); pol != nil {
kpols = append(kpols, policy)
} else if pol := policy.AsValidatingPolicy(); pol != nil {
vpols = append(vpols, policy)
} else if pol := policy.AsValidatingAdmissionPolicy(); pol != nil {
vaps = append(vaps, policy)
}
}
logger := s.logger.WithValues("kind", resource.GetKind(), "namespace", resource.GetNamespace(), "name", resource.GetName())
results := map[*engineapi.GenericPolicy]ScanResult{}
// evaluate kyverno policies
var nsLabels map[string]string
if ns != nil {
nsLabels = ns.Labels
}
for i, policy := range kpols {
if pol := policy.AsKyvernoPolicy(); pol != nil {
var errors []error
var response *engineapi.EngineResponse
var err error
if s.reportingConfig.ValidateReportsEnabled() {
response, err = s.validateResource(ctx, resource, nsLabels, pol)
if err != nil {
logger.Error(err, "failed to scan resource")
errors = append(errors, err)
}
}
spec := pol.GetSpec()
if spec.HasVerifyImages() && len(errors) == 0 && s.reportingConfig.ImageVerificationReportsEnabled() {
if response != nil {
// remove responses of verify image rules
ruleResponses := make([]engineapi.RuleResponse, 0, len(response.PolicyResponse.Rules))
for _, v := range response.PolicyResponse.Rules {
if v.RuleType() != engineapi.ImageVerify {
ruleResponses = append(ruleResponses, v)
}
}
response.PolicyResponse.Rules = ruleResponses
}
ivResponse, err := s.validateImages(ctx, resource, nsLabels, pol)
if err != nil {
logger.Error(err, "failed to scan images")
errors = append(errors, err)
}
if response == nil {
response = ivResponse
} else if ivResponse != nil {
response.PolicyResponse.Rules = append(response.PolicyResponse.Rules, ivResponse.PolicyResponse.Rules...)
}
}
results[&kpols[i]] = ScanResult{response, multierr.Combine(errors...)}
}
}
// evaluate validating policies
for i, policy := range vpols {
if pol := policy.AsValidatingPolicy(); pol != nil {
// create compiler
compiler := celpolicy.NewCompiler()
// create provider
provider, err := celengine.NewProvider(compiler, []policiesv1alpha1.ValidatingPolicy{*pol}, nil)
if err != nil {
logger.Error(err, "failed to create policy provider")
results[&vpols[i]] = ScanResult{nil, err}
continue
}
// create engine
engine := celengine.NewEngine(
provider,
func(name string) *corev1.Namespace { return ns },
matching.NewMatcher(),
)
// create context provider
context, err := celpolicy.NewContextProvider(
s.client.GetKubeClient(),
nil,
// TODO
// []imagedataloader.Option{imagedataloader.WithLocalCredentials(c.RegistryAccess)},
)
if err != nil {
logger.Error(err, "failed to create cel context provider")
results[&vpols[i]] = ScanResult{nil, err}
continue
}
request := celengine.Request(
context,
resource.GroupVersionKind(),
gvr,
subResource,
resource.GetName(),
resource.GetNamespace(),
admissionv1.Create,
&resource,
nil,
false,
nil,
)
engineResponse, err := engine.Handle(ctx, request)
response := engineapi.EngineResponse{
Resource: resource,
PolicyResponse: engineapi.PolicyResponse{
// TODO: policies at index 0
Rules: engineResponse.Policies[0].Rules,
},
}.WithPolicy(vpols[i])
results[&vpols[i]] = ScanResult{&response, err}
}
}
// evaluate validating admission policies
for i, policy := range vaps {
if pol := policy.AsValidatingAdmissionPolicy(); pol != nil {
policyData := admissionpolicy.NewPolicyData(*pol)
for _, binding := range bindings {
if binding.Spec.PolicyName == pol.Name {
policyData.AddBinding(binding)
}
}
res, err := admissionpolicy.Validate(policyData, resource, map[string]map[string]string{}, s.client)
results[&vaps[i]] = ScanResult{&res, err}
}
}
return results
}
func (s *scanner) validateResource(ctx context.Context, resource unstructured.Unstructured, nsLabels map[string]string, policy kyvernov1.PolicyInterface) (*engineapi.EngineResponse, error) {
policyCtx, err := engine.NewPolicyContext(s.jp, resource, kyvernov1.Create, nil, s.config)
if err != nil {
return nil, err
}
policyCtx = policyCtx.
WithNewResource(resource).
WithPolicy(policy).
WithNamespaceLabels(nsLabels)
response := s.engine.Validate(ctx, policyCtx)
if len(response.PolicyResponse.Rules) > 0 {
s.logger.V(6).Info("validateResource", "policy", policy, "response", response)
}
return &response, nil
}
func (s *scanner) validateImages(ctx context.Context, resource unstructured.Unstructured, nsLabels map[string]string, policy kyvernov1.PolicyInterface) (*engineapi.EngineResponse, error) {
annotations := resource.GetAnnotations()
if annotations != nil {
resource = *resource.DeepCopy()
delete(annotations, kyverno.AnnotationImageVerify)
resource.SetAnnotations(annotations)
}
policyCtx, err := engine.NewPolicyContext(s.jp, resource, kyvernov1.Create, nil, s.config)
if err != nil {
return nil, err
}
policyCtx = policyCtx.
WithNewResource(resource).
WithPolicy(policy).
WithNamespaceLabels(nsLabels)
response, _ := s.engine.VerifyAndPatchImages(ctx, policyCtx)
if len(response.PolicyResponse.Rules) > 0 {
s.logger.V(6).Info("validateImages", "policy", policy, "response", response)
}
return &response, nil
}