mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-06 16:06:56 +00:00
* add image verification * inline policy list Signed-off-by: Jim Bugwadia <jim@nirmata.com> * cosign version and dependencies updates Signed-off-by: Jim Bugwadia <jim@nirmata.com> * add registry initialization Signed-off-by: Jim Bugwadia <jim@nirmata.com> * add build tag to exclude k8schain for cloud providers Signed-off-by: Jim Bugwadia <jim@nirmata.com> * add build tag to exclude k8schain for cloud providers Signed-off-by: Jim Bugwadia <jim@nirmata.com> * generate deep copy and other fixtures Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix deep copy issues Signed-off-by: Jim Bugwadia <jim@nirmata.com> * mutate images to add digest Signed-off-by: Jim Bugwadia <jim@nirmata.com> * add certificates to Kyverno container for HTTPS lookups Signed-off-by: Jim Bugwadia <jim@nirmata.com> * align flag syntax Signed-off-by: Jim Bugwadia <jim@nirmata.com> * update docs Signed-off-by: Jim Bugwadia <jim@nirmata.com> * update dependencies Signed-off-by: Jim Bugwadia <jim@nirmata.com> * update dependencies Signed-off-by: Jim Bugwadia <jim@nirmata.com> * patch image with digest and fix checks Signed-off-by: Jim Bugwadia <jim@nirmata.com> * hardcode image for demos Signed-off-by: Jim Bugwadia <jim@nirmata.com> * add default registry (docker.io) before calling reference.Parse Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix definition Signed-off-by: Jim Bugwadia <jim@nirmata.com> * increase webhook timeout Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix args Signed-off-by: Jim Bugwadia <jim@nirmata.com> * run gofmt Signed-off-by: Jim Bugwadia <jim@nirmata.com> * rename for clarity Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix HasImageVerify check Signed-off-by: Jim Bugwadia <jim@nirmata.com> * align make test commands Signed-off-by: Jim Bugwadia <jim@nirmata.com> * align make test commands Signed-off-by: Jim Bugwadia <jim@nirmata.com> * align make test commands Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix linter error Signed-off-by: Jim Bugwadia <jim@nirmata.com> * format Signed-off-by: Jim Bugwadia <jim@nirmata.com> * handle API conflict and retry Signed-off-by: Jim Bugwadia <jim@nirmata.com> * format Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix reviewdog issues Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix make for unit tests Signed-off-by: Jim Bugwadia <jim@nirmata.com> * improve error message Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix durations Signed-off-by: Jim Bugwadia <jim@nirmata.com> * handle errors in tests Signed-off-by: Jim Bugwadia <jim@nirmata.com> * print policy name Signed-off-by: Jim Bugwadia <jim@nirmata.com> * update tests Signed-off-by: Jim Bugwadia <jim@nirmata.com> * add retries and duration to error log Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix time check in tests Signed-off-by: Jim Bugwadia <jim@nirmata.com> * round creation times in test Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix retry loop Signed-off-by: Jim Bugwadia <jim@nirmata.com> * remove timing check for policy creation Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix e2e error - policy not found Signed-off-by: Shuting Zhao <shutting06@gmail.com> * update string comparison method Signed-off-by: Shuting Zhao <shutting06@gmail.com> * fix test Generate_Namespace_Label_Actions Signed-off-by: Shuting Zhao <shutting06@gmail.com> * add debug info for e2e tests Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix error Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix generate bug Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix format Signed-off-by: Jim Bugwadia <jim@nirmata.com> * add check for update operations Signed-off-by: Jim Bugwadia <jim@nirmata.com> * increase time for deleteing a resource Signed-off-by: Jim Bugwadia <jim@nirmata.com> * fix check Signed-off-by: Jim Bugwadia <jim@nirmata.com> Co-authored-by: Shuting Zhao <shutting06@gmail.com>
156 lines
4 KiB
Go
156 lines
4 KiB
Go
package response
|
|
|
|
import (
|
|
"fmt"
|
|
"time"
|
|
|
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
|
)
|
|
|
|
//EngineResponse engine response to the action
|
|
type EngineResponse struct {
|
|
// Resource patched with the engine action changes
|
|
PatchedResource unstructured.Unstructured
|
|
// Policy Response
|
|
PolicyResponse PolicyResponse
|
|
}
|
|
|
|
//PolicyResponse policy application response
|
|
type PolicyResponse struct {
|
|
// policy details
|
|
Policy PolicySpec `json:"policy"`
|
|
// resource details
|
|
Resource ResourceSpec `json:"resource"`
|
|
// policy statistics
|
|
PolicyStats `json:",inline"`
|
|
// rule response
|
|
Rules []RuleResponse `json:"rules"`
|
|
// ValidationFailureAction: audit (default) or enforce
|
|
ValidationFailureAction string
|
|
}
|
|
|
|
//PolicySpec policy
|
|
type PolicySpec struct {
|
|
Name string `json:"name"`
|
|
Namespace string `json:"namespace"`
|
|
}
|
|
|
|
//ResourceSpec resource action applied on
|
|
type ResourceSpec struct {
|
|
Kind string `json:"kind"`
|
|
APIVersion string `json:"apiVersion"`
|
|
Namespace string `json:"namespace"`
|
|
Name string `json:"name"`
|
|
|
|
// UID is not used to build the unique identifier
|
|
// optional
|
|
UID string `json:"uid"`
|
|
}
|
|
|
|
//GetKey returns the key
|
|
func (rs ResourceSpec) GetKey() string {
|
|
return rs.Kind + "/" + rs.Namespace + "/" + rs.Name
|
|
}
|
|
|
|
//PolicyStats stores statistics for the single policy application
|
|
type PolicyStats struct {
|
|
// time required to process the policy rules on a resource
|
|
ProcessingTime time.Duration `json:"processingTime"`
|
|
// Count of rules that were applied successfully
|
|
RulesAppliedCount int `json:"rulesAppliedCount"`
|
|
// Timestamp of the instant the Policy was triggered
|
|
PolicyExecutionTimestamp int64 `json:"policyExecutionTimestamp"`
|
|
}
|
|
|
|
//RuleResponse details for each rule application
|
|
type RuleResponse struct {
|
|
// rule name specified in policy
|
|
Name string `json:"name"`
|
|
// rule type (Mutation,Generation,Validation) for Kyverno Policy
|
|
Type string `json:"type"`
|
|
// message response from the rule application
|
|
Message string `json:"message"`
|
|
// JSON patches, for mutation rules
|
|
Patches [][]byte `json:"patches,omitempty"`
|
|
// success/fail
|
|
Success bool `json:"success"`
|
|
// statistics
|
|
RuleStats `json:",inline"`
|
|
}
|
|
|
|
//ToString ...
|
|
func (rr RuleResponse) ToString() string {
|
|
return fmt.Sprintf("rule %s (%s): %v", rr.Name, rr.Type, rr.Message)
|
|
}
|
|
|
|
//RuleStats stores the statistics for the single rule application
|
|
type RuleStats struct {
|
|
// time required to apply the rule on the resource
|
|
ProcessingTime time.Duration `json:"processingTime"`
|
|
// Timestamp of the instant the rule got triggered
|
|
RuleExecutionTimestamp int64 `json:"ruleExecutionTimestamp"`
|
|
}
|
|
|
|
//IsSuccessful checks if any rule has failed or not
|
|
func (er EngineResponse) IsSuccessful() bool {
|
|
for _, r := range er.PolicyResponse.Rules {
|
|
if !r.Success {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|
|
|
|
//IsFailed checks if any rule has succeeded or not
|
|
func (er EngineResponse) IsFailed() bool {
|
|
for _, r := range er.PolicyResponse.Rules {
|
|
if r.Success {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|
|
|
|
//GetPatches returns all the patches joined
|
|
func (er EngineResponse) GetPatches() [][]byte {
|
|
var patches [][]byte
|
|
for _, r := range er.PolicyResponse.Rules {
|
|
if r.Patches != nil {
|
|
patches = append(patches, r.Patches...)
|
|
}
|
|
}
|
|
|
|
return patches
|
|
}
|
|
|
|
//GetFailedRules returns failed rules
|
|
func (er EngineResponse) GetFailedRules() []string {
|
|
return er.getRules(false)
|
|
}
|
|
|
|
//GetSuccessRules returns success rules
|
|
func (er EngineResponse) GetSuccessRules() []string {
|
|
return er.getRules(true)
|
|
}
|
|
|
|
// GetResourceSpec returns resourceSpec of er
|
|
func (er EngineResponse) GetResourceSpec() ResourceSpec {
|
|
return ResourceSpec{
|
|
Kind: er.PatchedResource.GetKind(),
|
|
APIVersion: er.PatchedResource.GetAPIVersion(),
|
|
Namespace: er.PatchedResource.GetNamespace(),
|
|
Name: er.PatchedResource.GetName(),
|
|
UID: string(er.PatchedResource.GetUID()),
|
|
}
|
|
}
|
|
|
|
func (er EngineResponse) getRules(success bool) []string {
|
|
var rules []string
|
|
for _, r := range er.PolicyResponse.Rules {
|
|
if r.Success == success {
|
|
rules = append(rules, r.Name)
|
|
}
|
|
}
|
|
|
|
return rules
|
|
}
|