mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-09 09:26:54 +00:00
* feat: implement background scan Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * scanner Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * refactor request Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> --------- Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com>
242 lines
7.6 KiB
Go
242 lines
7.6 KiB
Go
package utils
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/go-logr/logr"
|
|
"github.com/kyverno/kyverno/api/kyverno"
|
|
kyvernov1 "github.com/kyverno/kyverno/api/kyverno/v1"
|
|
"github.com/kyverno/kyverno/pkg/admissionpolicy"
|
|
celengine "github.com/kyverno/kyverno/pkg/cel/engine"
|
|
"github.com/kyverno/kyverno/pkg/cel/matching"
|
|
celpolicy "github.com/kyverno/kyverno/pkg/cel/policy"
|
|
"github.com/kyverno/kyverno/pkg/clients/dclient"
|
|
"github.com/kyverno/kyverno/pkg/config"
|
|
"github.com/kyverno/kyverno/pkg/engine"
|
|
engineapi "github.com/kyverno/kyverno/pkg/engine/api"
|
|
"github.com/kyverno/kyverno/pkg/engine/jmespath"
|
|
reportutils "github.com/kyverno/kyverno/pkg/utils/report"
|
|
"go.uber.org/multierr"
|
|
admissionv1 "k8s.io/api/admission/v1"
|
|
admissionregistrationv1 "k8s.io/api/admissionregistration/v1"
|
|
corev1 "k8s.io/api/core/v1"
|
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
)
|
|
|
|
type scanner struct {
|
|
logger logr.Logger
|
|
engine engineapi.Engine
|
|
config config.Configuration
|
|
jp jmespath.Interface
|
|
client dclient.Interface
|
|
reportingConfig reportutils.ReportingConfiguration
|
|
}
|
|
|
|
type ScanResult struct {
|
|
EngineResponse *engineapi.EngineResponse
|
|
Error error
|
|
}
|
|
|
|
type Scanner interface {
|
|
ScanResource(
|
|
context.Context,
|
|
unstructured.Unstructured,
|
|
schema.GroupVersionResource,
|
|
string,
|
|
*corev1.Namespace,
|
|
[]admissionregistrationv1.ValidatingAdmissionPolicyBinding,
|
|
...engineapi.GenericPolicy,
|
|
) map[*engineapi.GenericPolicy]ScanResult
|
|
}
|
|
|
|
func NewScanner(
|
|
logger logr.Logger,
|
|
engine engineapi.Engine,
|
|
config config.Configuration,
|
|
jp jmespath.Interface,
|
|
client dclient.Interface,
|
|
reportingConfig reportutils.ReportingConfiguration,
|
|
) Scanner {
|
|
return &scanner{
|
|
logger: logger,
|
|
engine: engine,
|
|
config: config,
|
|
jp: jp,
|
|
client: client,
|
|
reportingConfig: reportingConfig,
|
|
}
|
|
}
|
|
|
|
func (s *scanner) ScanResource(
|
|
ctx context.Context,
|
|
resource unstructured.Unstructured,
|
|
gvr schema.GroupVersionResource,
|
|
subResource string,
|
|
ns *corev1.Namespace,
|
|
bindings []admissionregistrationv1.ValidatingAdmissionPolicyBinding,
|
|
policies ...engineapi.GenericPolicy,
|
|
) map[*engineapi.GenericPolicy]ScanResult {
|
|
var kpols, vpols, vaps []engineapi.GenericPolicy
|
|
// split policies per nature
|
|
for _, policy := range policies {
|
|
if pol := policy.AsKyvernoPolicy(); pol != nil {
|
|
kpols = append(kpols, policy)
|
|
} else if pol := policy.AsValidatingPolicy(); pol != nil {
|
|
vpols = append(vpols, policy)
|
|
} else if pol := policy.AsValidatingAdmissionPolicy(); pol != nil {
|
|
vaps = append(vaps, policy)
|
|
}
|
|
}
|
|
logger := s.logger.WithValues("kind", resource.GetKind(), "namespace", resource.GetNamespace(), "name", resource.GetName())
|
|
results := map[*engineapi.GenericPolicy]ScanResult{}
|
|
// evaluate kyverno policies
|
|
var nsLabels map[string]string
|
|
if ns != nil {
|
|
nsLabels = ns.Labels
|
|
}
|
|
for i, policy := range kpols {
|
|
if pol := policy.AsKyvernoPolicy(); pol != nil {
|
|
var errors []error
|
|
var response *engineapi.EngineResponse
|
|
var err error
|
|
if s.reportingConfig.ValidateReportsEnabled() {
|
|
response, err = s.validateResource(ctx, resource, nsLabels, pol)
|
|
if err != nil {
|
|
logger.Error(err, "failed to scan resource")
|
|
errors = append(errors, err)
|
|
}
|
|
}
|
|
spec := pol.GetSpec()
|
|
if spec.HasVerifyImages() && len(errors) == 0 && s.reportingConfig.ImageVerificationReportsEnabled() {
|
|
if response != nil {
|
|
// remove responses of verify image rules
|
|
ruleResponses := make([]engineapi.RuleResponse, 0, len(response.PolicyResponse.Rules))
|
|
for _, v := range response.PolicyResponse.Rules {
|
|
if v.RuleType() != engineapi.ImageVerify {
|
|
ruleResponses = append(ruleResponses, v)
|
|
}
|
|
}
|
|
response.PolicyResponse.Rules = ruleResponses
|
|
}
|
|
ivResponse, err := s.validateImages(ctx, resource, nsLabels, pol)
|
|
if err != nil {
|
|
logger.Error(err, "failed to scan images")
|
|
errors = append(errors, err)
|
|
}
|
|
if response == nil {
|
|
response = ivResponse
|
|
} else if ivResponse != nil {
|
|
response.PolicyResponse.Rules = append(response.PolicyResponse.Rules, ivResponse.PolicyResponse.Rules...)
|
|
}
|
|
}
|
|
results[&kpols[i]] = ScanResult{response, multierr.Combine(errors...)}
|
|
}
|
|
}
|
|
// evaluate validating policies
|
|
for i, policy := range vpols {
|
|
if pol := policy.AsValidatingPolicy(); pol != nil {
|
|
// create compiler
|
|
compiler := celpolicy.NewCompiler()
|
|
// create provider
|
|
provider, err := celengine.NewProvider(compiler, *pol)
|
|
if err != nil {
|
|
logger.Error(err, "failed to create policy provider")
|
|
results[&vpols[i]] = ScanResult{nil, err}
|
|
continue
|
|
}
|
|
// create engine
|
|
engine := celengine.NewEngine(
|
|
provider,
|
|
func(name string) *corev1.Namespace { return ns },
|
|
matching.NewMatcher(),
|
|
)
|
|
// create context provider
|
|
context, err := celpolicy.NewContextProvider(
|
|
s.client.GetKubeClient(),
|
|
nil,
|
|
// TODO
|
|
// []imagedataloader.Option{imagedataloader.WithLocalCredentials(c.RegistryAccess)},
|
|
)
|
|
if err != nil {
|
|
logger.Error(err, "failed to create cel context provider")
|
|
results[&vpols[i]] = ScanResult{nil, err}
|
|
continue
|
|
}
|
|
request := celengine.Request(
|
|
context,
|
|
resource.GroupVersionKind(),
|
|
gvr,
|
|
subResource,
|
|
resource.GetName(),
|
|
resource.GetNamespace(),
|
|
admissionv1.Create,
|
|
&resource,
|
|
nil,
|
|
false,
|
|
nil,
|
|
)
|
|
engineResponse, err := engine.Handle(ctx, request)
|
|
response := engineapi.EngineResponse{
|
|
Resource: resource,
|
|
PolicyResponse: engineapi.PolicyResponse{
|
|
// TODO: policies at index 0
|
|
Rules: engineResponse.Policies[0].Rules,
|
|
},
|
|
}.WithPolicy(vpols[i])
|
|
results[&vpols[i]] = ScanResult{&response, err}
|
|
}
|
|
}
|
|
// evaluate validating admission policies
|
|
for i, policy := range vaps {
|
|
if pol := policy.AsValidatingAdmissionPolicy(); pol != nil {
|
|
policyData := admissionpolicy.NewPolicyData(*pol)
|
|
for _, binding := range bindings {
|
|
if binding.Spec.PolicyName == pol.Name {
|
|
policyData.AddBinding(binding)
|
|
}
|
|
}
|
|
res, err := admissionpolicy.Validate(policyData, resource, map[string]map[string]string{}, s.client)
|
|
results[&vaps[i]] = ScanResult{&res, err}
|
|
}
|
|
}
|
|
return results
|
|
}
|
|
|
|
func (s *scanner) validateResource(ctx context.Context, resource unstructured.Unstructured, nsLabels map[string]string, policy kyvernov1.PolicyInterface) (*engineapi.EngineResponse, error) {
|
|
policyCtx, err := engine.NewPolicyContext(s.jp, resource, kyvernov1.Create, nil, s.config)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
policyCtx = policyCtx.
|
|
WithNewResource(resource).
|
|
WithPolicy(policy).
|
|
WithNamespaceLabels(nsLabels)
|
|
response := s.engine.Validate(ctx, policyCtx)
|
|
if len(response.PolicyResponse.Rules) > 0 {
|
|
s.logger.V(6).Info("validateResource", "policy", policy, "response", response)
|
|
}
|
|
return &response, nil
|
|
}
|
|
|
|
func (s *scanner) validateImages(ctx context.Context, resource unstructured.Unstructured, nsLabels map[string]string, policy kyvernov1.PolicyInterface) (*engineapi.EngineResponse, error) {
|
|
annotations := resource.GetAnnotations()
|
|
if annotations != nil {
|
|
resource = *resource.DeepCopy()
|
|
delete(annotations, kyverno.AnnotationImageVerify)
|
|
resource.SetAnnotations(annotations)
|
|
}
|
|
policyCtx, err := engine.NewPolicyContext(s.jp, resource, kyvernov1.Create, nil, s.config)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
policyCtx = policyCtx.
|
|
WithNewResource(resource).
|
|
WithPolicy(policy).
|
|
WithNamespaceLabels(nsLabels)
|
|
response, _ := s.engine.VerifyAndPatchImages(ctx, policyCtx)
|
|
if len(response.PolicyResponse.Rules) > 0 {
|
|
s.logger.V(6).Info("validateImages", "policy", policy, "response", response)
|
|
}
|
|
return &response, nil
|
|
}
|