mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-06 07:57:07 +00:00
186 lines
5.9 KiB
Go
186 lines
5.9 KiB
Go
package generate
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/go-logr/logr"
|
|
kyvernov1 "github.com/kyverno/kyverno/api/kyverno/v1"
|
|
"github.com/kyverno/kyverno/pkg/clients/dclient"
|
|
"github.com/kyverno/kyverno/pkg/engine/variables/regex"
|
|
"github.com/kyverno/kyverno/pkg/policy/common"
|
|
datautils "github.com/kyverno/kyverno/pkg/utils/data"
|
|
kubeutils "github.com/kyverno/kyverno/pkg/utils/kube"
|
|
"github.com/kyverno/kyverno/pkg/utils/wildcard"
|
|
)
|
|
|
|
// Generate provides implementation to validate 'generate' rule
|
|
type Generate struct {
|
|
// rule to hold 'generate' rule specifications
|
|
rule kyvernov1.Generation
|
|
// authCheck to check access for operations
|
|
authCheck Operations
|
|
// logger
|
|
log logr.Logger
|
|
}
|
|
|
|
// NewGenerateFactory returns a new instance of Generate validation checker
|
|
func NewGenerateFactory(client dclient.Interface, rule kyvernov1.Generation, user string, log logr.Logger) *Generate {
|
|
g := Generate{
|
|
rule: rule,
|
|
authCheck: NewAuth(client, user, log),
|
|
log: log,
|
|
}
|
|
|
|
return &g
|
|
}
|
|
|
|
// Validate validates the 'generate' rule
|
|
func (g *Generate) Validate(ctx context.Context) (string, error) {
|
|
rule := g.rule
|
|
if rule.GetData() != nil && rule.Clone != (kyvernov1.CloneFrom{}) {
|
|
return "", fmt.Errorf("only one of data or clone can be specified")
|
|
}
|
|
|
|
if rule.Clone != (kyvernov1.CloneFrom{}) && len(rule.CloneList.Kinds) != 0 {
|
|
return "", fmt.Errorf("only one of clone or cloneList can be specified")
|
|
}
|
|
|
|
apiVersion, kind, name, namespace := rule.ResourceSpec.GetAPIVersion(), rule.ResourceSpec.GetKind(), rule.ResourceSpec.GetName(), rule.ResourceSpec.GetNamespace()
|
|
|
|
if len(rule.CloneList.Kinds) == 0 {
|
|
if name == "" {
|
|
return "name", fmt.Errorf("name cannot be empty")
|
|
}
|
|
if kind == "" {
|
|
return "kind", fmt.Errorf("kind cannot be empty")
|
|
}
|
|
if apiVersion == "" {
|
|
return "apiVersion", fmt.Errorf("apiVersion cannot be empty")
|
|
}
|
|
} else {
|
|
if name != "" {
|
|
return "name", fmt.Errorf("with cloneList, generate.name. should not be specified")
|
|
}
|
|
if kind != "" {
|
|
return "kind", fmt.Errorf("with cloneList, generate.kind. should not be specified")
|
|
}
|
|
}
|
|
|
|
if rule.CloneList.Selector != nil {
|
|
if wildcard.ContainsWildcard(rule.CloneList.Selector.String()) {
|
|
return "selector", fmt.Errorf("wildcard characters `*/?` not supported")
|
|
}
|
|
}
|
|
|
|
if !datautils.DeepEqual(rule.Clone, kyvernov1.CloneFrom{}) {
|
|
if path, err := g.validateClone(rule.Clone, rule.CloneList, kind); err != nil {
|
|
return fmt.Sprintf("clone.%s", path), err
|
|
}
|
|
}
|
|
if target := rule.GetData(); target != nil {
|
|
// TODO: is this required ?? as anchors can only be on pattern and not resource
|
|
// we can add this check by not sure if its needed here
|
|
if path, err := common.ValidatePattern(target, "/", nil); err != nil {
|
|
return fmt.Sprintf("data.%s", path), fmt.Errorf("anchors not supported on generate resources: %v", err)
|
|
}
|
|
}
|
|
|
|
// Kyverno generate-controller create/update/deletes the resources specified in generate rule of policy
|
|
// kyverno uses SA 'kyverno' and has default ClusterRoles and ClusterRoleBindings
|
|
// instructions to modify the RBAC for kyverno are mentioned at https://github.com/kyverno/kyverno/blob/master/documentation/installation.md
|
|
// - operations required: create/update/delete/get
|
|
// If kind and namespace contain variables, then we cannot resolve then so we skip the processing
|
|
if len(rule.CloneList.Kinds) != 0 {
|
|
for _, kind = range rule.CloneList.Kinds {
|
|
_, kind = kubeutils.GetKindFromGVK(kind)
|
|
if err := g.canIGenerate(ctx, kind, namespace); err != nil {
|
|
return "", err
|
|
}
|
|
}
|
|
} else {
|
|
if err := g.canIGenerate(ctx, kind, namespace); err != nil {
|
|
return "", err
|
|
}
|
|
}
|
|
return "", nil
|
|
}
|
|
|
|
func (g *Generate) validateClone(c kyvernov1.CloneFrom, cl kyvernov1.CloneList, kind string) (string, error) {
|
|
if len(cl.Kinds) == 0 {
|
|
if c.Name == "" {
|
|
return "name", fmt.Errorf("name cannot be empty")
|
|
}
|
|
}
|
|
|
|
namespace := c.Namespace
|
|
if !regex.IsVariable(namespace) {
|
|
namespace = ""
|
|
}
|
|
// Skip if there is variable defined
|
|
if !regex.IsVariable(kind) {
|
|
// GET
|
|
ok, err := g.authCheck.CanIGet(context.TODO(), kind, namespace)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
if !ok {
|
|
return "", fmt.Errorf("kyverno does not have permissions to 'get' resource %s/%s. Grant proper permissions to the background controller", kind, namespace)
|
|
}
|
|
} else {
|
|
g.log.V(2).Info("resource Kind uses variables, so cannot be resolved. Skipping Auth Checks.")
|
|
}
|
|
return "", nil
|
|
}
|
|
|
|
// canIGenerate returns a error if kyverno cannot perform operations
|
|
func (g *Generate) canIGenerate(ctx context.Context, kind, namespace string) error {
|
|
// Skip if there is variable defined
|
|
authCheck := g.authCheck
|
|
if !regex.IsVariable(namespace) {
|
|
namespace = ""
|
|
}
|
|
if !regex.IsVariable(kind) {
|
|
// CREATE
|
|
ok, err := authCheck.CanICreate(ctx, kind, namespace)
|
|
if err != nil {
|
|
// machinery error
|
|
return err
|
|
}
|
|
if !ok {
|
|
return fmt.Errorf("kyverno does not have permissions to 'create' resource %s/%s. Grant proper permissions to the background controller", kind, namespace)
|
|
}
|
|
// UPDATE
|
|
ok, err = authCheck.CanIUpdate(ctx, kind, namespace)
|
|
if err != nil {
|
|
// machinery error
|
|
return err
|
|
}
|
|
if !ok {
|
|
return fmt.Errorf("kyverno does not have permissions to 'update' resource %s/%s. Grant proper permissions to the background controller", kind, namespace)
|
|
}
|
|
// GET
|
|
ok, err = authCheck.CanIGet(ctx, kind, namespace)
|
|
if err != nil {
|
|
// machinery error
|
|
return err
|
|
}
|
|
if !ok {
|
|
return fmt.Errorf("kyverno does not have permissions to 'get' resource %s/%s. Grant proper permissions to the background controller", kind, namespace)
|
|
}
|
|
|
|
// DELETE
|
|
ok, err = authCheck.CanIDelete(ctx, kind, namespace)
|
|
if err != nil {
|
|
// machinery error
|
|
return err
|
|
}
|
|
if !ok {
|
|
return fmt.Errorf("kyverno does not have permissions to 'delete' resource %s/%s. Grant proper permissions to the background controller", kind, namespace)
|
|
}
|
|
} else {
|
|
g.log.V(2).Info("resource Kind uses variables, so cannot be resolved. Skipping Auth Checks.")
|
|
}
|
|
|
|
return nil
|
|
}
|