mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-09 17:37:12 +00:00
* refactor: engine handlers Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * fix Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * refactor: don't process context/preconditions in invokeHandler Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * fix Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * fix Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * fix Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * fix Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> * fix Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com> --------- Signed-off-by: Charles-Edouard Brétéché <charles.edouard@nirmata.com>
194 lines
6.7 KiB
Go
194 lines
6.7 KiB
Go
package mutation
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/go-logr/logr"
|
|
kyvernov1 "github.com/kyverno/kyverno/api/kyverno/v1"
|
|
engineapi "github.com/kyverno/kyverno/pkg/engine/api"
|
|
"github.com/kyverno/kyverno/pkg/engine/internal"
|
|
"github.com/kyverno/kyverno/pkg/engine/mutate"
|
|
engineutils "github.com/kyverno/kyverno/pkg/engine/utils"
|
|
"github.com/kyverno/kyverno/pkg/utils/api"
|
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
|
)
|
|
|
|
func mutateResource(
|
|
ctx context.Context,
|
|
contextLoader engineapi.EngineContextLoader,
|
|
rule kyvernov1.Rule,
|
|
policyContext engineapi.PolicyContext,
|
|
resource unstructured.Unstructured,
|
|
logger logr.Logger,
|
|
) *mutate.Response {
|
|
if err := contextLoader(ctx, rule.Context, policyContext.JSONContext()); err != nil {
|
|
logger.Error(err, "failed to load context")
|
|
return mutate.NewErrorResponse("failed to load context", err)
|
|
}
|
|
preconditionsPassed, err := internal.CheckPreconditions(logger, policyContext.JSONContext(), rule.GetAnyAllConditions())
|
|
if err != nil {
|
|
return mutate.NewErrorResponse("failed to evaluate preconditions", err)
|
|
}
|
|
if !preconditionsPassed {
|
|
return mutate.NewResponse(engineapi.RuleStatusSkip, resource, nil, "preconditions not met")
|
|
}
|
|
return mutate.Mutate(&rule, policyContext.JSONContext(), resource, logger)
|
|
}
|
|
|
|
type forEachMutator struct {
|
|
rule *kyvernov1.Rule
|
|
policyContext engineapi.PolicyContext
|
|
foreach []kyvernov1.ForEachMutation
|
|
resource resourceInfo
|
|
nesting int
|
|
contextLoader engineapi.EngineContextLoader
|
|
log logr.Logger
|
|
}
|
|
|
|
func (f *forEachMutator) mutateForEach(ctx context.Context) *mutate.Response {
|
|
var applyCount int
|
|
allPatches := make([][]byte, 0)
|
|
|
|
for _, foreach := range f.foreach {
|
|
if err := f.contextLoader(ctx, f.rule.Context, f.policyContext.JSONContext()); err != nil {
|
|
f.log.Error(err, "failed to load context")
|
|
return mutate.NewErrorResponse("failed to load context", err)
|
|
}
|
|
|
|
preconditionsPassed, err := internal.CheckPreconditions(f.log, f.policyContext.JSONContext(), f.rule.GetAnyAllConditions())
|
|
if err != nil {
|
|
return mutate.NewErrorResponse("failed to evaluate preconditions", err)
|
|
}
|
|
|
|
if !preconditionsPassed {
|
|
return mutate.NewResponse(engineapi.RuleStatusSkip, f.resource.unstructured, nil, "preconditions not met")
|
|
}
|
|
|
|
elements, err := engineutils.EvaluateList(foreach.List, f.policyContext.JSONContext())
|
|
if err != nil {
|
|
msg := fmt.Sprintf("failed to evaluate list %s: %v", foreach.List, err)
|
|
return mutate.NewErrorResponse(msg, err)
|
|
}
|
|
|
|
mutateResp := f.mutateElements(ctx, foreach, elements)
|
|
if mutateResp.Status == engineapi.RuleStatusError {
|
|
return mutate.NewErrorResponse("failed to mutate elements", err)
|
|
}
|
|
|
|
if mutateResp.Status != engineapi.RuleStatusSkip {
|
|
applyCount++
|
|
if len(mutateResp.Patches) > 0 {
|
|
f.resource.unstructured = mutateResp.PatchedResource
|
|
allPatches = append(allPatches, mutateResp.Patches...)
|
|
}
|
|
f.log.Info("mutateResp.PatchedResource", "resource", mutateResp.PatchedResource)
|
|
if err := f.policyContext.JSONContext().AddResource(mutateResp.PatchedResource.Object); err != nil {
|
|
f.log.Error(err, "failed to update resource in context")
|
|
}
|
|
}
|
|
}
|
|
|
|
msg := fmt.Sprintf("%d elements processed", applyCount)
|
|
if applyCount == 0 {
|
|
return mutate.NewResponse(engineapi.RuleStatusSkip, f.resource.unstructured, allPatches, msg)
|
|
}
|
|
|
|
return mutate.NewResponse(engineapi.RuleStatusPass, f.resource.unstructured, allPatches, msg)
|
|
}
|
|
|
|
func (f *forEachMutator) mutateElements(ctx context.Context, foreach kyvernov1.ForEachMutation, elements []interface{}) *mutate.Response {
|
|
f.policyContext.JSONContext().Checkpoint()
|
|
defer f.policyContext.JSONContext().Restore()
|
|
|
|
patchedResource := f.resource
|
|
var allPatches [][]byte
|
|
if foreach.RawPatchStrategicMerge != nil {
|
|
engineutils.InvertedElement(elements)
|
|
}
|
|
|
|
for index, element := range elements {
|
|
if element == nil {
|
|
continue
|
|
}
|
|
|
|
f.policyContext.JSONContext().Reset()
|
|
policyContext := f.policyContext.Copy()
|
|
|
|
falseVar := false
|
|
if err := engineutils.AddElementToContext(policyContext, element, index, f.nesting, &falseVar); err != nil {
|
|
return mutate.NewErrorResponse(fmt.Sprintf("failed to add element to mutate.foreach[%d].context", index), err)
|
|
}
|
|
|
|
if err := f.contextLoader(ctx, foreach.Context, policyContext.JSONContext()); err != nil {
|
|
return mutate.NewErrorResponse(fmt.Sprintf("failed to load to mutate.foreach[%d].context", index), err)
|
|
}
|
|
|
|
preconditionsPassed, err := internal.CheckPreconditions(f.log, policyContext.JSONContext(), foreach.AnyAllConditions)
|
|
if err != nil {
|
|
return mutate.NewErrorResponse(fmt.Sprintf("failed to evaluate mutate.foreach[%d].preconditions", index), err)
|
|
}
|
|
|
|
if !preconditionsPassed {
|
|
f.log.Info("mutate.foreach.preconditions not met", "elementIndex", index)
|
|
continue
|
|
}
|
|
|
|
var mutateResp *mutate.Response
|
|
if foreach.ForEachMutation != nil {
|
|
nestedForEach, err := api.DeserializeJSONArray[kyvernov1.ForEachMutation](foreach.ForEachMutation)
|
|
if err != nil {
|
|
return mutate.NewErrorResponse("failed to deserialize foreach", err)
|
|
}
|
|
|
|
m := &forEachMutator{
|
|
rule: f.rule,
|
|
policyContext: f.policyContext,
|
|
resource: patchedResource,
|
|
log: f.log,
|
|
foreach: nestedForEach,
|
|
nesting: f.nesting + 1,
|
|
contextLoader: f.contextLoader,
|
|
}
|
|
|
|
mutateResp = m.mutateForEach(ctx)
|
|
} else {
|
|
mutateResp = mutate.ForEach(f.rule.Name, foreach, policyContext, patchedResource.unstructured, element, f.log)
|
|
}
|
|
|
|
if mutateResp.Status == engineapi.RuleStatusFail || mutateResp.Status == engineapi.RuleStatusError {
|
|
return mutateResp
|
|
}
|
|
|
|
if len(mutateResp.Patches) > 0 {
|
|
patchedResource.unstructured = mutateResp.PatchedResource
|
|
allPatches = append(allPatches, mutateResp.Patches...)
|
|
}
|
|
}
|
|
|
|
return mutate.NewResponse(engineapi.RuleStatusPass, patchedResource.unstructured, allPatches, "")
|
|
}
|
|
|
|
func buildRuleResponse(rule *kyvernov1.Rule, mutateResp *mutate.Response, info resourceInfo) *engineapi.RuleResponse {
|
|
resp := internal.RuleResponse(*rule, engineapi.Mutation, mutateResp.Message, mutateResp.Status)
|
|
if resp.Status == engineapi.RuleStatusPass {
|
|
resp.Patches = mutateResp.Patches
|
|
resp.Message = buildSuccessMessage(mutateResp.PatchedResource)
|
|
}
|
|
if len(rule.Mutation.Targets) != 0 {
|
|
resp.PatchedTarget = &mutateResp.PatchedResource
|
|
resp.PatchedTargetSubresourceName = info.subresource
|
|
resp.PatchedTargetParentResourceGVR = info.parentResourceGVR
|
|
}
|
|
return resp
|
|
}
|
|
|
|
func buildSuccessMessage(r unstructured.Unstructured) string {
|
|
if r.Object == nil {
|
|
return "mutated resource"
|
|
}
|
|
if r.GetNamespace() == "" {
|
|
return fmt.Sprintf("mutated %s/%s", r.GetKind(), r.GetName())
|
|
}
|
|
return fmt.Sprintf("mutated %s/%s in namespace %s", r.GetKind(), r.GetName(), r.GetNamespace())
|
|
}
|