mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-06 16:06:56 +00:00
* Load mutate.targets via dclient Signed-off-by: ShutingZhao <shuting@nirmata.com> * Do not fail on namespace cleanup for e2e generate Signed-off-by: ShutingZhao <shuting@nirmata.com> * Fix wildcard name listing for a certain namespace Signed-off-by: ShutingZhao <shuting@nirmata.com> * Rename onPolicyUpdate to mutateExistingOnPolicyUpdate Signed-off-by: ShutingZhao <shuting@nirmata.com> * Enable "mutateExistingOnPolicyUpdate" on policy events Signed-off-by: ShutingZhao <shuting@nirmata.com> Co-authored-by: Prateek Pandey <prateek.pandey@nirmata.com>
78 lines
3.8 KiB
Go
78 lines
3.8 KiB
Go
package webhooks
|
|
|
|
import (
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/kyverno/kyverno/pkg/event"
|
|
|
|
"github.com/go-logr/logr"
|
|
kyverno "github.com/kyverno/kyverno/api/kyverno/v1"
|
|
urkyverno "github.com/kyverno/kyverno/api/kyverno/v1beta1"
|
|
"github.com/kyverno/kyverno/pkg/engine"
|
|
"github.com/kyverno/kyverno/pkg/engine/response"
|
|
admissionv1 "k8s.io/api/admission/v1"
|
|
)
|
|
|
|
// createUpdateRequests applies generate and mutateExisting policies, and creates update requests for background reconcile
|
|
func (ws *WebhookServer) createUpdateRequests(request *admissionv1.AdmissionRequest, policyContext *engine.PolicyContext, generatePolicies, mutatePolicies []kyverno.PolicyInterface, ts int64, logger logr.Logger) {
|
|
admissionReviewCompletionLatencyChannel := make(chan int64, 1)
|
|
generateEngineResponsesSenderForAdmissionReviewDurationMetric := make(chan []*response.EngineResponse, 1)
|
|
generateEngineResponsesSenderForAdmissionRequestsCountMetric := make(chan []*response.EngineResponse, 1)
|
|
|
|
go ws.handleMutateExisting(request, mutatePolicies, policyContext, ts)
|
|
go ws.handleGenerate(request, generatePolicies, policyContext, ts, &admissionReviewCompletionLatencyChannel, &generateEngineResponsesSenderForAdmissionReviewDurationMetric, &generateEngineResponsesSenderForAdmissionRequestsCountMetric)
|
|
|
|
go ws.registerAdmissionReviewDurationMetricGenerate(logger, string(request.Operation), &admissionReviewCompletionLatencyChannel, &generateEngineResponsesSenderForAdmissionReviewDurationMetric)
|
|
go ws.registerAdmissionRequestsMetricGenerate(logger, string(request.Operation), &generateEngineResponsesSenderForAdmissionRequestsCountMetric)
|
|
}
|
|
|
|
func (ws *WebhookServer) handleMutateExisting(request *admissionv1.AdmissionRequest, policies []kyverno.PolicyInterface, policyContext *engine.PolicyContext, admissionRequestTimestamp int64) {
|
|
|
|
logger := ws.log.WithValues("action", "mutateExisting", "uid", request.UID, "kind", request.Kind, "namespace", request.Namespace, "name", request.Name, "operation", request.Operation, "gvk", request.Kind.String())
|
|
logger.V(4).Info("update request")
|
|
|
|
if request.Operation == admissionv1.Delete {
|
|
policyContext.NewResource = policyContext.OldResource
|
|
}
|
|
|
|
var engineResponses []*response.EngineResponse
|
|
for _, policy := range policies {
|
|
if !policy.GetSpec().IsMutateExisting() {
|
|
continue
|
|
}
|
|
|
|
var rules []response.RuleResponse
|
|
policyContext.Policy = policy
|
|
engineResponse := engine.ApplyBackgroundChecks(policyContext)
|
|
|
|
for _, rule := range engineResponse.PolicyResponse.Rules {
|
|
if rule.Status == response.RuleStatusPass {
|
|
rules = append(rules, rule)
|
|
}
|
|
}
|
|
|
|
if len(rules) > 0 {
|
|
engineResponse.PolicyResponse.Rules = rules
|
|
engineResponses = append(engineResponses, engineResponse)
|
|
}
|
|
|
|
// registering the kyverno_policy_results_total metric concurrently
|
|
go ws.registerPolicyResultsMetricMutation(logger, string(request.Operation), policy, *engineResponse)
|
|
|
|
// registering the kyverno_policy_execution_duration_seconds metric concurrently
|
|
go ws.registerPolicyExecutionDurationMetricMutate(logger, string(request.Operation), policy, *engineResponse)
|
|
}
|
|
|
|
if failedResponse := applyUpdateRequest(request, urkyverno.Mutate, ws.urGenerator, policyContext.AdmissionInfo, request.Operation, engineResponses...); failedResponse != nil {
|
|
for _, failedUR := range failedResponse {
|
|
err := fmt.Errorf("failed to create update request: %v", failedUR.err)
|
|
events := event.NewBackgroundFailedEvent(err, failedUR.ur.Policy, "", event.GeneratePolicyController, &policyContext.NewResource)
|
|
ws.eventGen.Add(events...)
|
|
}
|
|
}
|
|
|
|
admissionReviewLatencyDuration := int64(time.Since(time.Unix(admissionRequestTimestamp, 0)))
|
|
go ws.registerAdmissionReviewDurationMetricMutate(logger, string(request.Operation), engineResponses, admissionReviewLatencyDuration)
|
|
go ws.registerAdmissionRequestsMetricMutate(logger, string(request.Operation), engineResponses)
|
|
}
|