genpolicy: add support for DaemonSet YAML input

Generate policy for K8s DaemonSet YAML.

Signed-off-by: Dan Mihai <dmihai@microsoft.com>
This commit is contained in:
Dan Mihai 2023-10-18 20:44:57 +00:00
parent 48829120b6
commit a40a6003d0
3 changed files with 142 additions and 0 deletions

View File

@ -0,0 +1,132 @@
// Copyright (c) 2023 Microsoft Corporation
//
// SPDX-License-Identifier: Apache-2.0
//
// Allow K8s YAML field names.
#![allow(non_snake_case)]
use crate::obj_meta;
use crate::pod;
use crate::pod_template;
use crate::policy;
use crate::settings;
use crate::yaml;
use async_trait::async_trait;
use protocols::agent;
use serde::{Deserialize, Serialize};
use std::collections::BTreeMap;
/// See Reference Kubernetes API / Workload Resources / DaemonSet.
#[derive(Clone, Debug, Serialize, Deserialize)]
pub struct DaemonSet {
apiVersion: String,
kind: String,
metadata: obj_meta::ObjectMeta,
spec: DaemonSetSpec,
#[serde(skip)]
doc_mapping: serde_yaml::Value,
}
/// See Reference Kubernetes API / Workload Resources / DaemonSet.
#[derive(Clone, Debug, Serialize, Deserialize)]
pub struct DaemonSetSpec {
#[serde(skip_serializing_if = "Option::is_none")]
selector: Option<yaml::LabelSelector>,
pub template: pod_template::PodTemplateSpec,
#[serde(skip_serializing_if = "Option::is_none")]
minReadySeconds: Option<i32>,
#[serde(skip_serializing_if = "Option::is_none")]
updateStrategy: Option<DaemonSetUpdateStrategy>,
#[serde(skip_serializing_if = "Option::is_none")]
revisionHistoryLimit: Option<i32>,
}
/// See Reference Kubernetes API / Workload Resources / DaemonSet.
#[derive(Clone, Debug, Serialize, Deserialize)]
struct DaemonSetUpdateStrategy {
#[serde(skip_serializing_if = "Option::is_none")]
r#type: Option<String>,
#[serde(skip_serializing_if = "Option::is_none")]
rollingUpdate: Option<RollingUpdateDaemonSet>,
}
/// See Reference Kubernetes API / Workload Resources / DaemonSet.
#[derive(Clone, Debug, Serialize, Deserialize)]
struct RollingUpdateDaemonSet {
#[serde(skip_serializing_if = "Option::is_none")]
maxSurge: Option<i32>,
#[serde(skip_serializing_if = "Option::is_none")]
maxUnavailable: Option<i32>,
}
#[async_trait]
impl yaml::K8sResource for DaemonSet {
async fn init(
&mut self,
use_cache: bool,
doc_mapping: &serde_yaml::Value,
_silent_unsupported_fields: bool,
) {
yaml::k8s_resource_init(&mut self.spec.template.spec, use_cache).await;
self.doc_mapping = doc_mapping.clone();
}
fn get_sandbox_name(&self) -> Option<String> {
None
}
fn get_namespace(&self) -> String {
self.metadata.get_namespace()
}
fn get_container_mounts_and_storages(
&self,
policy_mounts: &mut Vec<policy::KataMount>,
storages: &mut Vec<agent::Storage>,
container: &pod::Container,
settings: &settings::Settings,
) {
if let Some(volumes) = &self.spec.template.spec.volumes {
yaml::get_container_mounts_and_storages(
policy_mounts,
storages,
container,
settings,
volumes,
)
}
}
fn generate_policy(&self, agent_policy: &policy::AgentPolicy) -> String {
agent_policy.generate_policy(self)
}
fn serialize(&mut self, policy: &str) -> String {
yaml::add_policy_annotation(&mut self.doc_mapping, "spec.template.metadata", policy);
serde_yaml::to_string(&self.doc_mapping).unwrap()
}
fn get_containers(&self) -> &Vec<pod::Container> {
&self.spec.template.spec.containers
}
fn get_annotations(&self) -> &Option<BTreeMap<String, String>> {
&self.spec.template.metadata.annotations
}
fn use_host_network(&self) -> bool {
if let Some(host_network) = self.spec.template.spec.hostNetwork {
return host_network;
}
false
}
}

View File

@ -9,6 +9,7 @@ use log::{debug, info};
mod config_map; mod config_map;
mod containerd; mod containerd;
mod daemon_set;
mod mount_and_storage; mod mount_and_storage;
mod no_policy; mod no_policy;
mod obj_meta; mod obj_meta;

View File

@ -7,6 +7,7 @@
#![allow(non_snake_case)] #![allow(non_snake_case)]
use crate::config_map; use crate::config_map;
use crate::daemon_set;
use crate::mount_and_storage; use crate::mount_and_storage;
use crate::no_policy; use crate::no_policy;
use crate::pod; use crate::pod;
@ -99,6 +100,14 @@ pub fn new_k8s_resource(
debug!("{:#?}", &config_map); debug!("{:#?}", &config_map);
Ok((boxed::Box::new(config_map), header.kind)) Ok((boxed::Box::new(config_map), header.kind))
} }
"DaemonSet" => {
let daemon: daemon_set::DaemonSet = serde_ignored::deserialize(d, |path| {
handle_unused_field(&path.to_string(), silent_unsupported_fields);
})
.unwrap();
debug!("{:#?}", &daemon);
Ok((boxed::Box::new(daemon), header.kind))
}
"Pod" => { "Pod" => {
let pod: pod::Pod = serde_ignored::deserialize(d, |path| { let pod: pod::Pod = serde_ignored::deserialize(d, |path| {
handle_unused_field(&path.to_string(), silent_unsupported_fields); handle_unused_field(&path.to_string(), silent_unsupported_fields);