Files
polaris/pkg/validator/pod.go
2019-04-12 15:13:46 +00:00

127 lines
3.5 KiB
Go

// Copyright 2019 ReactiveOps
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package validator
import (
conf "github.com/reactiveops/fairwinds/pkg/config"
"github.com/reactiveops/fairwinds/pkg/validator/messages"
corev1 "k8s.io/api/core/v1"
logf "sigs.k8s.io/controller-runtime/pkg/runtime/log"
)
var log = logf.Log.WithName("Fairwinds Validator")
// PodValidation tracks validation failures associated with a Pod.
type PodValidation struct {
*ResourceValidation
Pod *corev1.PodSpec
}
// ValidatePod validates that each pod conforms to the Fairwinds config, returns a ResourceResult.
func ValidatePod(podConf conf.Configuration, pod *corev1.PodSpec) ResourceResult {
pv := PodValidation{
Pod: pod,
ResourceValidation: &ResourceValidation{
Summary: &ResultSummary{},
},
}
pv.validateNetworking(&podConf.Networking)
pRes := PodResult{
Messages: pv.messages(),
ContainerResults: []ContainerResult{},
}
pv.validateContainers(pod.InitContainers, &pRes, &podConf)
pv.validateContainers(pod.Containers, &pRes, &podConf)
rr := ResourceResult{
Type: "Pod",
Summary: pv.Summary,
PodResults: []PodResult{pRes},
}
return rr
}
func (pv *PodValidation) validateContainers(containers []corev1.Container, pRes *PodResult, podConf *conf.Configuration) {
for _, container := range containers {
ctrRR := ValidateContainer(podConf, &container)
pv.Summary.Successes += ctrRR.Summary.Successes
pv.Summary.Warnings += ctrRR.Summary.Warnings
pv.Summary.Errors += ctrRR.Summary.Errors
pRes.ContainerResults = append(
pRes.ContainerResults,
ctrRR.ContainerResults[0],
)
}
}
func (pv *PodValidation) validateNetworking(networkConf *conf.Networking) {
pv.validateHostAlias(networkConf)
pv.validateHostIPC(networkConf)
pv.validateHostPID(networkConf)
pv.validateHostNetwork(networkConf)
}
func (pv *PodValidation) validateHostAlias(networkConf *conf.Networking) {
if networkConf.HostAliasSet.IsActionable() {
hostAliasSet := false
for _, alias := range pv.Pod.HostAliases {
if alias.IP != "" && len(alias.Hostnames) == 0 {
hostAliasSet = true
break
}
}
if hostAliasSet {
pv.addFailure(messages.HostAliasFailure, networkConf.HostAliasSet)
} else {
pv.addSuccess(messages.HostAliasSuccess)
}
}
}
func (pv *PodValidation) validateHostIPC(networkConf *conf.Networking) {
if networkConf.HostIPCSet.IsActionable() {
if pv.Pod.HostIPC {
pv.addFailure(messages.HostIPCFailure, networkConf.HostIPCSet)
} else {
pv.addSuccess(messages.HostIPCSuccess)
}
}
}
func (pv *PodValidation) validateHostPID(networkConf *conf.Networking) {
if networkConf.HostPIDSet.IsActionable() {
if pv.Pod.HostPID {
pv.addFailure(messages.HostPIDFailure, networkConf.HostPIDSet)
} else {
pv.addSuccess(messages.HostPIDSuccess)
}
}
}
func (pv *PodValidation) validateHostNetwork(networkConf *conf.Networking) {
if networkConf.HostNetworkSet.IsActionable() {
if pv.Pod.HostNetwork {
pv.addFailure(messages.HostNetworkFailure, networkConf.HostNetworkSet)
} else {
pv.addSuccess(messages.HostNetworkSuccess)
}
}
}