blob: fe2424cc85b24f30ef48154ccd7539b6bc68a086 [file] [log] [blame]
{{/*
# Copyright © 2020 Amdocs, Bell Canada, Orange
# Modifications Copyright © 2023 Nordix Foundation
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
*/}}
{{/*
Calculate if we are on service mesh.
*/}}
{{- define "common.onServiceMesh" -}}
{{- if .Values.global.serviceMesh -}}
{{- if (default false .Values.global.serviceMesh.enabled) -}}
true
{{- end -}}
{{- end -}}
{{- end -}}
{{/*
Kills the sidecar proxy associated with a pod.
*/}}
{{- define "common.serviceMesh.killSidecar" -}}
{{- if (include "common.onServiceMesh" .) }}
RCODE="$?";
echo "*** script finished with exit code $RCODE" ;
echo "*** killing service mesh sidecar" ;
curl -sf -X POST http://127.0.0.1:15020/quitquitquit ;
echo "" ;
echo "*** exiting with script exit code" ;
exit "$RCODE"
{{- end }}
{{- end -}}
{{/*
Wait for job container.
*/}}
{{- define "common.waitForJobContainer" -}}
{{- $dot := default . .dot -}}
{{- $wait_for_job_container := default $dot.Values.wait_for_job_container .wait_for_job_container -}}
{{- if (include "common.onServiceMesh" .) }}
- name: {{ include "common.name" $dot }}{{ ternary "" (printf "-%s" $wait_for_job_container.name) (empty $wait_for_job_container.name) }}-service-mesh-wait-for-job-container
image: {{ include "repositoryGenerator.image.quitQuit" $dot }}
imagePullPolicy: {{ $dot.Values.global.pullPolicy | default $dot.Values.pullPolicy }}
command:
- /bin/sh
- "-c"
args:
- echo "waiting 10s for istio side cars to be up"; sleep 10s;
{{- range $container := $wait_for_job_container.containers }}
/app/ready.py --service-mesh-check {{ tpl $container $dot }} -t 45;
{{- end }}
env:
- name: NAMESPACE
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: metadata.namespace
{{- end }}
{{- end }}
{{/*
Use Authorization Policies or not.
*/}}
{{- define "common.useAuthorizationPolicies" -}}
{{- if (include "common.onServiceMesh" .) }}
{{- if .Values.global.authorizationPolicies -}}
{{- if (default false .Values.global.authorizationPolicies.enabled) -}}
true
{{- end -}}
{{- end -}}
{{- end -}}
{{- end -}}
{{/*
Create Authorization Policy template.
If common.useAuthorizationPolicies returns true:
Will create authorization policy, provided with array of authorized principals in .Values.serviceMesh.authorizationPolicy.authorizedPrincipals
in the format:
authorizedPrincipals:
- serviceAccount: <serviceaccount name> (Mandatory)
namespace: <namespace name> (Optional, will default to onap)
allowedOperationMethods: <list of allowed HTTP operations (Optional, will default to ["GET", "POST", "PUT", "PATCH", "DELETE"])
If no authorizedPrincipals provided, will default to denying all requests to the app matched under the
spec:
selector:
matchLabels:
app.kubernetes.io/name: <app-to-match> ("app.kubernetes.io/name" corresponds to key defined in "common.labels", which is included in "common.service")
If common.useAuthorizationPolicies returns false:
Will create an authorization policy without rules, i.e., an allow-all policy
*/}}
{{- define "common.authorizationPolicy" -}}
{{- $dot := default . .dot -}}
{{- $trustedDomain := default "cluster.local" $dot.Values.serviceMesh.authorizationPolicy.trustedDomain -}}
{{- $authorizedPrincipals := default list $dot.Values.serviceMesh.authorizationPolicy.authorizedPrincipals -}}
{{- $defaultOperationMethods := list "GET" "POST" "PUT" "PATCH" "DELETE" -}}
{{- $relName := include "common.release" . -}}
apiVersion: security.istio.io/v1beta1
kind: AuthorizationPolicy
metadata:
name: {{ include "common.fullname" (dict "suffix" "authz" "dot" . )}}
namespace: {{ include "common.namespace" . }}
spec:
selector:
matchLabels:
app.kubernetes.io/name: {{ include "common.servicename" . }}
action: ALLOW
rules:
{{- if (include "common.useAuthorizationPolicies" .) }}
{{- if $authorizedPrincipals }}
{{- range $principal := $authorizedPrincipals }}
- from:
- source:
principals:
{{- $namespace := default "onap" $principal.namespace -}}
{{- if eq "onap" $namespace }}
- "{{ $trustedDomain }}/ns/{{ $namespace }}/sa/{{ $relName }}-{{ $principal.serviceAccount }}"
{{- else }}
- "{{ $trustedDomain }}/ns/{{ $namespace }}/sa/{{ $principal.serviceAccount }}"
{{- end }}
to:
- operation:
methods:
{{- if $principal.allowedOperationMethods }}
{{- range $method := $principal.allowedOperationMethods }}
- {{ $method }}
{{- end }}
{{- else }}
{{- range $method := $defaultOperationMethods }}
- {{ $method }}
{{- end }}
{{- end }}
{{- end }}
{{- end }}
{{- else }}
- {}
{{- end }}
{{- end -}}