Skip to content

Commit

Permalink
cmd/exec: Add new exec subcommand
Browse files Browse the repository at this point in the history
This is just a skeleton but the basic functionality is there: run OPA
in a "one shot" mode against a set of input files and print the
results for each.

Fixes open-policy-agent#3525

Signed-off-by: Torin Sandall <torinsandall@gmail.com>
  • Loading branch information
tsandall committed Dec 16, 2021
1 parent 0586a95 commit e495fe3
Show file tree
Hide file tree
Showing 3 changed files with 553 additions and 0 deletions.
220 changes: 220 additions & 0 deletions cmd/exec.go
@@ -0,0 +1,220 @@
package cmd

import (
"bytes"
"context"
"encoding/json"
"fmt"
"os"
"path/filepath"

"github.com/open-policy-agent/opa/cmd/internal/exec"
"github.com/open-policy-agent/opa/internal/config"
internal_logging "github.com/open-policy-agent/opa/internal/logging"
"github.com/open-policy-agent/opa/logging"
"github.com/open-policy-agent/opa/plugins"
"github.com/open-policy-agent/opa/plugins/bundle"
"github.com/open-policy-agent/opa/plugins/discovery"
"github.com/open-policy-agent/opa/plugins/logs"
"github.com/open-policy-agent/opa/plugins/status"
"github.com/open-policy-agent/opa/sdk"
"github.com/open-policy-agent/opa/util"
"github.com/spf13/cobra"
)

func init() {

var bundlePaths repeatedStringFlag

params := exec.NewParams(os.Stdout)

var cmd = &cobra.Command{
Use: `exec <path> [<path> [...]]`,
Short: "Execute against input files",
Long: `Execute against input files.
The 'exec' command executes OPA against one or more input files. If the paths
refer to directories, OPA will execute against files contained inside those
directories, recursively.
The 'exec' command accepts a --config-file/-c or series of --set options as
arguments. These options behave the same as way as 'opa run'. Since the 'exec'
command is intended to execute OPA in one-shot, the 'exec' command will
manually trigger plugins before and after policy execution:
Before: Discovery -> Bundle -> Status
After: Decision Logs
By default, the 'exec' command executes the "default decision" (specified in
the OPA configuration) against each input file. This can be overridden by
specifying the --decision argument and pointing at a specific policy decision,
e.g., opa exec --decision /foo/bar/baz ...`,

Args: cobra.MinimumNArgs(1),
Run: func(cmd *cobra.Command, args []string) {
params.Paths = args
params.BundlePaths = bundlePaths.v
if err := runExec(params); err != nil {
logging.Get().WithFields(map[string]interface{}{"err": err}).Error("Unexpected error.")
os.Exit(1)
}
},
}

addBundleFlag(cmd.Flags(), &bundlePaths)
addOutputFormat(cmd.Flags(), params.OutputFormat)
addConfigFileFlag(cmd.Flags(), &params.ConfigFile)
addConfigOverrides(cmd.Flags(), &params.ConfigOverrides)
addConfigOverrideFiles(cmd.Flags(), &params.ConfigOverrideFiles)
cmd.Flags().StringVarP(&params.Decision, "decision", "", "", "set decision to evaluate")
cmd.Flags().VarP(params.LogLevel, "log-level", "l", "set log level")
cmd.Flags().Var(params.LogFormat, "log-format", "set log format")

RootCommand.AddCommand(cmd)
}

func runExec(params *exec.Params) error {

stdLogger, consoleLogger, err := setupLogging(params.LogLevel.String(), params.LogFormat.String())
if err != nil {
return fmt.Errorf("config error: %w", err)
}

config, err := setupConfig(params.ConfigFile, params.ConfigOverrides, params.ConfigOverrideFiles, params.BundlePaths)
if err != nil {
return fmt.Errorf("config error: %w", err)
}

ctx := context.Background()
ready := make(chan struct{})

opa, err := sdk.New(ctx, sdk.Options{
Config: bytes.NewReader(config),
Logger: stdLogger,
ConsoleLogger: consoleLogger,
Ready: ready,
})
if err != nil {
return fmt.Errorf("runtime error: %w", err)
}

if err := triggerPlugins(ctx, opa, []string{discovery.Name, bundle.Name, status.Name}); err != nil {
return fmt.Errorf("runtime error: %w", err)
}

<-ready

if err := exec.Exec(ctx, opa, params); err != nil {
return fmt.Errorf("exec error: %w", err)
}

if err := triggerPlugins(ctx, opa, []string{logs.Name}); err != nil {
return fmt.Errorf("runtime error: %w", err)
}

return nil
}

func triggerPlugins(ctx context.Context, opa *sdk.OPA, names []string) error {
for _, name := range names {
if p, ok := opa.Plugin(name).(plugins.Triggerable); ok {
if err := p.Trigger(ctx); err != nil {
return err
}
}
}
return nil
}

func setupLogging(level, format string) (logging.Logger, logging.Logger, error) {

lvl, err := internal_logging.GetLevel(level)
if err != nil {
return nil, nil, err
}

logging.Get().SetFormatter(internal_logging.GetFormatter(format))
logging.Get().SetLevel(lvl)

stdLogger := logging.New()
stdLogger.SetLevel(lvl)
stdLogger.SetFormatter(internal_logging.GetFormatter(format))

consoleLogger := logging.New()
consoleLogger.SetFormatter(internal_logging.GetFormatter(format))

return stdLogger, consoleLogger, nil
}

func setupConfig(file string, overrides []string, overrideFiles []string, bundlePaths []string) ([]byte, error) {

bs, err := config.Load(file, overrides, overrideFiles)
if err != nil {
return nil, err
}

var root map[string]interface{}

if err := util.Unmarshal(bs, &root); err != nil {
return nil, err
}

if err := injectExplicitBundles(root, bundlePaths); err != nil {
return nil, err
}

// NOTE(tsandall): This could be generalized in the future if we need to
// deal with arbitrary plugins.

// NOTE(tsandall): Overriding the discovery trigger mode to manual means
// that all plugins will inherit the trigger mode by default. If the plugin
// trigger mode is explicitly set to something other than 'manual' this will
// result in a configuration error.
if cfg, ok := root["discovery"].(map[string]interface{}); ok {
cfg["trigger"] = "manual"
}

if cfg, ok := root["bundles"].(map[string]interface{}); ok {
for _, x := range cfg {
if bcfg, ok := x.(map[string]interface{}); ok {
bcfg["trigger"] = "manual"
}
}
}

if cfg, ok := root["decision_logs"].(map[string]interface{}); ok {
if rcfg, ok := cfg["reporting"].(map[string]interface{}); ok {
rcfg["trigger"] = "manual"
}
}

if cfg, ok := root["status"].(map[string]interface{}); ok {
cfg["trigger"] = "manual"
}

return json.Marshal(root)
}

func injectExplicitBundles(root map[string]interface{}, paths []string) error {
if len(paths) == 0 {
return nil
}

bundles, ok := root["bundles"].(map[string]interface{})
if !ok {
bundles = map[string]interface{}{}
root["bundles"] = bundles
}

for i := range paths {
abspath, err := filepath.Abs(paths[i])
if err != nil {
return err
}
bundles[fmt.Sprintf("~%d", i)] = map[string]interface{}{
"resource": fmt.Sprintf("file://%v", abspath),
}
}

return nil
}
149 changes: 149 additions & 0 deletions cmd/exec_test.go
@@ -0,0 +1,149 @@
package cmd

import (
"bytes"
"reflect"
"testing"

"github.com/open-policy-agent/opa/cmd/internal/exec"
sdk_test "github.com/open-policy-agent/opa/sdk/test"
"github.com/open-policy-agent/opa/util"
"github.com/open-policy-agent/opa/util/test"
)

func TestExecBasic(t *testing.T) {

files := map[string]string{
"test.json": `{"foo": 7}`,
"test2.yaml": `bar: 8`,
"test3.yml": `baz: 9`,
"ignore": `garbage`, // do not recognize this filetype
}

test.WithTempFS(files, func(dir string) {

s := sdk_test.MustNewServer(sdk_test.MockBundle("/bundles/bundle.tar.gz", map[string]string{
"test.rego": `
package system
main["hello"]
`,
}))

defer s.Stop()

var buf bytes.Buffer
params := exec.NewParams(&buf)
_ = params.OutputFormat.Set("json")
params.ConfigOverrides = []string{
"services.test.url=" + s.URL(),
"bundles.test.resource=/bundles/bundle.tar.gz",
}

params.Paths = append(params.Paths, dir)
err := runExec(params)
if err != nil {
t.Fatal(err)
}

output := util.MustUnmarshalJSON(bytes.ReplaceAll(buf.Bytes(), []byte(dir), nil))

exp := util.MustUnmarshalJSON([]byte(`{"result": [{
"path": "/test.json",
"result": ["hello"]
}, {
"path": "/test2.yaml",
"result": ["hello"]
}, {
"path": "/test3.yml",
"result": ["hello"]
}]}`))

if !reflect.DeepEqual(output, exp) {
t.Fatal("Expected:", exp, "Got:", output)
}
})

}

func TestExecDecisionOption(t *testing.T) {

files := map[string]string{
"test.json": `{"foo": 7}`,
}

test.WithTempFS(files, func(dir string) {

s := sdk_test.MustNewServer(sdk_test.MockBundle("/bundles/bundle.tar.gz", map[string]string{
"test.rego": `
package foo
main["hello"]
`,
}))

defer s.Stop()

var buf bytes.Buffer
params := exec.NewParams(&buf)
_ = params.OutputFormat.Set("json")
params.Decision = "foo/main"
params.ConfigOverrides = []string{
"services.test.url=" + s.URL(),
"bundles.test.resource=/bundles/bundle.tar.gz",
}

params.Paths = append(params.Paths, dir)
err := runExec(params)
if err != nil {
t.Fatal(err)
}

output := util.MustUnmarshalJSON(bytes.ReplaceAll(buf.Bytes(), []byte(dir), nil))

exp := util.MustUnmarshalJSON([]byte(`{"result": [{
"path": "/test.json",
"result": ["hello"]
}]}`))

if !reflect.DeepEqual(output, exp) {
t.Fatal("Expected:", exp, "Got:", output)
}

})

}

func TestExecBundleFlag(t *testing.T) {

files := map[string]string{
"files/test.json": `{"foo": 7}`,
"bundle/x.rego": `package system
main["hello"]`,
}

test.WithTempFS(files, func(dir string) {

var buf bytes.Buffer
params := exec.NewParams(&buf)
_ = params.OutputFormat.Set("json")
params.BundlePaths = []string{dir + "/bundle/"}
params.Paths = append(params.Paths, dir+"/files/")

err := runExec(params)
if err != nil {
t.Fatal(err)
}

output := util.MustUnmarshalJSON(bytes.ReplaceAll(buf.Bytes(), []byte(dir), nil))

exp := util.MustUnmarshalJSON([]byte(`{"result": [{
"path": "/files/test.json",
"result": ["hello"]
}]}`))

if !reflect.DeepEqual(output, exp) {
t.Fatal("Expected:", exp, "Got:", output)
}

})
}

0 comments on commit e495fe3

Please sign in to comment.