mirror of https://github.com/k3s-io/k3s
277 lines
9.2 KiB
Go
277 lines
9.2 KiB
Go
|
/*
|
||
|
Copyright 2016 The Kubernetes Authors.
|
||
|
|
||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
you may not use this file except in compliance with the License.
|
||
|
You may obtain a copy of the License at
|
||
|
|
||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||
|
|
||
|
Unless required by applicable law or agreed to in writing, software
|
||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
See the License for the specific language governing permissions and
|
||
|
limitations under the License.
|
||
|
*/
|
||
|
|
||
|
// Package imagepolicy contains an admission controller that configures a webhook to which policy
|
||
|
// decisions are delegated.
|
||
|
package imagepolicy
|
||
|
|
||
|
import (
|
||
|
"encoding/json"
|
||
|
"errors"
|
||
|
"fmt"
|
||
|
"io"
|
||
|
"strings"
|
||
|
"time"
|
||
|
|
||
|
"k8s.io/klog"
|
||
|
|
||
|
"k8s.io/api/imagepolicy/v1alpha1"
|
||
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
||
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||
|
"k8s.io/apimachinery/pkg/util/cache"
|
||
|
"k8s.io/apimachinery/pkg/util/yaml"
|
||
|
"k8s.io/apiserver/pkg/admission"
|
||
|
"k8s.io/apiserver/pkg/util/webhook"
|
||
|
"k8s.io/client-go/rest"
|
||
|
"k8s.io/kubernetes/pkg/api/legacyscheme"
|
||
|
api "k8s.io/kubernetes/pkg/apis/core"
|
||
|
|
||
|
// install the clientgo image policy API for use with api registry
|
||
|
_ "k8s.io/kubernetes/pkg/apis/imagepolicy/install"
|
||
|
)
|
||
|
|
||
|
// PluginName indicates name of admission plugin.
|
||
|
const PluginName = "ImagePolicyWebhook"
|
||
|
|
||
|
// AuditKeyPrefix is used as the prefix for all audit keys handled by this
|
||
|
// pluggin. Some well known suffixes are listed below.
|
||
|
var AuditKeyPrefix = strings.ToLower(PluginName) + ".image-policy.k8s.io/"
|
||
|
|
||
|
const (
|
||
|
// ImagePolicyFailedOpenKeySuffix in an annotation indicates the image
|
||
|
// review failed open when the image policy webhook backend connection
|
||
|
// failed.
|
||
|
ImagePolicyFailedOpenKeySuffix string = "failed-open"
|
||
|
|
||
|
// ImagePolicyAuditRequiredKeySuffix in an annotation indicates the pod
|
||
|
// should be audited.
|
||
|
ImagePolicyAuditRequiredKeySuffix string = "audit-required"
|
||
|
)
|
||
|
|
||
|
var (
|
||
|
groupVersions = []schema.GroupVersion{v1alpha1.SchemeGroupVersion}
|
||
|
)
|
||
|
|
||
|
// Register registers a plugin
|
||
|
func Register(plugins *admission.Plugins) {
|
||
|
plugins.Register(PluginName, func(config io.Reader) (admission.Interface, error) {
|
||
|
newImagePolicyWebhook, err := NewImagePolicyWebhook(config)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
return newImagePolicyWebhook, nil
|
||
|
})
|
||
|
}
|
||
|
|
||
|
// Plugin is an implementation of admission.Interface.
|
||
|
type Plugin struct {
|
||
|
*admission.Handler
|
||
|
webhook *webhook.GenericWebhook
|
||
|
responseCache *cache.LRUExpireCache
|
||
|
allowTTL time.Duration
|
||
|
denyTTL time.Duration
|
||
|
retryBackoff time.Duration
|
||
|
defaultAllow bool
|
||
|
}
|
||
|
|
||
|
var _ admission.ValidationInterface = &Plugin{}
|
||
|
|
||
|
func (a *Plugin) statusTTL(status v1alpha1.ImageReviewStatus) time.Duration {
|
||
|
if status.Allowed {
|
||
|
return a.allowTTL
|
||
|
}
|
||
|
return a.denyTTL
|
||
|
}
|
||
|
|
||
|
// Filter out annotations that don't match *.image-policy.k8s.io/*
|
||
|
func (a *Plugin) filterAnnotations(allAnnotations map[string]string) map[string]string {
|
||
|
annotations := make(map[string]string)
|
||
|
for k, v := range allAnnotations {
|
||
|
if strings.Contains(k, ".image-policy.k8s.io/") {
|
||
|
annotations[k] = v
|
||
|
}
|
||
|
}
|
||
|
return annotations
|
||
|
}
|
||
|
|
||
|
// Function to call on webhook failure; behavior determined by defaultAllow flag
|
||
|
func (a *Plugin) webhookError(pod *api.Pod, attributes admission.Attributes, err error) error {
|
||
|
if err != nil {
|
||
|
klog.V(2).Infof("error contacting webhook backend: %s", err)
|
||
|
if a.defaultAllow {
|
||
|
attributes.AddAnnotation(AuditKeyPrefix+ImagePolicyFailedOpenKeySuffix, "true")
|
||
|
// TODO(wteiken): Remove the annotation code for the 1.13 release
|
||
|
annotations := pod.GetAnnotations()
|
||
|
if annotations == nil {
|
||
|
annotations = make(map[string]string)
|
||
|
}
|
||
|
annotations[api.ImagePolicyFailedOpenKey] = "true"
|
||
|
pod.ObjectMeta.SetAnnotations(annotations)
|
||
|
|
||
|
klog.V(2).Infof("resource allowed in spite of webhook backend failure")
|
||
|
return nil
|
||
|
}
|
||
|
klog.V(2).Infof("resource not allowed due to webhook backend failure ")
|
||
|
return admission.NewForbidden(attributes, err)
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
// Validate makes an admission decision based on the request attributes
|
||
|
func (a *Plugin) Validate(attributes admission.Attributes, o admission.ObjectInterfaces) (err error) {
|
||
|
// Ignore all calls to subresources or resources other than pods.
|
||
|
if attributes.GetSubresource() != "" || attributes.GetResource().GroupResource() != api.Resource("pods") {
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
pod, ok := attributes.GetObject().(*api.Pod)
|
||
|
if !ok {
|
||
|
return apierrors.NewBadRequest("Resource was marked with kind Pod but was unable to be converted")
|
||
|
}
|
||
|
|
||
|
// Build list of ImageReviewContainerSpec
|
||
|
var imageReviewContainerSpecs []v1alpha1.ImageReviewContainerSpec
|
||
|
containers := make([]api.Container, 0, len(pod.Spec.Containers)+len(pod.Spec.InitContainers))
|
||
|
containers = append(containers, pod.Spec.Containers...)
|
||
|
containers = append(containers, pod.Spec.InitContainers...)
|
||
|
for _, c := range containers {
|
||
|
imageReviewContainerSpecs = append(imageReviewContainerSpecs, v1alpha1.ImageReviewContainerSpec{
|
||
|
Image: c.Image,
|
||
|
})
|
||
|
}
|
||
|
imageReview := v1alpha1.ImageReview{
|
||
|
Spec: v1alpha1.ImageReviewSpec{
|
||
|
Containers: imageReviewContainerSpecs,
|
||
|
Annotations: a.filterAnnotations(pod.Annotations),
|
||
|
Namespace: attributes.GetNamespace(),
|
||
|
},
|
||
|
}
|
||
|
if err := a.admitPod(pod, attributes, &imageReview); err != nil {
|
||
|
return admission.NewForbidden(attributes, err)
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (a *Plugin) admitPod(pod *api.Pod, attributes admission.Attributes, review *v1alpha1.ImageReview) error {
|
||
|
cacheKey, err := json.Marshal(review.Spec)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
if entry, ok := a.responseCache.Get(string(cacheKey)); ok {
|
||
|
review.Status = entry.(v1alpha1.ImageReviewStatus)
|
||
|
} else {
|
||
|
result := a.webhook.WithExponentialBackoff(func() rest.Result {
|
||
|
return a.webhook.RestClient.Post().Body(review).Do()
|
||
|
})
|
||
|
|
||
|
if err := result.Error(); err != nil {
|
||
|
return a.webhookError(pod, attributes, err)
|
||
|
}
|
||
|
var statusCode int
|
||
|
if result.StatusCode(&statusCode); statusCode < 200 || statusCode >= 300 {
|
||
|
return a.webhookError(pod, attributes, fmt.Errorf("Error contacting webhook: %d", statusCode))
|
||
|
}
|
||
|
|
||
|
if err := result.Into(review); err != nil {
|
||
|
return a.webhookError(pod, attributes, err)
|
||
|
}
|
||
|
|
||
|
a.responseCache.Add(string(cacheKey), review.Status, a.statusTTL(review.Status))
|
||
|
}
|
||
|
|
||
|
for k, v := range review.Status.AuditAnnotations {
|
||
|
if err := attributes.AddAnnotation(AuditKeyPrefix+k, v); err != nil {
|
||
|
klog.Warningf("failed to set admission audit annotation %s to %s: %v", AuditKeyPrefix+k, v, err)
|
||
|
}
|
||
|
}
|
||
|
if !review.Status.Allowed {
|
||
|
if len(review.Status.Reason) > 0 {
|
||
|
return fmt.Errorf("image policy webhook backend denied one or more images: %s", review.Status.Reason)
|
||
|
}
|
||
|
return errors.New("one or more images rejected by webhook backend")
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
// NewImagePolicyWebhook a new ImagePolicyWebhook plugin from the provided config file.
|
||
|
// The config file is specified by --admission-control-config-file and has the
|
||
|
// following format for a webhook:
|
||
|
//
|
||
|
// {
|
||
|
// "imagePolicy": {
|
||
|
// "kubeConfigFile": "path/to/kubeconfig/for/backend",
|
||
|
// "allowTTL": 30, # time in s to cache approval
|
||
|
// "denyTTL": 30, # time in s to cache denial
|
||
|
// "retryBackoff": 500, # time in ms to wait between retries
|
||
|
// "defaultAllow": true # determines behavior if the webhook backend fails
|
||
|
// }
|
||
|
// }
|
||
|
//
|
||
|
// The config file may be json or yaml.
|
||
|
//
|
||
|
// The kubeconfig property refers to another file in the kubeconfig format which
|
||
|
// specifies how to connect to the webhook backend.
|
||
|
//
|
||
|
// The kubeconfig's cluster field is used to refer to the remote service, user refers to the returned authorizer.
|
||
|
//
|
||
|
// # clusters refers to the remote service.
|
||
|
// clusters:
|
||
|
// - name: name-of-remote-imagepolicy-service
|
||
|
// cluster:
|
||
|
// certificate-authority: /path/to/ca.pem # CA for verifying the remote service.
|
||
|
// server: https://images.example.com/policy # URL of remote service to query. Must use 'https'.
|
||
|
//
|
||
|
// # users refers to the API server's webhook configuration.
|
||
|
// users:
|
||
|
// - name: name-of-api-server
|
||
|
// user:
|
||
|
// client-certificate: /path/to/cert.pem # cert for the webhook plugin to use
|
||
|
// client-key: /path/to/key.pem # key matching the cert
|
||
|
//
|
||
|
// For additional HTTP configuration, refer to the kubeconfig documentation
|
||
|
// http://kubernetes.io/v1.1/docs/user-guide/kubeconfig-file.html.
|
||
|
func NewImagePolicyWebhook(configFile io.Reader) (*Plugin, error) {
|
||
|
if configFile == nil {
|
||
|
return nil, fmt.Errorf("no config specified")
|
||
|
}
|
||
|
|
||
|
// TODO: move this to a versioned configuration file format
|
||
|
var config AdmissionConfig
|
||
|
d := yaml.NewYAMLOrJSONDecoder(configFile, 4096)
|
||
|
err := d.Decode(&config)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
|
||
|
whConfig := config.ImagePolicyWebhook
|
||
|
if err := normalizeWebhookConfig(&whConfig); err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
|
||
|
gw, err := webhook.NewGenericWebhook(legacyscheme.Scheme, legacyscheme.Codecs, whConfig.KubeConfigFile, groupVersions, whConfig.RetryBackoff)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
return &Plugin{
|
||
|
Handler: admission.NewHandler(admission.Create, admission.Update),
|
||
|
webhook: gw,
|
||
|
responseCache: cache.NewLRUExpireCache(1024),
|
||
|
allowTTL: whConfig.AllowTTL,
|
||
|
denyTTL: whConfig.DenyTTL,
|
||
|
defaultAllow: whConfig.DefaultAllow,
|
||
|
}, nil
|
||
|
}
|