Skip to content

Commit 73c522f

Browse files
committed
Allow ImageReview backend to add audit annotations.
This can be used to create annotations that will allow auditing of the created pods. The change also introduces "fail open" audit annotations in addition to the previously existing pod annotation for fail open. The pod annotations for fail open will be deprecated soon.
1 parent 5fb32e7 commit 73c522f

File tree

10 files changed

+462
-115
lines changed

10 files changed

+462
-115
lines changed

pkg/apis/imagepolicy/types.go

+6-1
Original file line numberDiff line numberDiff line change
@@ -56,12 +56,17 @@ type ImageReviewContainerSpec struct {
5656
// In future, we may add command line overrides, exec health check command lines, and so on.
5757
}
5858

59-
// ImageReviewStatus is the result of the token authentication request.
59+
// ImageReviewStatus is the result of the review for the pod creation request.
6060
type ImageReviewStatus struct {
6161
// Allowed indicates that all images were allowed to be run.
6262
Allowed bool
6363
// Reason should be empty unless Allowed is false in which case it
6464
// may contain a short description of what is wrong. Kubernetes
6565
// may truncate excessively long errors when displaying to the user.
6666
Reason string
67+
// AuditAnnotations will be added to the attributes object of the
68+
// admission controller request using 'AddAnnotation'. The keys should
69+
// be prefix-less (i.e., the admission controller will add an
70+
// appropriate prefix).
71+
AuditAnnotations map[string]string
6772
}

pkg/apis/imagepolicy/v1alpha1/zz_generated.conversion.go

+2
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

pkg/apis/imagepolicy/zz_generated.deepcopy.go

+8-1
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

plugin/pkg/admission/imagepolicy/admission.go

+23-1
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,21 @@ import (
4646
// PluginName indicates name of admission plugin.
4747
const PluginName = "ImagePolicyWebhook"
4848

49+
// AuditKeyPrefix is used as the prefix for all audit keys handled by this
50+
// pluggin. Some well known suffixes are listed below.
51+
var AuditKeyPrefix = strings.ToLower(PluginName) + ".image-policy.k8s.io/"
52+
53+
const (
54+
// ImagePolicyFailedOpenKeySuffix in an annotation indicates the image
55+
// review failed open when the image policy webhook backend connection
56+
// failed.
57+
ImagePolicyFailedOpenKeySuffix string = "failed-open"
58+
59+
// ImagePolicyAuditRequiredKeySuffix in an annotation indicates the pod
60+
// should be audited.
61+
ImagePolicyAuditRequiredKeySuffix string = "audit-required"
62+
)
63+
4964
var (
5065
groupVersions = []schema.GroupVersion{v1alpha1.SchemeGroupVersion}
5166
)
@@ -97,12 +112,15 @@ func (a *Plugin) webhookError(pod *api.Pod, attributes admission.Attributes, err
97112
if err != nil {
98113
glog.V(2).Infof("error contacting webhook backend: %s", err)
99114
if a.defaultAllow {
115+
attributes.AddAnnotation(AuditKeyPrefix+ImagePolicyFailedOpenKeySuffix, "true")
116+
// TODO(wteiken): Remove the annotation code for the 1.13 release
100117
annotations := pod.GetAnnotations()
101118
if annotations == nil {
102119
annotations = make(map[string]string)
103120
}
104121
annotations[api.ImagePolicyFailedOpenKey] = "true"
105122
pod.ObjectMeta.SetAnnotations(annotations)
123+
106124
glog.V(2).Infof("resource allowed in spite of webhook backend failure")
107125
return nil
108126
}
@@ -174,13 +192,17 @@ func (a *Plugin) admitPod(pod *api.Pod, attributes admission.Attributes, review
174192
a.responseCache.Add(string(cacheKey), review.Status, a.statusTTL(review.Status))
175193
}
176194

195+
for k, v := range review.Status.AuditAnnotations {
196+
if err := attributes.AddAnnotation(AuditKeyPrefix+k, v); err != nil {
197+
glog.Warningf("failed to set admission audit annotation %s to %s: %v", AuditKeyPrefix+k, v, err)
198+
}
199+
}
177200
if !review.Status.Allowed {
178201
if len(review.Status.Reason) > 0 {
179202
return fmt.Errorf("image policy webhook backend denied one or more images: %s", review.Status.Reason)
180203
}
181204
return errors.New("one or more images rejected by webhook backend")
182205
}
183-
184206
return nil
185207
}
186208

0 commit comments

Comments
 (0)