@@ -46,6 +46,21 @@ import (
46
46
// PluginName indicates name of admission plugin.
47
47
const PluginName = "ImagePolicyWebhook"
48
48
49
+ // AuditKeyPrefix is used as the prefix for all audit keys handled by this
50
+ // pluggin. Some well known suffixes are listed below.
51
+ var AuditKeyPrefix = strings .ToLower (PluginName ) + ".image-policy.k8s.io/"
52
+
53
+ const (
54
+ // ImagePolicyFailedOpenKeySuffix in an annotation indicates the image
55
+ // review failed open when the image policy webhook backend connection
56
+ // failed.
57
+ ImagePolicyFailedOpenKeySuffix string = "failed-open"
58
+
59
+ // ImagePolicyAuditRequiredKeySuffix in an annotation indicates the pod
60
+ // should be audited.
61
+ ImagePolicyAuditRequiredKeySuffix string = "audit-required"
62
+ )
63
+
49
64
var (
50
65
groupVersions = []schema.GroupVersion {v1alpha1 .SchemeGroupVersion }
51
66
)
@@ -97,12 +112,15 @@ func (a *Plugin) webhookError(pod *api.Pod, attributes admission.Attributes, err
97
112
if err != nil {
98
113
glog .V (2 ).Infof ("error contacting webhook backend: %s" , err )
99
114
if a .defaultAllow {
115
+ attributes .AddAnnotation (AuditKeyPrefix + ImagePolicyFailedOpenKeySuffix , "true" )
116
+ // TODO(wteiken): Remove the annotation code for the 1.13 release
100
117
annotations := pod .GetAnnotations ()
101
118
if annotations == nil {
102
119
annotations = make (map [string ]string )
103
120
}
104
121
annotations [api .ImagePolicyFailedOpenKey ] = "true"
105
122
pod .ObjectMeta .SetAnnotations (annotations )
123
+
106
124
glog .V (2 ).Infof ("resource allowed in spite of webhook backend failure" )
107
125
return nil
108
126
}
@@ -174,13 +192,17 @@ func (a *Plugin) admitPod(pod *api.Pod, attributes admission.Attributes, review
174
192
a .responseCache .Add (string (cacheKey ), review .Status , a .statusTTL (review .Status ))
175
193
}
176
194
195
+ for k , v := range review .Status .AuditAnnotations {
196
+ if err := attributes .AddAnnotation (AuditKeyPrefix + k , v ); err != nil {
197
+ glog .Warningf ("failed to set admission audit annotation %s to %s: %v" , AuditKeyPrefix + k , v , err )
198
+ }
199
+ }
177
200
if ! review .Status .Allowed {
178
201
if len (review .Status .Reason ) > 0 {
179
202
return fmt .Errorf ("image policy webhook backend denied one or more images: %s" , review .Status .Reason )
180
203
}
181
204
return errors .New ("one or more images rejected by webhook backend" )
182
205
}
183
-
184
206
return nil
185
207
}
186
208
0 commit comments