Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[PodSecurity]Add context to failure message #105314

Merged

Conversation

calvin0327
Copy link

@calvin0327 calvin0327 commented Sep 28, 2021

What type of PR is this?

/kind bug

What this PR does / why we need it:

Provide more context for the failure message.

Which issue(s) this PR fixes:

For #103561

Special notes for your reviewer:

I worked on it for a few days, I don't know that is reasonable, correct me if not.

Does this PR introduce a user-facing change?

NONE

Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:


@k8s-ci-robot k8s-ci-robot added release-note-none Denotes a PR that doesn't merit a release note. kind/bug Categorizes issue or PR as related to a bug. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. do-not-merge/needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. labels Sep 28, 2021
@k8s-ci-robot
Copy link
Contributor

@calvin0327: This issue is currently awaiting triage.

If a SIG or subproject determines this is a relevant issue, they will accept it by applying the triage/accepted label and provide further guidance.

The triage/accepted label can be added by org members by writing /triage accepted in a comment.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added the needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. label Sep 28, 2021
@k8s-ci-robot
Copy link
Contributor

Hi @calvin0327. Thanks for your PR.

I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. needs-priority Indicates a PR lacks a `priority/foo` label and requires one. labels Sep 28, 2021
@k8s-ci-robot k8s-ci-robot added sig/auth Categorizes an issue or PR as relevant to SIG Auth. and removed do-not-merge/needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. labels Sep 28, 2021
@calvin0327 calvin0327 changed the title add context to failure message. add context to failure message and group error message by container Sep 28, 2021
@pacoxu
Copy link
Member

pacoxu commented Sep 28, 2021

/ok-to-test

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Sep 28, 2021
@calvin0327 calvin0327 changed the title add context to failure message and group error message by container [PodSecurity]Add context to failure message and group error message by container Sep 28, 2021
@calvin0327 calvin0327 changed the title [PodSecurity]Add context to failure message and group error message by container [PodSecurity]Add context to failure message Sep 28, 2021
@calvin0327 calvin0327 force-pushed the issue-podsecurity-errormessage branch from aa06ccb to 9c0e0c1 Compare September 28, 2021 10:18
@calvin0327
Copy link
Author

/retest

@tallclair tallclair self-assigned this Sep 28, 2021
Copy link
Member

@tallclair tallclair left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for picking this up!

Comment on lines 416 to 418
"Pod violates %q version of %q PodSecurity profile: %s",
nsPolicy.Warn.Version.String(),
nsPolicy.Warn.Level,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There's a LevelVersion string method that renders this as <level>:<version>, for a more condensed version:

Suggested change
"Pod violates %q version of %q PodSecurity profile: %s",
nsPolicy.Warn.Version.String(),
nsPolicy.Warn.Level,
"Pod violates PodSecurity %s: %s",
nsPolicy.Enforce.String(),

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would apply the same change to the audit & warn messages too.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should be Enforce, not Warn

}
}

// TODO: reuse previous evaluation if audit level+version is the same as enforce level+version
if result := policy.AggregateCheckResults(a.Evaluator.EvaluatePod(nsPolicy.Audit, podMetadata, podSpec)); !result.Allowed {
auditAnnotations["audit"] = result.ForbiddenDetail()
auditAnnotations["audit"] = fmt.Sprintf(
"Pod violates %q version of %q PodSecurity profile: %s",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The resource might not be a Pod here. I would pass the Attributes in as an argument to EvaluatePod, and then grab the Kind from that (several other open PRs are already passing in attributes: #104365)

auditAnnotations["audit"] = fmt.Sprintf(
"Pod violates %q version of %q PodSecurity profile: %s",
nsPolicy.Warn.Version.String(),
nsPolicy.Warn.Level,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should be audit here.

Copy link
Author

@calvin0327 calvin0327 Sep 29, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for review.

@k8s-ci-robot k8s-ci-robot added the do-not-merge/contains-merge-commits Indicates a PR which contains merge commits. label Oct 7, 2021
@calvin0327 calvin0327 force-pushed the issue-podsecurity-errormessage branch from e8b9f9b to 784f6ef Compare October 8, 2021 02:46
@k8s-ci-robot k8s-ci-robot removed the do-not-merge/contains-merge-commits Indicates a PR which contains merge commits. label Oct 8, 2021
@calvin0327 calvin0327 force-pushed the issue-podsecurity-errormessage branch from 784f6ef to bbb372a Compare October 8, 2021 09:44
@calvin0327
Copy link
Author

/retest

Copy link
Member

@tallclair tallclair left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

last round of comments 🙂

}
}

// TODO: reuse previous evaluation if audit level+version is the same as enforce level+version
if result := policy.AggregateCheckResults(a.Evaluator.EvaluatePod(nsPolicy.Audit, podMetadata, podSpec)); !result.Allowed {
auditAnnotations["audit"] = result.ForbiddenDetail()
auditAnnotations["audit"] = fmt.Sprintf(
"%s violates PodSecurity %q: %s",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: match the warning mesasge with would violate

Suggested change
"%s violates PodSecurity %q: %s",
"%s would violate PodSecurity %q: %s",

@calvin0327 calvin0327 force-pushed the issue-podsecurity-errormessage branch 3 times, most recently from 68ecd7d to c62521c Compare October 18, 2021 02:30
@calvin0327
Copy link
Author

/retest

@@ -563,16 +563,16 @@ func TestValidatePodController(t *testing.T) {
desc: "bad deploy creates produce correct user-visible warnings and correct auditAnnotations",
newObject: &badDeploy,
gvr: schema.GroupVersionResource{Group: "apps", Version: "v1", Resource: "deployments"},
expectAuditAnnotations: map[string]string{"audit": "forbidden sysctls (unknown)"},
expectWarnings: []string{"would violate \"latest\" version of \"baseline\" PodSecurity profile: forbidden sysctls (unknown)"},
expectAuditAnnotations: map[string]string{"audit": "deployments would violate PodSecurity \"baseline:latest\": forbidden sysctls (unknown)"},
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm, this doesn't read quite right. It should be "Deployment would violate ...". I think you need to change attrs.GetResource().Resource to attrs.GetObject().GetObjectKind().GroupVersionKind().Kind

@liggitt do you know if we can depend on Kind always being populated for the admission object? Otherwise we'll need to expose a new attributes method to pull it off the admission request...

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I... don't think kind is populated when converting an internal object to a versioned object

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The other option is we just drop the kind from the message... just "Would violate ...

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@tallclair Ok, thanks for review. And now, we would't need the kind from the Attributes argument.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I will dorp it from the message.

@calvin0327 calvin0327 force-pushed the issue-podsecurity-errormessage branch from c62521c to fa56d15 Compare October 20, 2021 02:56
@calvin0327
Copy link
Author

/retest

1 similar comment
@calvin0327
Copy link
Author

/retest

@calvin0327 calvin0327 force-pushed the issue-podsecurity-errormessage branch from fa56d15 to a8b6ae1 Compare October 21, 2021 02:06
@k8s-ci-robot k8s-ci-robot added needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. do-not-merge/contains-merge-commits Indicates a PR which contains merge commits. and removed needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. labels Oct 21, 2021
@calvin0327 calvin0327 force-pushed the issue-podsecurity-errormessage branch from 7a55d28 to 12bfe73 Compare October 21, 2021 06:41
@k8s-ci-robot k8s-ci-robot removed the do-not-merge/contains-merge-commits Indicates a PR which contains merge commits. label Oct 21, 2021
@calvin0327
Copy link
Author

/retest

Copy link
Member

@tallclair tallclair left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Oct 25, 2021
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: calvin0327, tallclair

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Oct 25, 2021
@k8s-ci-robot k8s-ci-robot merged commit a6ffd29 into kubernetes:master Oct 25, 2021
@k8s-ci-robot k8s-ci-robot added this to the v1.23 milestone Oct 25, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/bug Categorizes issue or PR as related to a bug. lgtm "Looks good to me", indicates that a PR is ready to be merged. needs-priority Indicates a PR lacks a `priority/foo` label and requires one. needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. release-note-none Denotes a PR that doesn't merit a release note. sig/auth Categorizes an issue or PR as relevant to SIG Auth. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
Archived in project
Development

Successfully merging this pull request may close these issues.

5 participants