-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[PodSecurity]Add context to failure message #105314
[PodSecurity]Add context to failure message #105314
Conversation
@calvin0327: This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hi @calvin0327. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/ok-to-test |
aa06ccb
to
9c0e0c1
Compare
/retest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for picking this up!
"Pod violates %q version of %q PodSecurity profile: %s", | ||
nsPolicy.Warn.Version.String(), | ||
nsPolicy.Warn.Level, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There's a LevelVersion
string method that renders this as <level>:<version>
, for a more condensed version:
"Pod violates %q version of %q PodSecurity profile: %s", | |
nsPolicy.Warn.Version.String(), | |
nsPolicy.Warn.Level, | |
"Pod violates PodSecurity %s: %s", | |
nsPolicy.Enforce.String(), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would apply the same change to the audit & warn messages too.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should be Enforce
, not Warn
} | ||
} | ||
|
||
// TODO: reuse previous evaluation if audit level+version is the same as enforce level+version | ||
if result := policy.AggregateCheckResults(a.Evaluator.EvaluatePod(nsPolicy.Audit, podMetadata, podSpec)); !result.Allowed { | ||
auditAnnotations["audit"] = result.ForbiddenDetail() | ||
auditAnnotations["audit"] = fmt.Sprintf( | ||
"Pod violates %q version of %q PodSecurity profile: %s", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The resource might not be a Pod
here. I would pass the Attributes
in as an argument to EvaluatePod
, and then grab the Kind from that (several other open PRs are already passing in attributes: #104365)
auditAnnotations["audit"] = fmt.Sprintf( | ||
"Pod violates %q version of %q PodSecurity profile: %s", | ||
nsPolicy.Warn.Version.String(), | ||
nsPolicy.Warn.Level, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should be audit here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for review.
e8b9f9b
to
784f6ef
Compare
784f6ef
to
bbb372a
Compare
/retest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
last round of comments 🙂
} | ||
} | ||
|
||
// TODO: reuse previous evaluation if audit level+version is the same as enforce level+version | ||
if result := policy.AggregateCheckResults(a.Evaluator.EvaluatePod(nsPolicy.Audit, podMetadata, podSpec)); !result.Allowed { | ||
auditAnnotations["audit"] = result.ForbiddenDetail() | ||
auditAnnotations["audit"] = fmt.Sprintf( | ||
"%s violates PodSecurity %q: %s", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: match the warning mesasge with would violate
"%s violates PodSecurity %q: %s", | |
"%s would violate PodSecurity %q: %s", |
staging/src/k8s.io/pod-security-admission/admission/admission.go
Outdated
Show resolved
Hide resolved
68ecd7d
to
c62521c
Compare
/retest |
@@ -563,16 +563,16 @@ func TestValidatePodController(t *testing.T) { | |||
desc: "bad deploy creates produce correct user-visible warnings and correct auditAnnotations", | |||
newObject: &badDeploy, | |||
gvr: schema.GroupVersionResource{Group: "apps", Version: "v1", Resource: "deployments"}, | |||
expectAuditAnnotations: map[string]string{"audit": "forbidden sysctls (unknown)"}, | |||
expectWarnings: []string{"would violate \"latest\" version of \"baseline\" PodSecurity profile: forbidden sysctls (unknown)"}, | |||
expectAuditAnnotations: map[string]string{"audit": "deployments would violate PodSecurity \"baseline:latest\": forbidden sysctls (unknown)"}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hmm, this doesn't read quite right. It should be "Deployment would violate ...". I think you need to change attrs.GetResource().Resource
to attrs.GetObject().GetObjectKind().GroupVersionKind().Kind
@liggitt do you know if we can depend on Kind
always being populated for the admission object? Otherwise we'll need to expose a new attributes method to pull it off the admission request...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I... don't think kind is populated when converting an internal object to a versioned object
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The other option is we just drop the kind from the message... just "Would violate ...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@tallclair Ok, thanks for review. And now, we would't need the kind
from the Attributes
argument.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I will dorp it from the message.
c62521c
to
fa56d15
Compare
/retest |
1 similar comment
/retest |
fa56d15
to
a8b6ae1
Compare
7a55d28
to
12bfe73
Compare
/retest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: calvin0327, tallclair The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What type of PR is this?
/kind bug
What this PR does / why we need it:
Provide more context for the failure message.
Which issue(s) this PR fixes:
For #103561
Special notes for your reviewer:
I worked on it for a few days, I don't know that is reasonable, correct me if not.
Does this PR introduce a user-facing change?
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.: