Skip to content

Commit 2f8ff89

Browse files
author
OpenShift Bot
committed
Merge pull request #3420 from deads2k/secret-sa-check
Merged by openshift-bot
2 parents e56fd7b + b6bc63a commit 2f8ff89

File tree

13 files changed

+555
-17
lines changed

13 files changed

+555
-17
lines changed

pkg/api/graph/graph.go

+5-1
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,10 @@ type ExistenceChecker interface {
2525
Found() bool
2626
}
2727

28+
type ResourceNode interface {
29+
ResourceString() string
30+
}
31+
2832
type UniqueName string
2933

3034
type UniqueNameFunc func(obj interface{}) UniqueName
@@ -158,7 +162,7 @@ func (g Graph) SyntheticNodes() []graph.Node {
158162
sort.Sort(SortedNodeList(nodeList))
159163
for _, node := range nodeList {
160164
if potentiallySyntheticNode, ok := node.(ExistenceChecker); ok {
161-
if potentiallySyntheticNode.Found() {
165+
if !potentiallySyntheticNode.Found() {
162166
ret = append(ret, node)
163167
}
164168
}

pkg/api/graph/test/runtimeobject_nodebuilder.go

+6
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,12 @@ func init() {
4646
if err := RegisterEnsureNode(&kapi.Service{}, kubegraph.EnsureServiceNode); err != nil {
4747
panic(err)
4848
}
49+
if err := RegisterEnsureNode(&kapi.ServiceAccount{}, kubegraph.EnsureServiceAccountNode); err != nil {
50+
panic(err)
51+
}
52+
if err := RegisterEnsureNode(&kapi.Secret{}, kubegraph.EnsureSecretNode); err != nil {
53+
panic(err)
54+
}
4955
if err := RegisterEnsureNode(&kapi.ReplicationController{}, kubegraph.EnsureReplicationControllerNode); err != nil {
5056
panic(err)
5157
}

pkg/api/kubegraph/analysis/podspec.go

+45
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
package analysis
2+
3+
import (
4+
osgraph "github.com/openshift/origin/pkg/api/graph"
5+
kubeedges "github.com/openshift/origin/pkg/api/kubegraph"
6+
kubegraph "github.com/openshift/origin/pkg/api/kubegraph/nodes"
7+
)
8+
9+
// CheckMountedSecrets checks to be sure that all the referenced secrets are mountable (by service account) and present (not synthetic)
10+
func CheckMountedSecrets(g osgraph.Graph, podSpecNode *kubegraph.PodSpecNode) ( /*unmountable secrets*/ []*kubegraph.SecretNode /*unresolved secrets*/, []*kubegraph.SecretNode) {
11+
saNodes := g.SuccessorNodesByNodeAndEdgeKind(podSpecNode, kubegraph.ServiceAccountNodeKind, kubeedges.ReferencedServiceAccountEdgeKind)
12+
saMountableSecrets := []*kubegraph.SecretNode{}
13+
14+
if len(saNodes) > 0 {
15+
saNode := saNodes[0].(*kubegraph.ServiceAccountNode)
16+
for _, secretNode := range g.SuccessorNodesByNodeAndEdgeKind(saNode, kubegraph.SecretNodeKind, kubeedges.MountableSecretEdgeKind) {
17+
saMountableSecrets = append(saMountableSecrets, secretNode.(*kubegraph.SecretNode))
18+
}
19+
}
20+
21+
unmountableSecrets := []*kubegraph.SecretNode{}
22+
missingSecrets := []*kubegraph.SecretNode{}
23+
24+
for _, uncastMountedSecretNode := range g.SuccessorNodesByNodeAndEdgeKind(podSpecNode, kubegraph.SecretNodeKind, kubeedges.MountedSecretEdgeKind) {
25+
mountedSecretNode := uncastMountedSecretNode.(*kubegraph.SecretNode)
26+
if !mountedSecretNode.Found() {
27+
missingSecrets = append(missingSecrets, mountedSecretNode)
28+
}
29+
30+
mountable := false
31+
for _, mountableSecretNode := range saMountableSecrets {
32+
if mountableSecretNode == mountedSecretNode {
33+
mountable = true
34+
break
35+
}
36+
}
37+
38+
if !mountable {
39+
unmountableSecrets = append(unmountableSecrets, mountedSecretNode)
40+
continue
41+
}
42+
}
43+
44+
return unmountableSecrets, missingSecrets
45+
}

pkg/api/kubegraph/edge_test.go

+55
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
package kubegraph
2+
3+
import (
4+
"testing"
5+
6+
kapi "github.com/GoogleCloudPlatform/kubernetes/pkg/api"
7+
8+
osgraph "github.com/openshift/origin/pkg/api/graph"
9+
kubegraph "github.com/openshift/origin/pkg/api/kubegraph/nodes"
10+
)
11+
12+
func TestSecretEdges(t *testing.T) {
13+
sa := &kapi.ServiceAccount{}
14+
sa.Namespace = "ns"
15+
sa.Name = "shultz"
16+
sa.Secrets = []kapi.ObjectReference{{Name: "i-know-nothing"}, {Name: "missing"}}
17+
18+
secret1 := &kapi.Secret{}
19+
secret1.Namespace = "ns"
20+
secret1.Name = "i-know-nothing"
21+
22+
pod := &kapi.Pod{}
23+
pod.Namespace = "ns"
24+
pod.Name = "the-pod"
25+
pod.Spec.Volumes = []kapi.Volume{{Name: "rose", VolumeSource: kapi.VolumeSource{Secret: &kapi.SecretVolumeSource{SecretName: "i-know-nothing"}}}}
26+
27+
g := osgraph.New()
28+
saNode := kubegraph.EnsureServiceAccountNode(g, sa)
29+
secretNode := kubegraph.EnsureSecretNode(g, secret1)
30+
podNode := kubegraph.EnsurePodNode(g, pod)
31+
32+
AddAllMountableSecretEdges(g)
33+
AddAllMountedSecretEdges(g)
34+
35+
if edge := g.EdgeBetween(saNode, secretNode); edge == nil {
36+
t.Errorf("edge missing")
37+
} else {
38+
if edgeKind := g.EdgeKind(edge); edgeKind != MountableSecretEdgeKind {
39+
t.Errorf("expected %v, got %v", MountableSecretEdgeKind, edgeKind)
40+
}
41+
}
42+
43+
podSpecNodes := g.SuccessorNodesByNodeAndEdgeKind(podNode, kubegraph.PodSpecNodeKind, osgraph.ContainsEdgeKind)
44+
if len(podSpecNodes) != 1 {
45+
t.Fatalf("wrong number of podspecs: %v", podSpecNodes)
46+
}
47+
48+
if edge := g.EdgeBetween(podSpecNodes[0], secretNode); edge == nil {
49+
t.Errorf("edge missing")
50+
} else {
51+
if edgeKind := g.EdgeKind(edge); edgeKind != MountedSecretEdgeKind {
52+
t.Errorf("expected %v, got %v", MountedSecretEdgeKind, edgeKind)
53+
}
54+
}
55+
}

pkg/api/kubegraph/edges.go

+95-2
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,25 @@ package kubegraph
33
import (
44
"github.com/gonum/graph"
55

6+
kapi "github.com/GoogleCloudPlatform/kubernetes/pkg/api"
67
"github.com/GoogleCloudPlatform/kubernetes/pkg/labels"
8+
"github.com/GoogleCloudPlatform/kubernetes/pkg/runtime"
79

810
osgraph "github.com/openshift/origin/pkg/api/graph"
911
kubegraph "github.com/openshift/origin/pkg/api/kubegraph/nodes"
1012
)
1113

1214
const (
13-
// ExposedThroughServiceEdgeKind is an edge that goes from a podtemplatespec or a pod to service.
14-
// The head should make the service's selector
15+
// ExposedThroughServiceEdgeKind goes from a PodTemplateSpec or a Pod to Service. The head should make the service's selector.
1516
ExposedThroughServiceEdgeKind = "ExposedThroughService"
1617
// ManagedByRCEdgeKind goes from Pod to ReplicationController when the Pod satisfies the ReplicationController's label selector
1718
ManagedByRCEdgeKind = "ManagedByRC"
19+
// MountedSecretEdgeKind goes from PodSpec to Secret indicating that is or will be a request to mount a volume with the Secret.
20+
MountedSecretEdgeKind = "MountedSecret"
21+
// MountableSecretEdgeKind goes from ServiceAccount to Secret indicating that the SA allows the Secret to be mounted
22+
MountableSecretEdgeKind = "MountableSecret"
23+
// ReferencedServiceAccountEdgeKind goes from PodSpec to ServiceAccount indicating that Pod is or will be running as the SA.
24+
ReferencedServiceAccountEdgeKind = "ReferencedServiceAccount"
1825
)
1926

2027
// AddExposedPodTemplateSpecEdges ensures that a directed edge exists between a service and all the PodTemplateSpecs
@@ -94,3 +101,89 @@ func AddAllManagedByRCPodEdges(g osgraph.MutableUniqueGraph) {
94101
}
95102
}
96103
}
104+
105+
func AddMountedSecretEdges(g osgraph.Graph, podSpec *kubegraph.PodSpecNode) {
106+
//pod specs are always contained. We'll get the toplevel container so that we can pull a namespace from it
107+
containerNode := osgraph.GetTopLevelContainerNode(g, podSpec)
108+
containerObj := g.GraphDescriber.Object(containerNode)
109+
110+
meta, err := kapi.ObjectMetaFor(containerObj.(runtime.Object))
111+
if err != nil {
112+
// this should never happen. it means that a podSpec is owned by a top level container that is not a runtime.Object
113+
panic(err)
114+
}
115+
116+
for _, volume := range podSpec.Volumes {
117+
source := volume.VolumeSource
118+
if source.Secret == nil {
119+
continue
120+
}
121+
122+
// pod secrets must be in the same namespace
123+
syntheticSecret := &kapi.Secret{}
124+
syntheticSecret.Namespace = meta.Namespace
125+
syntheticSecret.Name = source.Secret.SecretName
126+
127+
secretNode := kubegraph.FindOrCreateSyntheticSecretNode(g, syntheticSecret)
128+
g.AddEdge(podSpec, secretNode, MountedSecretEdgeKind)
129+
}
130+
}
131+
132+
func AddAllMountedSecretEdges(g osgraph.Graph) {
133+
for _, node := range g.NodeList() {
134+
if podSpecNode, ok := node.(*kubegraph.PodSpecNode); ok {
135+
AddMountedSecretEdges(g, podSpecNode)
136+
}
137+
}
138+
}
139+
140+
func AddMountableSecretEdges(g osgraph.Graph, saNode *kubegraph.ServiceAccountNode) {
141+
for _, mountableSecret := range saNode.ServiceAccount.Secrets {
142+
syntheticSecret := &kapi.Secret{}
143+
syntheticSecret.Namespace = saNode.ServiceAccount.Namespace
144+
syntheticSecret.Name = mountableSecret.Name
145+
146+
secretNode := kubegraph.FindOrCreateSyntheticSecretNode(g, syntheticSecret)
147+
g.AddEdge(saNode, secretNode, MountableSecretEdgeKind)
148+
}
149+
}
150+
151+
func AddAllMountableSecretEdges(g osgraph.Graph) {
152+
for _, node := range g.NodeList() {
153+
if saNode, ok := node.(*kubegraph.ServiceAccountNode); ok {
154+
AddMountableSecretEdges(g, saNode)
155+
}
156+
}
157+
}
158+
159+
func AddRequestedServiceAccountEdges(g osgraph.Graph, podSpecNode *kubegraph.PodSpecNode) {
160+
//pod specs are always contained. We'll get the toplevel container so that we can pull a namespace from it
161+
containerNode := osgraph.GetTopLevelContainerNode(g, podSpecNode)
162+
containerObj := g.GraphDescriber.Object(containerNode)
163+
164+
meta, err := kapi.ObjectMetaFor(containerObj.(runtime.Object))
165+
if err != nil {
166+
panic(err)
167+
}
168+
169+
// if no SA name is present, admission will set 'default'
170+
name := "default"
171+
if len(podSpecNode.ServiceAccountName) > 0 {
172+
name = podSpecNode.ServiceAccountName
173+
}
174+
175+
syntheticSA := &kapi.ServiceAccount{}
176+
syntheticSA.Namespace = meta.Namespace
177+
syntheticSA.Name = name
178+
179+
saNode := kubegraph.FindOrCreateSyntheticServiceAccountNode(g, syntheticSA)
180+
g.AddEdge(podSpecNode, saNode, ReferencedServiceAccountEdgeKind)
181+
}
182+
183+
func AddAllRequestedServiceAccountEdges(g osgraph.Graph) {
184+
for _, node := range g.NodeList() {
185+
if podSpecNode, ok := node.(*kubegraph.PodSpecNode); ok {
186+
AddRequestedServiceAccountEdges(g, podSpecNode)
187+
}
188+
}
189+
}

pkg/api/kubegraph/nodes/nodes.go

+36
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,42 @@ func EnsureServiceNode(g osgraph.MutableUniqueGraph, svc *kapi.Service) *Service
4242
).(*ServiceNode)
4343
}
4444

45+
func EnsureServiceAccountNode(g osgraph.MutableUniqueGraph, o *kapi.ServiceAccount) *ServiceAccountNode {
46+
return osgraph.EnsureUnique(g,
47+
ServiceAccountNodeName(o),
48+
func(node osgraph.Node) graph.Node {
49+
return &ServiceAccountNode{node, o, true}
50+
},
51+
).(*ServiceAccountNode)
52+
}
53+
54+
func FindOrCreateSyntheticServiceAccountNode(g osgraph.MutableUniqueGraph, o *kapi.ServiceAccount) *ServiceAccountNode {
55+
return osgraph.EnsureUnique(g,
56+
ServiceAccountNodeName(o),
57+
func(node osgraph.Node) graph.Node {
58+
return &ServiceAccountNode{node, o, false}
59+
},
60+
).(*ServiceAccountNode)
61+
}
62+
63+
func EnsureSecretNode(g osgraph.MutableUniqueGraph, o *kapi.Secret) *SecretNode {
64+
return osgraph.EnsureUnique(g,
65+
SecretNodeName(o),
66+
func(node osgraph.Node) graph.Node {
67+
return &SecretNode{node, o, true}
68+
},
69+
).(*SecretNode)
70+
}
71+
72+
func FindOrCreateSyntheticSecretNode(g osgraph.MutableUniqueGraph, o *kapi.Secret) *SecretNode {
73+
return osgraph.EnsureUnique(g,
74+
SecretNodeName(o),
75+
func(node osgraph.Node) graph.Node {
76+
return &SecretNode{node, o, false}
77+
},
78+
).(*SecretNode)
79+
}
80+
4581
// EnsureReplicationControllerNode adds a graph node for the ReplicationController if it does not already exist.
4682
func EnsureReplicationControllerNode(g osgraph.MutableUniqueGraph, rc *kapi.ReplicationController) *ReplicationControllerNode {
4783
rcNodeName := ReplicationControllerNodeName(rc)

0 commit comments

Comments
 (0)