Skip to content

Commit 4f99fe7

Browse files
Image policy is resolving images on replica sets by default
Even when local names are not requested, the image policy plugin is deciding to rewrite image references in replica sets that point to the integrated registry (with tags) to use digests. This causes the deployment controller that created them to get wedged (because it detects a change to the template) and become unable to update status on that replica set. https://bugzilla.redhat.com/show_bug.cgi?id=1481801
1 parent dce814f commit 4f99fe7

File tree

10 files changed

+318
-39
lines changed

10 files changed

+318
-39
lines changed

pkg/bootstrap/bindata.go

-1
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

pkg/image/admission/imagepolicy/api/types.go

+6-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,9 @@ type ImagePolicyConfig struct {
2727

2828
// ResolutionRules allows more specific image resolution rules to be applied per resource. If
2929
// empty, it defaults to allowing local image stream lookups - "mysql" will map to the image stream
30-
// tag "mysql:latest" in the current namespace if the stream supports it.
30+
// tag "mysql:latest" in the current namespace if the stream supports it. The default for this
31+
// field is all known types that support image resolution, and the policy for those rules will be
32+
// set to the overall resolution policy if an execution rule references the same resource.
3133
ResolutionRules []ImageResolutionPolicyRule
3234

3335
// ExecutionRules determine whether the use of an image is allowed in an object with a pod spec.
@@ -53,6 +55,9 @@ var (
5355

5456
// ImageResolutionPolicyRule describes resolution rules based on resource.
5557
type ImageResolutionPolicyRule struct {
58+
// Policy controls whether resolution will happen if the rule doesn't match local names. This value
59+
// overrides the global image policy for all target resources.
60+
Policy ImageResolutionType
5661
// TargetResource is the identified group and resource. If Resource is *, this rule will apply
5762
// to all resources in that group.
5863
TargetResource metav1.GroupResource

pkg/image/admission/imagepolicy/api/v1/default-policy.yaml

-1
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,3 @@ executionRules:
1717
- key: images.openshift.io/deny-execution
1818
value: "true"
1919
skipOnResolutionFailure: true
20-

pkg/image/admission/imagepolicy/api/v1/defaults.go

+34-12
Original file line numberDiff line numberDiff line change
@@ -14,30 +14,52 @@ func SetDefaults_ImagePolicyConfig(obj *ImagePolicyConfig) {
1414
obj.ResolveImages = Attempt
1515
}
1616

17+
for i := range obj.ExecutionRules {
18+
if len(obj.ExecutionRules[i].OnResources) == 0 {
19+
obj.ExecutionRules[i].OnResources = []GroupResource{{Resource: "pods", Group: kapi.GroupName}}
20+
}
21+
}
22+
1723
if obj.ResolutionRules == nil {
1824
obj.ResolutionRules = []ImageResolutionPolicyRule{
1925
{TargetResource: GroupResource{Resource: "pods"}, LocalNames: true},
2026
{TargetResource: GroupResource{Group: "build.openshift.io", Resource: "builds"}, LocalNames: true},
21-
{TargetResource: GroupResource{Resource: "replicationcontrollers"}, LocalNames: true},
22-
{TargetResource: GroupResource{Group: "extensions", Resource: "replicasets"}, LocalNames: true},
2327
{TargetResource: GroupResource{Group: "batch", Resource: "jobs"}, LocalNames: true},
24-
25-
// TODO: consider adding these
26-
// {TargetResource: GroupResource{Group: "extensions", Resource: "deployments"}, LocalNames: true},
27-
// {TargetResource: GroupResource{Group: "apps", Resource: "statefulsets"}, LocalNames: true},
28+
{TargetResource: GroupResource{Group: "extensions", Resource: "replicasets"}, LocalNames: true},
29+
{TargetResource: GroupResource{Resource: "replicationcontrollers"}, LocalNames: true},
30+
{TargetResource: GroupResource{Group: "apps", Resource: "deployments"}, LocalNames: true},
31+
{TargetResource: GroupResource{Group: "extensions", Resource: "deployments"}, LocalNames: true},
32+
{TargetResource: GroupResource{Group: "apps", Resource: "statefulsets"}, LocalNames: true},
33+
{TargetResource: GroupResource{Group: "extensions", Resource: "daemonsets"}, LocalNames: true},
2834
}
29-
}
30-
31-
for i := range obj.ExecutionRules {
32-
if len(obj.ExecutionRules[i].OnResources) == 0 {
33-
obj.ExecutionRules[i].OnResources = []GroupResource{{Resource: "pods", Group: kapi.GroupName}}
35+
// default the resolution policy to the global default
36+
for i := range obj.ResolutionRules {
37+
if len(obj.ResolutionRules[i].Policy) != 0 {
38+
continue
39+
}
40+
obj.ResolutionRules[i].Policy = DoNotAttempt
41+
for _, rule := range obj.ExecutionRules {
42+
if executionRuleCoversResource(rule, obj.ResolutionRules[i].TargetResource) {
43+
obj.ResolutionRules[i].Policy = obj.ResolveImages
44+
break
45+
}
46+
}
3447
}
3548
}
36-
3749
}
3850

3951
func addDefaultingFuncs(scheme *runtime.Scheme) error {
4052
return scheme.AddDefaultingFuncs(
4153
SetDefaults_ImagePolicyConfig,
4254
)
4355
}
56+
57+
// executionRuleCoversResource returns true if gr is covered by rule.
58+
func executionRuleCoversResource(rule ImageExecutionPolicyRule, gr GroupResource) bool {
59+
for _, target := range rule.OnResources {
60+
if target.Group == gr.Group && (target.Resource == gr.Resource || target.Resource == "*") {
61+
return true
62+
}
63+
}
64+
return false
65+
}

pkg/image/admission/imagepolicy/api/v1/swagger_doc.go

+2-1
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ func (ImageExecutionPolicyRule) SwaggerDoc() map[string]string {
4545
var map_ImagePolicyConfig = map[string]string{
4646
"": "ImagePolicyConfig is the configuration for control of images running on the platform.",
4747
"resolveImages": "ResolveImages indicates the default image resolution behavior. If a rewriting policy is chosen, then the image pull specs will be updated.",
48-
"resolutionRules": "ResolutionRules allows more specific image resolution rules to be applied per resource. If empty, it defaults to allowing local image stream lookups - \"mysql\" will map to the image stream tag \"mysql:latest\" in the current namespace if the stream supports it.",
48+
"resolutionRules": "ResolutionRules allows more specific image resolution rules to be applied per resource. If empty, it defaults to allowing local image stream lookups - \"mysql\" will map to the image stream tag \"mysql:latest\" in the current namespace if the stream supports it. The default for this field is all known types that support image resolution, and the policy for those rules will be set to the overall resolution policy if an execution rule references the same resource.",
4949
"executionRules": "ExecutionRules determine whether the use of an image is allowed in an object with a pod spec. By default, these rules only apply to pods, but may be extended to other resource types. If all execution rules are negations, the default behavior is allow all. If any execution rule is an allow, the default behavior is to reject all.",
5050
}
5151

@@ -55,6 +55,7 @@ func (ImagePolicyConfig) SwaggerDoc() map[string]string {
5555

5656
var map_ImageResolutionPolicyRule = map[string]string{
5757
"": "ImageResolutionPolicyRule describes resolution rules based on resource.",
58+
"policy": "Policy controls whether resolution will happen if the rule doesn't match local names. This value overrides the global image policy for all target resources.",
5859
"targetResource": "TargetResource is the identified group and resource. If Resource is *, this rule will apply to all resources in that group.",
5960
"localNames": "LocalNames will allow single segment names to be interpreted as namespace local image stream tags, but only if the target image stream tag has the \"resolveLocalNames\" field set.",
6061
}

pkg/image/admission/imagepolicy/api/v1/types.go

+6-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,9 @@ type ImagePolicyConfig struct {
1414

1515
// ResolutionRules allows more specific image resolution rules to be applied per resource. If
1616
// empty, it defaults to allowing local image stream lookups - "mysql" will map to the image stream
17-
// tag "mysql:latest" in the current namespace if the stream supports it.
17+
// tag "mysql:latest" in the current namespace if the stream supports it. The default for this
18+
// field is all known types that support image resolution, and the policy for those rules will be
19+
// set to the overall resolution policy if an execution rule references the same resource.
1820
ResolutionRules []ImageResolutionPolicyRule `json:"resolutionRules"`
1921

2022
// ExecutionRules determine whether the use of an image is allowed in an object with a pod spec.
@@ -42,6 +44,9 @@ var (
4244

4345
// ImageResolutionPolicyRule describes resolution rules based on resource.
4446
type ImageResolutionPolicyRule struct {
47+
// Policy controls whether resolution will happen if the rule doesn't match local names. This value
48+
// overrides the global image policy for all target resources.
49+
Policy ImageResolutionType `json:"policy"`
4550
// TargetResource is the identified group and resource. If Resource is *, this rule will apply
4651
// to all resources in that group.
4752
TargetResource GroupResource `json:"targetResource"`

pkg/image/admission/imagepolicy/api/validation/validation.go

+3
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,9 @@ func Validate(config *api.ImagePolicyConfig) field.ErrorList {
2828
}
2929

3030
for i, rule := range config.ResolutionRules {
31+
if len(rule.Policy) == 0 {
32+
allErrs = append(allErrs, field.Required(field.NewPath(api.PluginName, "resolutionRules").Index(i).Child("policy"), "a policy must be specified for this resource"))
33+
}
3134
if len(rule.TargetResource.Resource) == 0 {
3235
allErrs = append(allErrs, field.Required(field.NewPath(api.PluginName, "resolutionRules").Index(i).Child("targetResource", "resource"), "a target resource name or '*' must be provided"))
3336
}

pkg/image/admission/imagepolicy/api/validation/validation_test.go

+27
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,33 @@ func TestValidation(t *testing.T) {
4747
t.Fatal(errs)
4848
}
4949

50+
if errs := Validate(&api.ImagePolicyConfig{
51+
ResolveImages: api.DoNotAttempt,
52+
ResolutionRules: []api.ImageResolutionPolicyRule{
53+
{TargetResource: metav1.GroupResource{Resource: "test"}, Policy: api.Attempt},
54+
},
55+
}); len(errs) != 0 {
56+
t.Fatal(errs)
57+
}
58+
59+
if errs := Validate(&api.ImagePolicyConfig{
60+
ResolveImages: api.DoNotAttempt,
61+
ResolutionRules: []api.ImageResolutionPolicyRule{
62+
{TargetResource: metav1.GroupResource{Resource: "test"}},
63+
},
64+
}); len(errs) == 0 {
65+
t.Fatal(errs)
66+
}
67+
68+
if errs := Validate(&api.ImagePolicyConfig{
69+
ResolveImages: api.DoNotAttempt,
70+
ResolutionRules: []api.ImageResolutionPolicyRule{
71+
{Policy: api.Attempt},
72+
},
73+
}); len(errs) == 0 {
74+
t.Fatal(errs)
75+
}
76+
5077
if errs := Validate(&api.ImagePolicyConfig{
5178
ResolveImages: api.DoNotAttempt,
5279
ExecutionRules: []api.ImageExecutionPolicyRule{

pkg/image/admission/imagepolicy/imagepolicy.go

+18-12
Original file line numberDiff line numberDiff line change
@@ -451,26 +451,32 @@ var skipImageRewriteOnUpdate = map[schema.GroupResource]struct{}{
451451
}
452452

453453
// RewriteImagePullSpec applies to implicit rewrite attributes and local resources as well as if the policy requires it.
454+
// If a local name check is requested and a rule matches true is returned. The policy default resolution is only respected
455+
// if a resource isn't covered by a rule - if pods have a rule with DoNotAttempt and the global policy is RequiredRewrite,
456+
// no pods will be rewritten.
454457
func (config resolutionConfig) RewriteImagePullSpec(attr *rules.ImagePolicyAttributes, isUpdate bool, gr schema.GroupResource) bool {
455458
if isUpdate {
456459
if _, ok := skipImageRewriteOnUpdate[gr]; ok {
457460
return false
458461
}
459462
}
460-
if api.RequestsResolution(config.config.ResolveImages) {
461-
return true
462-
}
463-
if attr.LocalRewrite {
464-
for _, rule := range config.config.ResolutionRules {
465-
if !rule.LocalNames {
466-
continue
467-
}
468-
if resolutionRuleCoversResource(rule.TargetResource, gr) {
469-
return true
470-
}
463+
hasMatchingRule := false
464+
for _, rule := range config.config.ResolutionRules {
465+
if !resolutionRuleCoversResource(rule.TargetResource, gr) {
466+
continue
471467
}
468+
if rule.LocalNames && attr.LocalRewrite {
469+
return true
470+
}
471+
if api.RewriteImagePullSpec(rule.Policy) {
472+
return true
473+
}
474+
hasMatchingRule = true
472475
}
473-
return false
476+
if hasMatchingRule {
477+
return false
478+
}
479+
return api.RewriteImagePullSpec(config.config.ResolveImages)
474480
}
475481

476482
// resolutionRuleCoversResource implements wildcard checking on Resource names

0 commit comments

Comments
 (0)