Skip to content

Commit 8bc3e07

Browse files
committed
Admission plugin: openshift.io/ImageQualify
This plugin allows administrators to set a policy for bare image names. A "bare" image name is a docker image reference that contains no domain component (e.g., "repository.io", "docker.io", etc). The preferred domain component to use, and hence pull from, for a bare image name is computed from a set of path-based pattern matching rules defined in the admission configuration. Fixes https://bugzilla.redhat.com/show_bug.cgi?id=1518378
1 parent 86d4f94 commit 8bc3e07

35 files changed

+2302
-0
lines changed
+77
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
#!/bin/bash
2+
3+
# List all unqualified images in all pods in all namespaces.
4+
5+
strindex() {
6+
local x="${1%%$2*}" # find occurrence of $2 in $1
7+
[[ "$x" == "$1" ]] && echo -1 || echo "${#x}"
8+
}
9+
10+
# Finds any-of chars in string. Returns 0 on success, otherwise 1.
11+
strchr() {
12+
local str=$1
13+
local chars=$2
14+
for (( i=0; i<${#chars}; i++ )); do
15+
[[ $(strindex "$str" "${chars:$i:1}") -ge 0 ]] && return 0
16+
done
17+
return 1
18+
}
19+
20+
split_image_at_domain() {
21+
local image=$1
22+
local index=$(strindex "$image" "/")
23+
24+
if [[ "$index" == -1 ]] || (! strchr "${image:0:$index}" ".:" && [[ "${image:0:$index}" != "localhost" ]]); then
25+
echo ""
26+
else
27+
echo "${image:0:$index}"
28+
fi
29+
}
30+
31+
has_domain() {
32+
local image=$1
33+
[[ -n $(split_image_at_domain "$image") ]]
34+
}
35+
36+
die() {
37+
echo "$*" 1>&2
38+
exit 1
39+
}
40+
41+
self_test() {
42+
strchr "foo/busybox" "Z" && die "self-test 1 failed"
43+
44+
strchr "foo/busybox" "/" || die "self-test 2 failed"
45+
strchr "foo/busybox" "Zx" || die "self-test 3 failed"
46+
47+
has_domain "foo" && die "self-test 4 failed"
48+
has_domain "foo/busybox" && die "self-test 5 failed"
49+
has_domain "repo/foo/busybox" && die "self-test 6 failed"
50+
has_domain "a/b/c/busybox" && die "self-test 7 failed"
51+
52+
has_domain "localhost/busybox" || die "self-test 8 failed"
53+
has_domain "localhost:5000/busybox" || die "self-test 9 failed"
54+
has_domain "foo.com:5000/busybox" || die "self-test 10 failed"
55+
has_domain "docker.io/busybox" || die "self-test 11 failed"
56+
has_domain "a.b.c.io/busybox" || die "self-test 12 failed"
57+
}
58+
59+
[[ -n ${SELF_TEST:-} ]] && self_test
60+
61+
template='
62+
{{- range .items -}}
63+
{{- $metadata := .metadata -}}
64+
{{- $containers := .spec.containers -}}
65+
{{- $container_statuses := .status.containerStatuses -}}
66+
{{- if and $containers $container_statuses -}}
67+
{{- if eq (len $containers) (len $container_statuses) -}}
68+
{{- range $n, $container := $containers -}}
69+
{{- printf "%s %s %s %s\n" $metadata.namespace $metadata.name $container.image (index $container_statuses $n).imageID -}}
70+
{{- end -}}
71+
{{- end -}}
72+
{{- end -}}
73+
{{- end -}}'
74+
75+
kubectl get pods --all-namespaces -o go-template="$template" | while read -r namespace pod image image_id; do
76+
has_domain "$image" || echo "$namespace $pod $image $image_id"
77+
done

pkg/cmd/server/api/install/install.go

+1
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ import (
1717
_ "github.com/openshift/origin/pkg/build/controller/build/defaults/api/install"
1818
_ "github.com/openshift/origin/pkg/build/controller/build/overrides/api/install"
1919
_ "github.com/openshift/origin/pkg/image/admission/imagepolicy/api/install"
20+
_ "github.com/openshift/origin/pkg/image/admission/imagequalify/api/install"
2021
_ "github.com/openshift/origin/pkg/ingress/admission/api/install"
2122
_ "github.com/openshift/origin/pkg/project/admission/requestlimit/api/install"
2223
_ "github.com/openshift/origin/pkg/quota/admission/clusterresourceoverride/api/install"

pkg/cmd/server/api/latest/latest.go

+1
Original file line numberDiff line numberDiff line change
@@ -26,4 +26,5 @@ var Codec = serializer.NewCodecFactory(configapi.Scheme).LegacyCodec(
2626
schema.GroupVersion{Group: "", Version: "v1"},
2727
schema.GroupVersion{Group: "apiserver.k8s.io", Version: "v1alpha1"},
2828
schema.GroupVersion{Group: "audit.k8s.io", Version: "v1alpha1"},
29+
schema.GroupVersion{Group: "admission.config.openshift.io", Version: "v1"},
2930
)

pkg/cmd/server/origin/admission/chain_builder.go

+3
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ import (
2121
configapilatest "github.com/openshift/origin/pkg/cmd/server/api/latest"
2222
imageadmission "github.com/openshift/origin/pkg/image/admission"
2323
imagepolicy "github.com/openshift/origin/pkg/image/admission/imagepolicy/api"
24+
imagequalify "github.com/openshift/origin/pkg/image/admission/imagequalify/api"
2425
ingressadmission "github.com/openshift/origin/pkg/ingress/admission"
2526
overrideapi "github.com/openshift/origin/pkg/quota/admission/clusterresourceoverride/api"
2627
sccadmission "github.com/openshift/origin/pkg/security/admission"
@@ -56,6 +57,7 @@ var (
5657
serviceadmit.ExternalIPPluginName,
5758
serviceadmit.RestrictedEndpointsPluginName,
5859
imagepolicy.PluginName,
60+
imagequalify.PluginName,
5961
"ImagePolicyWebhook",
6062
"PodPreset",
6163
"LimitRanger",
@@ -102,6 +104,7 @@ var (
102104
serviceadmit.ExternalIPPluginName,
103105
serviceadmit.RestrictedEndpointsPluginName,
104106
imagepolicy.PluginName,
107+
imagequalify.PluginName,
105108
"ImagePolicyWebhook",
106109
"PodPreset",
107110
"LimitRanger",

pkg/cmd/server/origin/admission/register.go

+4
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ import (
1717
buildstrategyrestrictions "github.com/openshift/origin/pkg/build/admission/strategyrestrictions"
1818
imageadmission "github.com/openshift/origin/pkg/image/admission"
1919
imagepolicy "github.com/openshift/origin/pkg/image/admission/imagepolicy"
20+
imagequalify "github.com/openshift/origin/pkg/image/admission/imagequalify"
2021
ingressadmission "github.com/openshift/origin/pkg/ingress/admission"
2122
projectlifecycle "github.com/openshift/origin/pkg/project/admission/lifecycle"
2223
projectnodeenv "github.com/openshift/origin/pkg/project/admission/nodeenv"
@@ -32,6 +33,7 @@ import (
3233
storageclassdefaultadmission "k8s.io/kubernetes/plugin/pkg/admission/storageclass/setdefault"
3334

3435
imagepolicyapi "github.com/openshift/origin/pkg/image/admission/imagepolicy/api"
36+
imagequalifyapi "github.com/openshift/origin/pkg/image/admission/imagequalify/api"
3537
overrideapi "github.com/openshift/origin/pkg/quota/admission/clusterresourceoverride/api"
3638
"k8s.io/apiserver/pkg/admission/plugin/namespace/lifecycle"
3739

@@ -55,6 +57,7 @@ func RegisterAllAdmissionPlugins(plugins *admission.Plugins) {
5557
buildstrategyrestrictions.Register(plugins)
5658
imageadmission.Register(plugins)
5759
imagepolicy.Register(plugins)
60+
imagequalify.Register(plugins)
5861
ingressadmission.Register(plugins)
5962
projectlifecycle.Register(plugins)
6063
projectnodeenv.Register(plugins)
@@ -103,6 +106,7 @@ var (
103106
"PodNodeConstraints",
104107
overrideapi.PluginName,
105108
imagepolicyapi.PluginName,
109+
imagequalifyapi.PluginName,
106110
"AlwaysPullImages",
107111
"ImagePolicyWebhook",
108112
"openshift.io/RestrictSubjectBindings",
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,186 @@
1+
package imagequalify
2+
3+
import (
4+
"fmt"
5+
"io"
6+
7+
apierrs "k8s.io/apimachinery/pkg/api/errors"
8+
"k8s.io/apiserver/pkg/admission"
9+
kapi "k8s.io/kubernetes/pkg/apis/core"
10+
11+
"github.com/golang/glog"
12+
"github.com/openshift/origin/pkg/image/admission/imagequalify/api"
13+
)
14+
15+
var _ admission.MutationInterface = &Plugin{}
16+
var _ admission.ValidationInterface = &Plugin{}
17+
18+
// Plugin is an implementation of admission.Interface.
19+
type Plugin struct {
20+
*admission.Handler
21+
22+
rules []api.ImageQualifyRule
23+
}
24+
25+
// Register creates and registers the new plugin but only if there is
26+
// non-empty and a valid configuration.
27+
func Register(plugins *admission.Plugins) {
28+
plugins.Register(api.PluginName, func(config io.Reader) (admission.Interface, error) {
29+
pluginConfig, err := readConfig(config)
30+
if err != nil {
31+
return nil, err
32+
}
33+
if pluginConfig == nil {
34+
glog.Infof("Admission plugin %q is not configured so it will be disabled.", api.PluginName)
35+
return nil, nil
36+
}
37+
return NewPlugin(pluginConfig.Rules), nil
38+
})
39+
}
40+
41+
func isSubresourceRequest(attributes admission.Attributes) bool {
42+
return len(attributes.GetSubresource()) > 0
43+
}
44+
45+
func isPodsRequest(attributes admission.Attributes) bool {
46+
return attributes.GetResource().GroupResource() == kapi.Resource("pods")
47+
}
48+
49+
func shouldIgnore(attributes admission.Attributes) bool {
50+
switch {
51+
case isSubresourceRequest(attributes):
52+
return true
53+
case !isPodsRequest(attributes):
54+
return true
55+
default:
56+
return false
57+
}
58+
}
59+
60+
func qualifyImages(images []string, rules []api.ImageQualifyRule) ([]string, error) {
61+
qnames := make([]string, len(images))
62+
63+
for i := range images {
64+
qname, err := qualifyImage(images[i], rules)
65+
if err != nil {
66+
return nil, apierrs.NewBadRequest(fmt.Sprintf("invalid image %q: %s", images[i], err))
67+
}
68+
qnames[i] = qname
69+
}
70+
71+
return qnames, nil
72+
}
73+
74+
func containerImages(containers []kapi.Container) []string {
75+
names := make([]string, len(containers))
76+
77+
for i := range containers {
78+
names[i] = containers[i].Image
79+
}
80+
81+
return names
82+
}
83+
84+
func qualifyContainers(containers []kapi.Container, rules []api.ImageQualifyRule, action func(index int, qname string) error) error {
85+
qnames, err := qualifyImages(containerImages(containers), rules)
86+
87+
if err != nil {
88+
return err
89+
}
90+
91+
for i := range containers {
92+
if err := action(i, qnames[i]); err != nil {
93+
return err
94+
}
95+
}
96+
97+
return nil
98+
}
99+
100+
// Admit makes an admission decision based on the request attributes.
101+
// If the attributes are valid then any container image names that are
102+
// unqualified (i.e., have no domain component) will be qualified with
103+
// domain according to the set of rules. If no rule matches then the
104+
// name can still remain unqualified.
105+
func (p *Plugin) Admit(attributes admission.Attributes) error {
106+
// Ignore all calls to subresources or resources other than pods.
107+
if shouldIgnore(attributes) {
108+
return nil
109+
}
110+
111+
pod, ok := attributes.GetObject().(*kapi.Pod)
112+
if !ok {
113+
return apierrs.NewBadRequest("Resource was marked with kind Pod but was unable to be converted")
114+
}
115+
116+
if err := qualifyContainers(pod.Spec.InitContainers, p.rules, func(i int, qname string) error {
117+
if pod.Spec.InitContainers[i].Image != qname {
118+
glog.V(4).Infof("qualifying image %q as %q", pod.Spec.InitContainers[i].Image, qname)
119+
pod.Spec.InitContainers[i].Image = qname
120+
}
121+
return nil
122+
}); err != nil {
123+
return err
124+
}
125+
126+
if err := qualifyContainers(pod.Spec.Containers, p.rules, func(i int, qname string) error {
127+
if pod.Spec.Containers[i].Image != qname {
128+
glog.V(4).Infof("qualifying image %q as %q", pod.Spec.Containers[i].Image, qname)
129+
pod.Spec.Containers[i].Image = qname
130+
}
131+
return nil
132+
}); err != nil {
133+
return err
134+
}
135+
136+
return nil
137+
}
138+
139+
// Validate makes an admission decision based on the request
140+
// attributes. It checks that image names that got qualified in
141+
// Admit() remain qualified, returning an error if this condition no
142+
// longer holds true.
143+
func (p *Plugin) Validate(attributes admission.Attributes) error {
144+
// Ignore all calls to subresources or resources other than pods.
145+
if shouldIgnore(attributes) {
146+
return nil
147+
}
148+
149+
pod, ok := attributes.GetObject().(*kapi.Pod)
150+
if !ok {
151+
return apierrs.NewBadRequest("Resource was marked with kind Pod but was unable to be converted")
152+
}
153+
154+
// Re-qualify - anything that has become unqualified has been
155+
// changed post Admit() and is now in error.
156+
157+
if err := qualifyContainers(pod.Spec.InitContainers, p.rules, func(i int, qname string) error {
158+
if pod.Spec.InitContainers[i].Image != qname {
159+
msg := fmt.Sprintf("image %q should be qualified as %q", pod.Spec.InitContainers[i].Image, qname)
160+
return apierrs.NewBadRequest(msg)
161+
}
162+
return nil
163+
}); err != nil {
164+
return err
165+
}
166+
167+
if err := qualifyContainers(pod.Spec.Containers, p.rules, func(i int, qname string) error {
168+
if pod.Spec.Containers[i].Image != qname {
169+
msg := fmt.Sprintf("image %q should be qualified as %q", pod.Spec.Containers[i].Image, qname)
170+
return apierrs.NewBadRequest(msg)
171+
}
172+
return nil
173+
}); err != nil {
174+
return err
175+
}
176+
177+
return nil
178+
}
179+
180+
// NewPlugin creates a new admission handler.
181+
func NewPlugin(rules []api.ImageQualifyRule) *Plugin {
182+
return &Plugin{
183+
Handler: admission.NewHandler(admission.Create, admission.Update),
184+
rules: rules,
185+
}
186+
}

0 commit comments

Comments
 (0)