@@ -14,12 +14,14 @@ import (
14
14
15
15
apiextensionsinformers "k8s.io/apiextensions-apiserver/pkg/client/informers/internalversion"
16
16
auditinternal "k8s.io/apiserver/pkg/apis/audit"
17
+ "k8s.io/apiserver/pkg/audit"
17
18
auditpolicy "k8s.io/apiserver/pkg/audit/policy"
18
19
apifilters "k8s.io/apiserver/pkg/endpoints/filters"
19
20
apirequest "k8s.io/apiserver/pkg/endpoints/request"
20
21
apiserver "k8s.io/apiserver/pkg/server"
21
22
apiserverfilters "k8s.io/apiserver/pkg/server/filters"
22
23
auditlog "k8s.io/apiserver/plugin/pkg/audit/log"
24
+ auditwebhook "k8s.io/apiserver/plugin/pkg/audit/webhook"
23
25
aggregatorapiserver "k8s.io/kube-aggregator/pkg/apiserver"
24
26
kubeapiserver "k8s.io/kubernetes/pkg/master"
25
27
kcorestorage "k8s.io/kubernetes/pkg/registry/core/rest"
@@ -291,24 +293,8 @@ func (c *MasterConfig) buildHandlerChain() (func(apiHandler http.Handler, kc *ap
291
293
handler = serverhandlers .ImpersonationFilter (handler , c .Authorizer , cache .NewGroupCache (c .UserInformers .User ().InternalVersion ().Groups ()), genericConfig .RequestContextMapper )
292
294
// audit handler must comes before the impersonationFilter to read the original user
293
295
if c .Options .AuditConfig .Enabled {
294
- var writer io.Writer
295
- if len (c .Options .AuditConfig .AuditFilePath ) > 0 {
296
- writer = & lumberjack.Logger {
297
- Filename : c .Options .AuditConfig .AuditFilePath ,
298
- MaxAge : c .Options .AuditConfig .MaximumFileRetentionDays ,
299
- MaxBackups : c .Options .AuditConfig .MaximumRetainedFiles ,
300
- MaxSize : c .Options .AuditConfig .MaximumFileSizeMegabytes ,
301
- }
302
- } else {
303
- // backwards compatible writer to regular log
304
- writer = cmdutil .NewGLogWriterV (0 )
305
- }
306
- c .AuditBackend = auditlog .NewBackend (writer )
307
- auditPolicyChecker := auditpolicy .NewChecker (& auditinternal.Policy {
308
- // This is for backwards compatibility maintaining the old visibility, ie. just
309
- // raw overview of the requests comming in.
310
- Rules : []auditinternal.PolicyRule {{Level : auditinternal .LevelMetadata }},
311
- })
296
+ var auditPolicyChecker auditpolicy.Checker
297
+ c .AuditBackend , auditPolicyChecker = c .prepareAuditAssets ()
312
298
handler = apifilters .WithAudit (handler , genericConfig .RequestContextMapper , c .AuditBackend , auditPolicyChecker , genericConfig .LongRunningFunc )
313
299
}
314
300
handler = apifilters .WithAuthentication (handler , c .RequestContextMapper , c .Authenticator , apifilters .Unauthorized (false ))
@@ -340,6 +326,50 @@ func (c *MasterConfig) buildHandlerChain() (func(apiHandler http.Handler, kc *ap
340
326
nil
341
327
}
342
328
329
+ func (c * MasterConfig ) prepareAuditAssets () (audit.Backend , auditpolicy.Checker ) {
330
+ var writer io.Writer
331
+ if len (c .Options .AuditConfig .AuditFilePath ) > 0 {
332
+ writer = & lumberjack.Logger {
333
+ Filename : c .Options .AuditConfig .AuditFilePath ,
334
+ MaxAge : c .Options .AuditConfig .MaximumFileRetentionDays ,
335
+ MaxBackups : c .Options .AuditConfig .MaximumRetainedFiles ,
336
+ MaxSize : c .Options .AuditConfig .MaximumFileSizeMegabytes ,
337
+ }
338
+ } else {
339
+ // backwards compatible writer to regular log
340
+ writer = cmdutil .NewGLogWriterV (0 )
341
+ }
342
+ var backend audit.Backend = auditlog .NewBackend (writer , auditlog .FormatLegacy )
343
+ policyChecker := auditpolicy .NewChecker (& auditinternal.Policy {
344
+ // This is for backwards compatibility maintaining the old visibility, ie. just
345
+ // raw overview of the requests comming in.
346
+ Rules : []auditinternal.PolicyRule {{Level : auditinternal .LevelMetadata }},
347
+ })
348
+
349
+ // when policy file is defined we enable the advanced auditing
350
+ if len (c .Options .AuditConfig .PolicyFile ) > 0 {
351
+ // policy configuration
352
+ p , _ := auditpolicy .LoadPolicyFromFile (c .Options .AuditConfig .PolicyFile )
353
+ policyChecker = auditpolicy .NewChecker (p )
354
+
355
+ // log configuration, only when file path was provided
356
+ if len (c .Options .AuditConfig .AuditFilePath ) > 0 {
357
+ backend = auditlog .NewBackend (writer , c .Options .AuditConfig .LogFormat )
358
+ }
359
+
360
+ // webhook configuration, only when config file was provided
361
+ if len (c .Options .AuditConfig .WebhookConfigFile ) > 0 {
362
+ webhook , err := auditwebhook .NewBackend (c .Options .AuditConfig .WebhookConfigFile , c .Options .AuditConfig .WebhookMode )
363
+ if err != nil {
364
+ glog .Fatalf ("Audit webhook initialization failed: %v" , err )
365
+ }
366
+ backend = audit .Union (backend , webhook )
367
+ }
368
+ }
369
+
370
+ return backend , policyChecker
371
+ }
372
+
343
373
func (c * MasterConfig ) withConsoleRedirection (handler , assetServerHandler http.Handler , assetConfig * configapi.AssetConfig ) http.Handler {
344
374
if assetConfig == nil {
345
375
return handler
0 commit comments