Skip to content

Commit d2de881

Browse files
Merge pull request #16128 from soltysh/advanced_audit
Automatic merge from submit-queue (batch tested with PRs 16480, 16486, 16270, 16128, 16489) Advanced audit as tech preview in origin @sttts this enables the advance auditing features in origin, ptal @openshift/api-review for config changes
2 parents de8d763 + e8e6700 commit d2de881

File tree

26 files changed

+1130
-92
lines changed

26 files changed

+1130
-92
lines changed

contrib/completions/bash/openshift

+4
Original file line numberDiff line numberDiff line change
@@ -32067,6 +32067,8 @@ _openshift_start_kubernetes_apiserver()
3206732067
local_nonpersistent_flags+=("--anonymous-auth")
3206832068
flags+=("--apiserver-count=")
3206932069
local_nonpersistent_flags+=("--apiserver-count=")
32070+
flags+=("--audit-log-format=")
32071+
local_nonpersistent_flags+=("--audit-log-format=")
3207032072
flags+=("--audit-log-maxage=")
3207132073
local_nonpersistent_flags+=("--audit-log-maxage=")
3207232074
flags+=("--audit-log-maxbackup=")
@@ -33079,6 +33081,8 @@ _openshift_start_template-service-broker()
3307933081
flags_with_completion=()
3308033082
flags_completion=()
3308133083

33084+
flags+=("--audit-log-format=")
33085+
local_nonpersistent_flags+=("--audit-log-format=")
3308233086
flags+=("--audit-log-maxage=")
3308333087
local_nonpersistent_flags+=("--audit-log-maxage=")
3308433088
flags+=("--audit-log-maxbackup=")

contrib/completions/zsh/openshift

+4
Original file line numberDiff line numberDiff line change
@@ -32216,6 +32216,8 @@ _openshift_start_kubernetes_apiserver()
3221632216
local_nonpersistent_flags+=("--anonymous-auth")
3221732217
flags+=("--apiserver-count=")
3221832218
local_nonpersistent_flags+=("--apiserver-count=")
32219+
flags+=("--audit-log-format=")
32220+
local_nonpersistent_flags+=("--audit-log-format=")
3221932221
flags+=("--audit-log-maxage=")
3222032222
local_nonpersistent_flags+=("--audit-log-maxage=")
3222132223
flags+=("--audit-log-maxbackup=")
@@ -33228,6 +33230,8 @@ _openshift_start_template-service-broker()
3322833230
flags_with_completion=()
3322933231
flags_completion=()
3323033232

33233+
flags+=("--audit-log-format=")
33234+
local_nonpersistent_flags+=("--audit-log-format=")
3323133235
flags+=("--audit-log-maxage=")
3323233236
local_nonpersistent_flags+=("--audit-log-maxage=")
3323333237
flags+=("--audit-log-maxbackup=")

pkg/cmd/server/api/helpers.go

+1
Original file line numberDiff line numberDiff line change
@@ -271,6 +271,7 @@ func GetMasterFileReferences(config *MasterConfig) []*string {
271271
}
272272

273273
refs = append(refs, &config.AuditConfig.AuditFilePath)
274+
refs = append(refs, &config.AuditConfig.PolicyFile)
274275

275276
return refs
276277
}

pkg/cmd/server/api/install/install.go

+7-29
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,10 @@ package install
33
import (
44
"fmt"
55

6-
"github.com/golang/glog"
7-
86
"k8s.io/apimachinery/pkg/api/meta"
97
"k8s.io/apimachinery/pkg/runtime/schema"
8+
"k8s.io/apiserver/pkg/apis/audit"
9+
auditv1alpha1 "k8s.io/apiserver/pkg/apis/audit/v1alpha1"
1010

1111
configapi "github.com/openshift/origin/pkg/cmd/server/api"
1212
configapiv1 "github.com/openshift/origin/pkg/cmd/server/api/v1"
@@ -27,34 +27,12 @@ var accessor = meta.NewAccessor()
2727
var availableVersions = []schema.GroupVersion{configapiv1.SchemeGroupVersion}
2828

2929
func init() {
30-
if err := enableVersions(availableVersions); err != nil {
31-
panic(err)
32-
}
33-
}
34-
35-
// TODO: enableVersions should be centralized rather than spread in each API
36-
// group.
37-
// We can combine registered.RegisterVersions, registered.EnableVersions and
38-
// registered.RegisterGroup once we have moved enableVersions there.
39-
func enableVersions(externalVersions []schema.GroupVersion) error {
40-
addVersionsToScheme(externalVersions...)
41-
return nil
42-
}
43-
44-
func addVersionsToScheme(externalVersions ...schema.GroupVersion) {
45-
// add the internal version to Scheme
4630
configapi.AddToScheme(configapi.Scheme)
47-
// add the enabled external versions to Scheme
48-
for _, v := range externalVersions {
49-
switch v {
50-
case configapiv1.SchemeGroupVersion:
51-
configapiv1.AddToScheme(configapi.Scheme)
52-
53-
default:
54-
glog.Errorf("Version %s is not known, so it will not be added to the Scheme.", v)
55-
continue
56-
}
57-
}
31+
configapiv1.AddToScheme(configapi.Scheme)
32+
// we additionally need to enable audit versions, since we embed the audit
33+
// policy file inside master-config.yaml
34+
audit.AddToScheme(configapi.Scheme)
35+
auditv1alpha1.AddToScheme(configapi.Scheme)
5836
}
5937

6038
func interfacesFor(version schema.GroupVersion) (*meta.VersionInterfaces, error) {

pkg/cmd/server/api/types.go

+35-1
Original file line numberDiff line numberDiff line change
@@ -461,10 +461,29 @@ type AggregatorConfig struct {
461461
ProxyClientInfo CertInfo
462462
}
463463

464+
type LogFormatType string
465+
466+
type WebHookModeType string
467+
468+
const (
469+
// LogFormatLegacy saves event in 1-line text format.
470+
LogFormatLegacy LogFormatType = "legacy"
471+
// LogFormatJson saves event in structured json format.
472+
LogFormatJson LogFormatType = "json"
473+
474+
// WebHookModeBatch indicates that the webhook should buffer audit events
475+
// internally, sending batch updates either once a certain number of
476+
// events have been received or a certain amount of time has passed.
477+
WebHookModeBatch WebHookModeType = "batch"
478+
// WebHookModeBlocking causes the webhook to block on every attempt to process
479+
// a set of events. This causes requests to the API server to wait for a
480+
// round trip to the external audit service before sending a response.
481+
WebHookModeBlocking WebHookModeType = "blocking"
482+
)
483+
464484
// AuditConfig holds configuration for the audit capabilities
465485
type AuditConfig struct {
466486
// If this flag is set, audit log will be printed in the logs.
467-
// The logs contains, method, user and a requested URL.
468487
Enabled bool
469488
// All requests coming to the apiserver will be logged to this file.
470489
AuditFilePath string
@@ -474,6 +493,21 @@ type AuditConfig struct {
474493
MaximumRetainedFiles int
475494
// Maximum size in megabytes of the log file before it gets rotated. Defaults to 100MB.
476495
MaximumFileSizeMegabytes int
496+
497+
// PolicyFile is a path to the file that defines the audit policy configuration.
498+
PolicyFile string
499+
// PolicyConfiguration is an embedded policy configuration object to be used
500+
// as the audit policy configuration. If present, it will be used instead of
501+
// the path to the policy file.
502+
PolicyConfiguration runtime.Object
503+
504+
// Format of saved audits (legacy or json).
505+
LogFormat LogFormatType
506+
507+
// Path to a .kubeconfig formatted file that defines the audit webhook configuration.
508+
WebHookKubeConfig string
509+
// Strategy for sending audit events (block or batch).
510+
WebHookMode WebHookModeType
477511
}
478512

479513
// JenkinsPipelineConfig holds configuration for the Jenkins pipeline strategy

pkg/cmd/server/api/v1/conversions.go

+4
Original file line numberDiff line numberDiff line change
@@ -405,6 +405,7 @@ func (c *MasterConfig) DecodeNestedObjects(d runtime.Decoder) error {
405405
apihelpers.DecodeNestedRawExtensionOrUnknown(d, &c.OAuthConfig.IdentityProviders[i].Provider)
406406
}
407407
}
408+
apihelpers.DecodeNestedRawExtensionOrUnknown(d, &c.AuditConfig.PolicyConfiguration)
408409
return nil
409410
}
410411

@@ -434,5 +435,8 @@ func (c *MasterConfig) EncodeNestedObjects(e runtime.Encoder) error {
434435
}
435436
}
436437
}
438+
if err := apihelpers.EncodeNestedRawExtension(e, &c.AuditConfig.PolicyConfiguration); err != nil {
439+
return err
440+
}
437441
return nil
438442
}

pkg/cmd/server/api/v1/swagger_doc.go

+5
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,11 @@ var map_AuditConfig = map[string]string{
9090
"maximumFileRetentionDays": "Maximum number of days to retain old log files based on the timestamp encoded in their filename.",
9191
"maximumRetainedFiles": "Maximum number of old log files to retain.",
9292
"maximumFileSizeMegabytes": "Maximum size in megabytes of the log file before it gets rotated. Defaults to 100MB.",
93+
"policyFile": "PolicyFile is a path to the file that defines the audit policy configuration.",
94+
"policyConfiguration": "PolicyConfiguration is an embedded policy configuration object to be used as the audit policy configuration. If present, it will be used instead of the path to the policy file.",
95+
"logFormat": "Format of saved audits (legacy or json).",
96+
"webHookKubeConfig": "Path to a .kubeconfig formatted file that defines the audit webhook configuration.",
97+
"webHookMode": "Strategy for sending audit events (block or batch).",
9398
}
9499

95100
func (AuditConfig) SwaggerDoc() map[string]string {

pkg/cmd/server/api/v1/types.go

+35
Original file line numberDiff line numberDiff line change
@@ -318,6 +318,26 @@ type AggregatorConfig struct {
318318
ProxyClientInfo CertInfo `json:"proxyClientInfo"`
319319
}
320320

321+
type LogFormatType string
322+
323+
type WebHookModeType string
324+
325+
const (
326+
// LogFormatLegacy saves event in 1-line text format.
327+
LogFormatLegacy LogFormatType = "legacy"
328+
// LogFormatJson saves event in structured json format.
329+
LogFormatJson LogFormatType = "json"
330+
331+
// WebHookModeBatch indicates that the webhook should buffer audit events
332+
// internally, sending batch updates either once a certain number of
333+
// events have been received or a certain amount of time has passed.
334+
WebHookModeBatch WebHookModeType = "batch"
335+
// WebHookModeBlocking causes the webhook to block on every attempt to process
336+
// a set of events. This causes requests to the API server to wait for a
337+
// round trip to the external audit service before sending a response.
338+
WebHookModeBlocking WebHookModeType = "blocking"
339+
)
340+
321341
// AuditConfig holds configuration for the audit capabilities
322342
type AuditConfig struct {
323343
// If this flag is set, audit log will be printed in the logs.
@@ -331,6 +351,21 @@ type AuditConfig struct {
331351
MaximumRetainedFiles int `json:"maximumRetainedFiles"`
332352
// Maximum size in megabytes of the log file before it gets rotated. Defaults to 100MB.
333353
MaximumFileSizeMegabytes int `json:"maximumFileSizeMegabytes"`
354+
355+
// PolicyFile is a path to the file that defines the audit policy configuration.
356+
PolicyFile string `json:"policyFile"`
357+
// PolicyConfiguration is an embedded policy configuration object to be used
358+
// as the audit policy configuration. If present, it will be used instead of
359+
// the path to the policy file.
360+
PolicyConfiguration runtime.RawExtension `json:"policyConfiguration"`
361+
362+
// Format of saved audits (legacy or json).
363+
LogFormat LogFormatType `json:"logFormat"`
364+
365+
// Path to a .kubeconfig formatted file that defines the audit webhook configuration.
366+
WebHookKubeConfig string `json:"webHookKubeConfig"`
367+
// Strategy for sending audit events (block or batch).
368+
WebHookMode WebHookModeType `json:"webHookMode"`
334369
}
335370

336371
// JenkinsPipelineConfig holds configuration for the Jenkins pipeline strategy

pkg/cmd/server/api/v1/types_test.go

+5
Original file line numberDiff line numberDiff line change
@@ -117,9 +117,14 @@ assetConfig:
117117
auditConfig:
118118
auditFilePath: ""
119119
enabled: false
120+
logFormat: ""
120121
maximumFileRetentionDays: 0
121122
maximumFileSizeMegabytes: 0
122123
maximumRetainedFiles: 0
124+
policyConfiguration: null
125+
policyFile: ""
126+
webHookKubeConfig: ""
127+
webHookMode: ""
123128
authConfig:
124129
requestHeader: null
125130
controllerConfig:

pkg/cmd/server/api/validation/master.go

+62
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,10 @@ import (
1414
"k8s.io/apimachinery/pkg/util/sets"
1515
kuval "k8s.io/apimachinery/pkg/util/validation"
1616
"k8s.io/apimachinery/pkg/util/validation/field"
17+
auditinternal "k8s.io/apiserver/pkg/apis/audit"
18+
auditvalidation "k8s.io/apiserver/pkg/apis/audit/validation"
19+
auditpolicy "k8s.io/apiserver/pkg/audit/policy"
20+
"k8s.io/client-go/tools/clientcmd"
1721
apiserveroptions "k8s.io/kubernetes/cmd/kube-apiserver/app/options"
1822
kcmoptions "k8s.io/kubernetes/cmd/kube-controller-manager/app/options"
1923
kvalidation "k8s.io/kubernetes/pkg/api/validation"
@@ -238,6 +242,9 @@ func ValidateAggregatorConfig(config api.AggregatorConfig, fldPath *field.Path)
238242

239243
func ValidateAuditConfig(config api.AuditConfig, fldPath *field.Path) ValidationResults {
240244
validationResults := ValidationResults{}
245+
if !config.Enabled {
246+
return validationResults
247+
}
241248

242249
if len(config.AuditFilePath) == 0 {
243250
// for backwards compatibility reasons we can't error this out
@@ -253,6 +260,61 @@ func ValidateAuditConfig(config api.AuditConfig, fldPath *field.Path) Validation
253260
validationResults.AddErrors(field.Invalid(fldPath.Child("maximumFileSizeMegabytes"), config.MaximumFileSizeMegabytes, "must be greater than or equal to 0"))
254261
}
255262

263+
// setting policy file will turn the advanced auditing on
264+
if config.PolicyConfiguration != nil && len(config.PolicyFile) > 0 {
265+
validationResults.AddErrors(field.Forbidden(fldPath.Child("policyFile"), "both policyFile and policyConfiguration cannot be specified"))
266+
}
267+
if config.PolicyConfiguration != nil || len(config.PolicyFile) > 0 {
268+
if config.PolicyConfiguration == nil {
269+
policy, err := auditpolicy.LoadPolicyFromFile(config.PolicyFile)
270+
if err != nil {
271+
validationResults.AddErrors(field.Invalid(fldPath.Child("policyFile"), config.PolicyFile, err.Error()))
272+
}
273+
if policy == nil || len(policy.Rules) == 0 {
274+
validationResults.AddErrors(field.Invalid(fldPath.Child("policyFile"), config.PolicyFile, "a policy file with 0 policies is not valid"))
275+
}
276+
} else {
277+
policyConfiguration, ok := config.PolicyConfiguration.(*auditinternal.Policy)
278+
if !ok {
279+
validationResults.AddErrors(field.Invalid(fldPath.Child("policyConfiguration"), config.PolicyConfiguration, "must be of type audit/v1alpha1.Policy"))
280+
} else {
281+
if err := auditvalidation.ValidatePolicy(policyConfiguration); err != nil {
282+
validationResults.AddErrors(field.Invalid(fldPath.Child("policyConfiguration"), config.PolicyConfiguration, err.ToAggregate().Error()))
283+
}
284+
if len(policyConfiguration.Rules) == 0 {
285+
validationResults.AddErrors(field.Invalid(fldPath.Child("policyConfiguration"), config.PolicyFile, "a policy configuration with 0 policies is not valid"))
286+
}
287+
}
288+
}
289+
290+
if len(config.AuditFilePath) == 0 {
291+
validationResults.AddErrors(field.Required(fldPath.Child("auditFilePath"), "advanced audit requires a separate log file"))
292+
}
293+
switch config.LogFormat {
294+
case api.LogFormatLegacy, api.LogFormatJson:
295+
// ok
296+
default:
297+
validationResults.AddErrors(field.NotSupported(fldPath.Child("logFormat"), config.LogFormat, []string{string(api.LogFormatLegacy), string(api.LogFormatJson)}))
298+
}
299+
300+
if len(config.WebHookKubeConfig) > 0 {
301+
switch config.WebHookMode {
302+
case api.WebHookModeBatch, api.WebHookModeBlocking:
303+
// ok
304+
default:
305+
validationResults.AddErrors(field.NotSupported(fldPath.Child("webHookMode"), config.WebHookMode, []string{string(api.WebHookModeBatch), string(api.WebHookModeBlocking)}))
306+
}
307+
loadingRules := clientcmd.NewDefaultClientConfigLoadingRules()
308+
loadingRules.ExplicitPath = config.WebHookKubeConfig
309+
loader := clientcmd.NewNonInteractiveDeferredLoadingClientConfig(loadingRules, &clientcmd.ConfigOverrides{})
310+
if _, err := loader.ClientConfig(); err != nil {
311+
validationResults.AddErrors(field.Invalid(fldPath.Child("webHookKubeConfig"), config.WebHookKubeConfig, err.Error()))
312+
}
313+
} else if len(config.WebHookMode) > 0 {
314+
validationResults.AddErrors(field.Required(fldPath.Child("webHookKubeConfig"), "must be specified when webHookMode is set"))
315+
}
316+
}
317+
256318
return validationResults
257319
}
258320

pkg/cmd/server/kubernetes/master/master_config.go

+30-3
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ import (
2929
"k8s.io/apimachinery/pkg/util/sets"
3030
"k8s.io/apiserver/pkg/admission"
3131
auditinternal "k8s.io/apiserver/pkg/apis/audit"
32+
"k8s.io/apiserver/pkg/audit"
3233
auditpolicy "k8s.io/apiserver/pkg/audit/policy"
3334
"k8s.io/apiserver/pkg/authentication/authenticator"
3435
"k8s.io/apiserver/pkg/authorization/authorizer"
@@ -45,6 +46,7 @@ import (
4546
storagefactory "k8s.io/apiserver/pkg/storage/storagebackend/factory"
4647
utilflag "k8s.io/apiserver/pkg/util/flag"
4748
auditlog "k8s.io/apiserver/plugin/pkg/audit/log"
49+
auditwebhook "k8s.io/apiserver/plugin/pkg/audit/webhook"
4850
kapiserveroptions "k8s.io/kubernetes/cmd/kube-apiserver/app/options"
4951
cmapp "k8s.io/kubernetes/cmd/kube-controller-manager/app/options"
5052
kapi "k8s.io/kubernetes/pkg/api"
@@ -177,12 +179,11 @@ func BuildKubeAPIserverOptions(masterConfig configapi.MasterConfig) (*kapiserver
177179
args["feature-gates"] = []string{existing[0] + ",AdvancedAuditing=true"}
178180
} else {
179181
args["feature-gates"] = []string{"AdvancedAuditing=true"}
180-
181182
}
182183
}
183184
// TODO: this should be done in config validation (along with the above) so we can provide
184185
// proper errors
185-
if err := cmdflags.Resolve(masterConfig.KubernetesMasterConfig.APIServerArguments, server.AddFlags); len(err) > 0 {
186+
if err := cmdflags.Resolve(args, server.AddFlags); len(err) > 0 {
186187
return nil, kerrors.NewAggregate(err)
187188
}
188189

@@ -533,12 +534,38 @@ func buildKubeApiserverConfig(
533534
// backwards compatible writer to regular log
534535
writer = cmdutil.NewGLogWriterV(0)
535536
}
536-
genericConfig.AuditBackend = auditlog.NewBackend(writer)
537+
genericConfig.AuditBackend = auditlog.NewBackend(writer, auditlog.FormatLegacy)
537538
genericConfig.AuditPolicyChecker = auditpolicy.NewChecker(&auditinternal.Policy{
538539
// This is for backwards compatibility maintaining the old visibility, ie. just
539540
// raw overview of the requests comming in.
540541
Rules: []auditinternal.PolicyRule{{Level: auditinternal.LevelMetadata}},
541542
})
543+
544+
// when a policy file is defined we enable the advanced auditing
545+
if masterConfig.AuditConfig.PolicyConfiguration != nil || len(masterConfig.AuditConfig.PolicyFile) > 0 {
546+
// policy configuration
547+
if masterConfig.AuditConfig.PolicyConfiguration == nil {
548+
p, _ := auditpolicy.LoadPolicyFromFile(masterConfig.AuditConfig.PolicyFile)
549+
genericConfig.AuditPolicyChecker = auditpolicy.NewChecker(p)
550+
} else if len(masterConfig.AuditConfig.PolicyFile) > 0 {
551+
p := masterConfig.AuditConfig.PolicyConfiguration.(*auditinternal.Policy)
552+
genericConfig.AuditPolicyChecker = auditpolicy.NewChecker(p)
553+
}
554+
555+
// log configuration, only when file path was provided
556+
if len(masterConfig.AuditConfig.AuditFilePath) > 0 {
557+
genericConfig.AuditBackend = auditlog.NewBackend(writer, string(masterConfig.AuditConfig.LogFormat))
558+
}
559+
560+
// webhook configuration, only when config file was provided
561+
if len(masterConfig.AuditConfig.WebHookKubeConfig) > 0 {
562+
webhook, err := auditwebhook.NewBackend(masterConfig.AuditConfig.WebHookKubeConfig, string(masterConfig.AuditConfig.WebHookMode))
563+
if err != nil {
564+
glog.Fatalf("Audit webhook initialization failed: %v", err)
565+
}
566+
genericConfig.AuditBackend = audit.Union(genericConfig.AuditBackend, webhook)
567+
}
568+
}
542569
}
543570

544571
kubeApiserverConfig := &master.Config{

0 commit comments

Comments
 (0)