Skip to content

Commit ff179d2

Browse files
Allow objects to request resolution, not just images
A lot of times, you want to be able to reuse a bit of config that works fine elsewhere. By adding the `alpha.image.policy.openshift.io/resolve-names` annotation with value `*` to the object you can request that resolution attempt to match all image references to an image stream tag in the current namespace, regardless of their own policy. This makes it easy to transition to looking up image stream tags by name. Extend `oc set image-lookup` to accept `deploy/foo` and to be able to list and display non image stream resources.
1 parent 16bb97d commit ff179d2

File tree

7 files changed

+303
-27
lines changed

7 files changed

+303
-27
lines changed

pkg/api/meta/meta.go

+54
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ package meta
33
import (
44
"fmt"
55

6+
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
67
"k8s.io/apimachinery/pkg/runtime"
78
"k8s.io/apimachinery/pkg/util/validation/field"
89
kapi "k8s.io/kubernetes/pkg/api"
@@ -42,3 +43,56 @@ func GetImageReferenceMutator(obj runtime.Object) (ImageReferenceMutator, error)
4243
return nil, errNoImageMutator
4344
}
4445
}
46+
47+
type AnnotationAccessor interface {
48+
// Annotations returns a map representing annotations. Not mutable.
49+
Annotations() map[string]string
50+
// SetAnnotations sets representing annotations onto the object.
51+
SetAnnotations(map[string]string)
52+
// TemplateAnnotations returns a map representing annotations on a nested template in the object. Not mutable.
53+
// If no template is present bool will be false.
54+
TemplateAnnotations() (map[string]string, bool)
55+
// SetTemplateAnnotations sets annotations on a nested template in the object.
56+
// If no template is present bool will be false.
57+
SetTemplateAnnotations(map[string]string) bool
58+
}
59+
60+
type annotationsAccessor struct {
61+
object metav1.Object
62+
template metav1.Object
63+
}
64+
65+
func (a annotationsAccessor) Annotations() map[string]string {
66+
return a.object.GetAnnotations()
67+
}
68+
69+
func (a annotationsAccessor) TemplateAnnotations() (map[string]string, bool) {
70+
if a.template == nil {
71+
return nil, false
72+
}
73+
return a.template.GetAnnotations(), true
74+
}
75+
76+
func (a annotationsAccessor) SetAnnotations(annotations map[string]string) {
77+
a.object.SetAnnotations(annotations)
78+
}
79+
80+
func (a annotationsAccessor) SetTemplateAnnotations(annotations map[string]string) bool {
81+
if a.template == nil {
82+
return false
83+
}
84+
a.template.SetAnnotations(annotations)
85+
return true
86+
}
87+
88+
// GetAnnotationAccessor returns an accessor for the provided object or false if the object
89+
// does not support accessing annotations.
90+
func GetAnnotationAccessor(obj runtime.Object) (AnnotationAccessor, bool) {
91+
switch t := obj.(type) {
92+
case metav1.Object:
93+
templateObject, _ := GetTemplateMetaObject(obj)
94+
return annotationsAccessor{object: t, template: templateObject}, true
95+
default:
96+
return nil, false
97+
}
98+
}

pkg/api/meta/pods.go

+63
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ package meta
33
import (
44
"fmt"
55

6+
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
67
"k8s.io/apimachinery/pkg/runtime"
78
"k8s.io/apimachinery/pkg/runtime/schema"
89
"k8s.io/apimachinery/pkg/util/validation/field"
@@ -158,6 +159,68 @@ func GetPodSpecV1(obj runtime.Object) (*kapiv1.PodSpec, *field.Path, error) {
158159
return nil, nil, errNoPodSpec
159160
}
160161

162+
// GetTemplateMetaObject returns a mutable metav1.Object interface for the template
163+
// the object contains, or false if no such object is available.
164+
func GetTemplateMetaObject(obj runtime.Object) (metav1.Object, bool) {
165+
switch r := obj.(type) {
166+
case *kapiv1.PodTemplate:
167+
return &r.Template.ObjectMeta, true
168+
case *kapiv1.ReplicationController:
169+
return &r.Spec.Template.ObjectMeta, true
170+
case *extensionsv1beta1.DaemonSet:
171+
return &r.Spec.Template.ObjectMeta, true
172+
case *extensionsv1beta1.Deployment:
173+
return &r.Spec.Template.ObjectMeta, true
174+
case *extensionsv1beta1.ReplicaSet:
175+
return &r.Spec.Template.ObjectMeta, true
176+
case *batchv1.Job:
177+
return &r.Spec.Template.ObjectMeta, true
178+
case *batchv2alpha1.CronJob:
179+
return &r.Spec.JobTemplate.Spec.Template.ObjectMeta, true
180+
case *batchv2alpha1.JobTemplate:
181+
return &r.Template.Spec.Template.ObjectMeta, true
182+
case *appsv1beta1.StatefulSet:
183+
return &r.Spec.Template.ObjectMeta, true
184+
case *appsv1beta1.Deployment:
185+
return &r.Spec.Template.ObjectMeta, true
186+
case *securityapiv1.PodSecurityPolicySubjectReview:
187+
return &r.Spec.Template.ObjectMeta, true
188+
case *securityapiv1.PodSecurityPolicySelfSubjectReview:
189+
return &r.Spec.Template.ObjectMeta, true
190+
case *securityapiv1.PodSecurityPolicyReview:
191+
return &r.Spec.Template.ObjectMeta, true
192+
case *deployapiv1.DeploymentConfig:
193+
return &r.Spec.Template.ObjectMeta, true
194+
case *kapi.PodTemplate:
195+
return &r.Template.ObjectMeta, true
196+
case *kapi.ReplicationController:
197+
return &r.Spec.Template.ObjectMeta, true
198+
case *extensions.DaemonSet:
199+
return &r.Spec.Template.ObjectMeta, true
200+
case *extensions.Deployment:
201+
return &r.Spec.Template.ObjectMeta, true
202+
case *extensions.ReplicaSet:
203+
return &r.Spec.Template.ObjectMeta, true
204+
case *batch.Job:
205+
return &r.Spec.Template.ObjectMeta, true
206+
case *batch.CronJob:
207+
return &r.Spec.JobTemplate.Spec.Template.ObjectMeta, true
208+
case *batch.JobTemplate:
209+
return &r.Template.Spec.Template.ObjectMeta, true
210+
case *apps.StatefulSet:
211+
return &r.Spec.Template.ObjectMeta, true
212+
case *securityapi.PodSecurityPolicySubjectReview:
213+
return &r.Spec.Template.ObjectMeta, true
214+
case *securityapi.PodSecurityPolicySelfSubjectReview:
215+
return &r.Spec.Template.ObjectMeta, true
216+
case *securityapi.PodSecurityPolicyReview:
217+
return &r.Spec.Template.ObjectMeta, true
218+
case *deployapi.DeploymentConfig:
219+
return &r.Spec.Template.ObjectMeta, true
220+
}
221+
return nil, false
222+
}
223+
161224
type containerMutator struct {
162225
*kapi.Container
163226
}

pkg/cmd/cli/cmd/set/imagelookup.go

+88-10
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ import (
1616
kcmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
1717
"k8s.io/kubernetes/pkg/kubectl/resource"
1818

19+
ometa "github.com/openshift/origin/pkg/api/meta"
1920
"github.com/openshift/origin/pkg/cmd/templates"
2021
"github.com/openshift/origin/pkg/cmd/util/clientcmd"
2122
imageapi "github.com/openshift/origin/pkg/image/api"
@@ -41,7 +42,20 @@ var (
4142
4243
will import the latest MySQL image from the DockerHub, set that image stream to handle the
4344
"mysql" name within the project, and then launch a deployment that points to the image we
44-
imported.`)
45+
imported.
46+
47+
You may also force image lookup for all of the images on a resource with this command. An
48+
annotation is placed on the object which forces an image stream tag lookup in the current
49+
namespace for any image that matches, regardless of whether the image stream has lookup
50+
enabled.
51+
52+
$ %[1]s run mysql --image=myregistry:5000/test/mysql:v1
53+
$ %[1]s tag --source=docker myregistry:5000/test/mysql:v1 mysql:v1
54+
$ %[1]s image-lookup deploy/mysql
55+
56+
Which should trigger a deployment pointing to the imported mysql:v1 tag.
57+
58+
Experimental: This feature is under active development and may change without notice.`)
4559

4660
imageLookupExample = templates.Examples(`
4761
# Print all of the image streams and whether they resolve local names
@@ -50,13 +64,21 @@ var (
5064
# Use local name lookup on image stream mysql
5165
%[1]s image-lookup mysql
5266
67+
# Force a deployment to use local name lookup
68+
%[1]s image-lookup deploy/mysql
69+
70+
# Show the current status of the deployment lookup
71+
%[1]s image-lookup deploy/mysql
72+
5373
# Disable local name lookup on image stream mysql
5474
%[1]s image-lookup mysql --enabled=false
5575
5676
# Set local name lookup on all image streams
5777
%[1]s image-lookup --all`)
5878
)
5979

80+
const alphaResolveNamesAnnotation = "alpha.image.policy.openshift.io/resolve-names"
81+
6082
type ImageLookupOptions struct {
6183
Out io.Writer
6284
Err io.Writer
@@ -77,6 +99,7 @@ type ImageLookupOptions struct {
7799
PrintTable bool
78100
PrintObject func(runtime.Object) error
79101

102+
List bool
80103
Local bool
81104

82105
Enabled bool
@@ -91,7 +114,7 @@ func NewCmdImageLookup(fullName string, f *clientcmd.Factory, out, errOut io.Wri
91114
}
92115
cmd := &cobra.Command{
93116
Use: "image-lookup STREAMNAME [...]",
94-
Short: "Use an image stream when short image names are provided",
117+
Short: "Change how images are resolved when deploying applications",
95118
Long: fmt.Sprintf(imageLookupLong, fullName),
96119
Example: fmt.Sprintf(imageLookupExample, fullName),
97120
Run: func(cmd *cobra.Command, args []string) {
@@ -102,11 +125,12 @@ func NewCmdImageLookup(fullName string, f *clientcmd.Factory, out, errOut io.Wri
102125
}
103126

104127
kcmdutil.AddPrinterFlags(cmd)
105-
cmd.Flags().StringVarP(&options.Selector, "selector", "l", options.Selector, "Selector (label query) to filter on")
106-
cmd.Flags().BoolVar(&options.All, "all", options.All, "If true, select all resources in the namespace of the specified resource types")
128+
cmd.Flags().StringVarP(&options.Selector, "selector", "l", options.Selector, "Selector (label query) to filter on.")
129+
cmd.Flags().BoolVar(&options.All, "all", options.All, "If true, select all resources in the namespace of the specified resource types.")
107130
cmd.Flags().StringSliceVarP(&options.Filenames, "filename", "f", options.Filenames, "Filename, directory, or URL to file to use to edit the resource.")
108131

109-
cmd.Flags().BoolVar(&options.Enabled, "enabled", options.Enabled, "Mark the image stream as resolving tagged images in this namespace")
132+
cmd.Flags().BoolVar(&options.List, "list", false, "Display the current states of the requested resources.")
133+
cmd.Flags().BoolVar(&options.Enabled, "enabled", options.Enabled, "Mark the image stream as resolving tagged images in this namespace.")
110134

111135
cmd.Flags().BoolVar(&options.Local, "local", false, "If true, operations will be performed locally.")
112136
kcmdutil.AddDryRunFlag(cmd)
@@ -137,7 +161,7 @@ func (o *ImageLookupOptions) Complete(f *clientcmd.Factory, cmd *cobra.Command,
137161
}
138162
}
139163

140-
o.PrintTable = len(args) == 0 && !o.All
164+
o.PrintTable = (len(args) == 0 && !o.All) || o.List
141165

142166
mapper, typer := f.Object()
143167
o.Builder = resource.NewBuilder(mapper, typer, resource.ClientMapperFunc(f.ClientForMapping), kapi.Codecs.UniversalDecoder()).
@@ -157,6 +181,11 @@ func (o *ImageLookupOptions) Complete(f *clientcmd.Factory, cmd *cobra.Command,
157181
SelectorParam(o.Selector).
158182
SelectAllParam(true).
159183
ResourceTypes("imagestreams")
184+
case o.List:
185+
o.Builder = o.Builder.
186+
SelectorParam(o.Selector).
187+
SelectAllParam(o.All).
188+
ResourceTypeOrNameArgs(true, args...)
160189
default:
161190
o.Builder = o.Builder.
162191
SelectorParam(o.Selector).
@@ -198,11 +227,43 @@ func (o *ImageLookupOptions) Run() error {
198227
}
199228

200229
patches := CalculatePatches(infos, o.Encoder, func(info *resource.Info) (bool, error) {
201-
info.Object.(*imageapi.ImageStream).Spec.LookupPolicy.Local = o.Enabled
202-
return true, nil
230+
switch t := info.Object.(type) {
231+
case *imageapi.ImageStream:
232+
t.Spec.LookupPolicy.Local = o.Enabled
233+
return true, nil
234+
default:
235+
accessor, ok := ometa.GetAnnotationAccessor(info.Object)
236+
if !ok {
237+
return true, fmt.Errorf("the resource %s/%s does not support altering image lookup", info.Mapping.Resource, info.Name)
238+
}
239+
templateAnnotations, ok := accessor.TemplateAnnotations()
240+
if ok {
241+
if o.Enabled {
242+
if templateAnnotations == nil {
243+
templateAnnotations = make(map[string]string)
244+
}
245+
templateAnnotations[alphaResolveNamesAnnotation] = "*"
246+
} else {
247+
delete(templateAnnotations, alphaResolveNamesAnnotation)
248+
}
249+
accessor.SetTemplateAnnotations(templateAnnotations)
250+
return true, nil
251+
}
252+
annotations := accessor.Annotations()
253+
if o.Enabled {
254+
if annotations == nil {
255+
annotations = make(map[string]string)
256+
}
257+
annotations[alphaResolveNamesAnnotation] = "*"
258+
} else {
259+
delete(annotations, alphaResolveNamesAnnotation)
260+
}
261+
accessor.SetAnnotations(annotations)
262+
return true, nil
263+
}
203264
})
204265
if singleItemImplied && len(patches) == 0 {
205-
return fmt.Errorf("%s no changes", infos[0].Name)
266+
return fmt.Errorf("%s/%s no changes", infos[0].Mapping.Resource, infos[0].Name)
206267
}
207268
if o.PrintObject != nil {
208269
object, err := resource.AsVersionedObject(infos, !singleItemImplied, o.OutputVersion, kapi.Codecs.LegacyCodec(o.OutputVersion))
@@ -250,7 +311,24 @@ func (o *ImageLookupOptions) printImageLookup(infos []*resource.Info) error {
250311
defer w.Flush()
251312
fmt.Fprintf(w, "NAME\tLOCAL\n")
252313
for _, info := range infos {
253-
fmt.Fprintf(w, "%s\t%t\n", info.Name, info.Object.(*imageapi.ImageStream).Spec.LookupPolicy.Local)
314+
switch t := info.Object.(type) {
315+
case *imageapi.ImageStream:
316+
fmt.Fprintf(w, "%s\t%t\n", info.Name, t.Spec.LookupPolicy.Local)
317+
default:
318+
accessor, ok := ometa.GetAnnotationAccessor(info.Object)
319+
if !ok {
320+
fmt.Fprintf(w, "%s/%s\tUNKNOWN\n", info.Mapping.Resource, info.Name)
321+
break
322+
}
323+
var enabled bool
324+
if a, ok := accessor.TemplateAnnotations(); ok {
325+
enabled = a[alphaResolveNamesAnnotation] == "*"
326+
}
327+
if !enabled {
328+
enabled = accessor.Annotations()[alphaResolveNamesAnnotation] == "*"
329+
}
330+
fmt.Fprintf(w, "%s/%s\t%t\n", info.Mapping.Resource, info.Name, enabled)
331+
}
254332
}
255333
return nil
256334
}

pkg/image/admission/imagepolicy/accept.go

+13-2
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ import (
1212
kapi "k8s.io/kubernetes/pkg/api"
1313

1414
"github.com/openshift/origin/pkg/api/meta"
15+
"github.com/openshift/origin/pkg/image/admission/imagepolicy/api"
1516
"github.com/openshift/origin/pkg/image/admission/imagepolicy/rules"
1617
imageapi "github.com/openshift/origin/pkg/image/api"
1718
)
@@ -26,18 +27,28 @@ type policyDecision struct {
2627
err error
2728
}
2829

29-
func accept(accepter rules.Accepter, policy imageResolutionPolicy, resolver imageResolver, m meta.ImageReferenceMutator, attr admission.Attributes, excludedRules sets.String) error {
30+
func accept(accepter rules.Accepter, policy imageResolutionPolicy, resolver imageResolver, m meta.ImageReferenceMutator, annotations meta.AnnotationAccessor, attr admission.Attributes, excludedRules sets.String) error {
3031
decisions := policyDecisions{}
3132

3233
gr := attr.GetResource().GroupResource()
3334

35+
var resolveAllNames bool
36+
if annotations != nil {
37+
if a, ok := annotations.TemplateAnnotations(); ok {
38+
resolveAllNames = a[api.ResolveNamesAnnotation] == "*"
39+
}
40+
if !resolveAllNames {
41+
resolveAllNames = annotations.Annotations()[api.ResolveNamesAnnotation] == "*"
42+
}
43+
}
44+
3445
errs := m.Mutate(func(ref *kapi.ObjectReference) error {
3546
// create the attribute set for this particular reference, if we have never seen the reference
3647
// before
3748
decision, ok := decisions[*ref]
3849
if !ok {
3950
if policy.RequestsResolution(gr) {
40-
resolvedAttrs, err := resolver.ResolveObjectReference(ref, attr.GetNamespace())
51+
resolvedAttrs, err := resolver.ResolveObjectReference(ref, attr.GetNamespace(), resolveAllNames)
4152

4253
switch {
4354
case err != nil && policy.FailOnResolutionFailure(gr):

pkg/image/admission/imagepolicy/api/types.go

+10-3
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,16 @@ import (
66
"k8s.io/apimachinery/pkg/runtime/schema"
77
)
88

9-
// IgnorePolicyRulesAnnotation is a comma delimited list of rule names to omit from consideration
10-
// in a given namespace. Loaded from the namespace.
11-
const IgnorePolicyRulesAnnotation = "alpha.image.policy.openshift.io/ignore-rules"
9+
const (
10+
// IgnorePolicyRulesAnnotation is a comma delimited list of rule names to omit from consideration
11+
// in a given namespace. Loaded from the namespace.
12+
IgnorePolicyRulesAnnotation = "alpha.image.policy.openshift.io/ignore-rules"
13+
// ResolveNamesAnnotation when placed on an object template or object requests that all relevant
14+
// image names be resolved by taking the name and tag and attempting to resolve a local image stream.
15+
// This overrides the imageLookupPolicy on the image stream. If the object is not namespaced the
16+
// annotation is ignored. The only valid value is '*'.
17+
ResolveNamesAnnotation = "alpha.image.policy.openshift.io/resolve-names"
18+
)
1219

1320
// ImagePolicyConfig is the configuration for controlling how images are used in the cluster.
1421
type ImagePolicyConfig struct {

0 commit comments

Comments
 (0)