Skip to content

Commit ff53795

Browse files
author
OpenShift Bot
authored
Merge pull request #12653 from JacobTanenbaum/IngressAdmissionController
Merged by openshift-bot
2 parents c74f1b8 + dfd9fae commit ff53795

12 files changed

+464
-1
lines changed

docs/man/man1/openshift-start-kubernetes-apiserver.1

+1-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ This command launches an instance of the Kubernetes apiserver (kube\-apiserver).
2626

2727
.PP
2828
\fB\-\-admission\-control\fP="AlwaysAdmit"
29-
Ordered list of plug\-ins to do admission control of resources into cluster. Comma\-delimited list of: AlwaysAdmit, AlwaysDeny, AlwaysPullImages, BuildByStrategy, ClusterResourceOverride, DefaultStorageClass, DenyEscalatingExec, DenyExecOnPrivileged, ExternalIPRanger, ImagePolicyWebhook, InitialResources, LimitPodHardAntiAffinityTopology, LimitRanger, NamespaceAutoProvision, NamespaceExists, NamespaceLifecycle, OriginNamespaceLifecycle, OriginPodNodeEnvironment, OwnerReferencesPermissionEnforcement, PersistentVolumeLabel, PodNodeConstraints, PodNodeSelector, PodSecurityPolicy, ProjectRequestLimit, ResourceQuota, RunOnceDuration, SCCExecRestrictions, SecurityContextConstraint, SecurityContextDeny, ServiceAccount, openshift.io/BuildConfigSecretInjector, openshift.io/ClusterResourceQuota, openshift.io/ImageLimitRange, openshift.io/ImagePolicy, openshift.io/JenkinsBootstrapper, openshift.io/OriginResourceQuota, openshift.io/RestrictSubjectBindings, openshift.io/RestrictedEndpointsAdmission.
29+
Ordered list of plug\-ins to do admission control of resources into cluster. Comma\-delimited list of: AlwaysAdmit, AlwaysDeny, AlwaysPullImages, BuildByStrategy, ClusterResourceOverride, DefaultStorageClass, DenyEscalatingExec, DenyExecOnPrivileged, ExternalIPRanger, ImagePolicyWebhook, InitialResources, LimitPodHardAntiAffinityTopology, LimitRanger, NamespaceAutoProvision, NamespaceExists, NamespaceLifecycle, OriginNamespaceLifecycle, OriginPodNodeEnvironment, OwnerReferencesPermissionEnforcement, PersistentVolumeLabel, PodNodeConstraints, PodNodeSelector, PodSecurityPolicy, ProjectRequestLimit, ResourceQuota, RunOnceDuration, SCCExecRestrictions, SecurityContextConstraint, SecurityContextDeny, ServiceAccount, openshift.io/BuildConfigSecretInjector, openshift.io/ClusterResourceQuota, openshift.io/ImageLimitRange, openshift.io/ImagePolicy, openshift.io/IngressAdmission, openshift.io/JenkinsBootstrapper, openshift.io/OriginResourceQuota, openshift.io/RestrictSubjectBindings, openshift.io/RestrictedEndpointsAdmission.
3030

3131
.PP
3232
\fB\-\-admission\-control\-config\-file\fP=""

pkg/cmd/server/origin/master_config.go

+3
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,7 @@ import (
6969
imageadmission "github.com/openshift/origin/pkg/image/admission"
7070
imagepolicy "github.com/openshift/origin/pkg/image/admission/imagepolicy/api"
7171
imageapi "github.com/openshift/origin/pkg/image/api"
72+
ingressadmission "github.com/openshift/origin/pkg/ingress/admission"
7273
accesstokenregistry "github.com/openshift/origin/pkg/oauth/registry/oauthaccesstoken"
7374
accesstokenetcd "github.com/openshift/origin/pkg/oauth/registry/oauthaccesstoken/etcd"
7475
projectauth "github.com/openshift/origin/pkg/project/auth"
@@ -361,6 +362,7 @@ var (
361362
"SCCExecRestrictions",
362363
"PersistentVolumeLabel",
363364
"OwnerReferencesPermissionEnforcement",
365+
ingressadmission.IngressAdmission,
364366
// NOTE: quotaadmission and ClusterResourceQuota must be the last 2 plugins.
365367
// DO NOT ADD ANY PLUGINS AFTER THIS LINE!
366368
quotaadmission.PluginName,
@@ -398,6 +400,7 @@ var (
398400
"SCCExecRestrictions",
399401
"PersistentVolumeLabel",
400402
"OwnerReferencesPermissionEnforcement",
403+
ingressadmission.IngressAdmission,
401404
// NOTE: quotaadmission and ClusterResourceQuota must be the last 2 plugins.
402405
// DO NOT ADD ANY PLUGINS AFTER THIS LINE!
403406
quotaadmission.PluginName,

pkg/cmd/server/start/admission.go

+2
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ import (
1717
_ "github.com/openshift/origin/pkg/build/admission/strategyrestrictions"
1818
_ "github.com/openshift/origin/pkg/image/admission"
1919
_ "github.com/openshift/origin/pkg/image/admission/imagepolicy"
20+
_ "github.com/openshift/origin/pkg/ingress/admission"
2021
_ "github.com/openshift/origin/pkg/project/admission/lifecycle"
2122
_ "github.com/openshift/origin/pkg/project/admission/nodeenv"
2223
_ "github.com/openshift/origin/pkg/project/admission/requestlimit"
@@ -71,6 +72,7 @@ var (
7172
"OwnerReferencesPermissionEnforcement",
7273
quotaadmission.PluginName,
7374
"openshift.io/ClusterResourceQuota",
75+
"openshift.io/IngressAdmission",
7476
)
7577

7678
// defaultOffPlugins includes plugins which require explicit configuration to run
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
package install
2+
3+
import (
4+
"github.com/golang/glog"
5+
6+
"k8s.io/kubernetes/pkg/api/meta"
7+
"k8s.io/kubernetes/pkg/api/unversioned"
8+
9+
configapi "github.com/openshift/origin/pkg/cmd/server/api"
10+
"github.com/openshift/origin/pkg/ingress/admission/api"
11+
"github.com/openshift/origin/pkg/ingress/admission/api/v1"
12+
)
13+
14+
const importPrefix = "github.com/openshift/origin/pkg/scheduler/admission/api"
15+
16+
var accessor = meta.NewAccessor()
17+
18+
// availableVersions lists all known external versions for this group from most perferred to least preferred
19+
var availableVersions = []unversioned.GroupVersion{v1.SchemeGroupVersion}
20+
21+
func init() {
22+
if err := enableVersions(availableVersions); err != nil {
23+
panic(err)
24+
}
25+
}
26+
27+
// TODO: enableVersions should be centralized rather than spread in each API
28+
// group.
29+
// We can combine registered.RegisterVersions, registered.EnableVersions and
30+
// registered.RegisterGroup once we hae moved enableVersions there.
31+
func enableVersions(externalVersions []unversioned.GroupVersion) error {
32+
addVersionsToScheme(externalVersions...)
33+
return nil
34+
}
35+
36+
func addVersionsToScheme(externalVersions ...unversioned.GroupVersion) {
37+
// add the internal version to Scheme
38+
api.AddToScheme(configapi.Scheme)
39+
// add the enabled external versions to Scheme
40+
for _, v := range externalVersions {
41+
switch v {
42+
case v1.SchemeGroupVersion:
43+
v1.AddToScheme(configapi.Scheme)
44+
45+
default:
46+
glog.Errorf("Version %s is not known, so it will not be added to the Scheme.", v)
47+
continue
48+
}
49+
}
50+
}

pkg/ingress/admission/api/register.go

+33
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
package api
2+
3+
import (
4+
"k8s.io/kubernetes/pkg/api/unversioned"
5+
"k8s.io/kubernetes/pkg/runtime"
6+
)
7+
8+
// SchemeGroupVersion is group version used to register these objects
9+
var SchemeGroupVersion = unversioned.GroupVersion{Group: "", Version: runtime.APIVersionInternal}
10+
11+
// Kind takes an unqualified kind and returns back a Group qualified GroupKind
12+
func Kind(kind string) unversioned.GroupKind {
13+
return SchemeGroupVersion.WithKind(kind).GroupKind()
14+
}
15+
16+
// Resource takes an unqualified resource and returns back a Group qualified GroupResource
17+
func Resource(resource string) unversioned.GroupResource {
18+
return SchemeGroupVersion.WithResource(resource).GroupResource()
19+
}
20+
21+
var (
22+
SchemeBuilder = runtime.NewSchemeBuilder(addKnownTypes)
23+
AddToScheme = SchemeBuilder.AddToScheme
24+
)
25+
26+
func addKnownTypes(scheme *runtime.Scheme) error {
27+
scheme.AddKnownTypes(SchemeGroupVersion,
28+
&IngressAdmissionConfig{},
29+
)
30+
return nil
31+
}
32+
33+
func (obj *IngressAdmissionConfig) GetObjectKind() unversioned.ObjectKind { return &obj.TypeMeta }

pkg/ingress/admission/api/types.go

+20
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
package api
2+
3+
import (
4+
"k8s.io/kubernetes/pkg/api/unversioned"
5+
)
6+
7+
// IngressAdmissionConfig is the configuration for the the ingress
8+
// controller limiter plugin. It changes the behavior of ingress
9+
// objects to behave better with openshift routes and routers.
10+
// *NOTE* This has security implications in the router when handling
11+
// ingress objects
12+
type IngressAdmissionConfig struct {
13+
unversioned.TypeMeta
14+
15+
// AllowHostnameChanges when false or unset openshift does not
16+
// allow changing or adding hostnames to ingress objects. If set
17+
// to true then hostnames can be added or modified which has
18+
// security implications in the router.
19+
AllowHostnameChanges bool
20+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
package v1_test
2+
3+
import (
4+
"reflect"
5+
"testing"
6+
7+
"k8s.io/kubernetes/pkg/runtime"
8+
"k8s.io/kubernetes/pkg/util/diff"
9+
10+
configapi "github.com/openshift/origin/pkg/cmd/server/api"
11+
v1 "github.com/openshift/origin/pkg/cmd/server/api/v1"
12+
_ "github.com/openshift/origin/pkg/ingress/admission/api/install"
13+
14+
ingressv1 "github.com/openshift/origin/pkg/ingress/admission/api/v1"
15+
)
16+
17+
func roundTrip(t *testing.T, obj runtime.Object) runtime.Object {
18+
data, err := runtime.Encode(configapi.Codecs.LegacyCodec(v1.SchemeGroupVersion), obj)
19+
if err != nil {
20+
t.Errorf("%v\n %#v", err, obj)
21+
return nil
22+
}
23+
obj2, err := runtime.Decode(configapi.Codecs.UniversalDecoder(), data)
24+
if err != nil {
25+
t.Errorf("%v\nData: %s\nSource: %#v", err, string(data), obj)
26+
return nil
27+
}
28+
obj3 := reflect.New(reflect.TypeOf(obj).Elem()).Interface().(runtime.Object)
29+
err = configapi.Scheme.Convert(obj2, obj3, nil)
30+
if err != nil {
31+
t.Errorf("%v\nSourceL %#v", err, obj2)
32+
return nil
33+
}
34+
return obj3
35+
}
36+
37+
func TestDefaults(t *testing.T) {
38+
tests := []struct {
39+
original *ingressv1.IngressAdmissionConfig
40+
expected *ingressv1.IngressAdmissionConfig
41+
}{
42+
{
43+
original: &ingressv1.IngressAdmissionConfig{},
44+
expected: &ingressv1.IngressAdmissionConfig{
45+
AllowHostnameChanges: false,
46+
},
47+
},
48+
}
49+
for i, test := range tests {
50+
t.Logf("test %d", i)
51+
original := test.original
52+
expected := test.expected
53+
obj2 := roundTrip(t, runtime.Object(original))
54+
got, ok := obj2.(*ingressv1.IngressAdmissionConfig)
55+
if !ok {
56+
t.Errorf("unexpected object: %v", got)
57+
t.FailNow()
58+
}
59+
if !reflect.DeepEqual(got, expected) {
60+
t.Errorf("got different than expected:\nA:\t%#v\nB:\t%#v\n\nDiff:\n%s\n\n%s", got, expected, diff.ObjectDiff(expected, got), diff.ObjectGoPrintSideBySide(expected, got))
61+
}
62+
}
63+
}
+23
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
package v1
2+
3+
import (
4+
"k8s.io/kubernetes/pkg/api/unversioned"
5+
"k8s.io/kubernetes/pkg/runtime"
6+
)
7+
8+
// SchemeGroupVersion is group version used to register these objects
9+
var SchemeGroupVersion = unversioned.GroupVersion{Group: "", Version: "v1"}
10+
11+
var (
12+
SchemeBuilder = runtime.NewSchemeBuilder(addKnownTypes)
13+
AddToScheme = SchemeBuilder.AddToScheme
14+
)
15+
16+
func addKnownTypes(scheme *runtime.Scheme) error {
17+
scheme.AddKnownTypes(SchemeGroupVersion,
18+
&IngressAdmissionConfig{},
19+
)
20+
return nil
21+
}
22+
23+
func (obj *IngressAdmissionConfig) GetObjectKind() unversioned.ObjectKind { return &obj.TypeMeta }
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
package v1
2+
3+
// This file contains methods that can be used by the go-restful package to generate Swagger
4+
// documentation for the object types found in 'types.go' This file is automatically generated
5+
// by hack/update-generated-swagger-descriptions.sh and should be run after a full build of OpenShift.
6+
// ==== DO NOT EDIT THIS FILE MANUALLY ====
7+
8+
var map_IngressAdmissionConfig = map[string]string{
9+
"": "IngressAdmissionConfig is the configuration for the the ingress controller limiter plugin. It changes the behavior of ingress objects to behave better with openshift routes and routers. *NOTE* This has security implications in the router when handling ingress objects",
10+
"allowHostnameChanges": "AllowHostnameChanges when false or unset openshift does not allow changing or adding hostnames to ingress objects. If set to true then hostnames can be added or modified which has security implications in the router.",
11+
}
12+
13+
func (IngressAdmissionConfig) SwaggerDoc() map[string]string {
14+
return map_IngressAdmissionConfig
15+
}

pkg/ingress/admission/api/v1/types.go

+20
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
package v1
2+
3+
import (
4+
"k8s.io/kubernetes/pkg/api/unversioned"
5+
)
6+
7+
// IngressAdmissionConfig is the configuration for the the ingress
8+
// controller limiter plugin. It changes the behavior of ingress
9+
// objects to behave better with openshift routes and routers.
10+
// *NOTE* This has security implications in the router when handling
11+
// ingress objects
12+
type IngressAdmissionConfig struct {
13+
unversioned.TypeMeta `json:",inline"`
14+
15+
// AllowHostnameChanges when false or unset openshift does not
16+
// allow changing or adding hostnames to ingress objects. If set
17+
// to true then hostnames can be added or modified which has
18+
// security implications in the router.
19+
AllowHostnameChanges bool `json:"allowHostnameChanges"`
20+
}
+96
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,96 @@
1+
// This plugin supplements upstream Ingress admission validation
2+
// It takes care of current Openshift specific constraints on Ingress resources
3+
package admission
4+
5+
import (
6+
"fmt"
7+
"io"
8+
"reflect"
9+
10+
"k8s.io/client-go/pkg/util/sets"
11+
kadmission "k8s.io/kubernetes/pkg/admission"
12+
kextensions "k8s.io/kubernetes/pkg/apis/extensions"
13+
clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
14+
15+
configlatest "github.com/openshift/origin/pkg/cmd/server/api/latest"
16+
"github.com/openshift/origin/pkg/ingress/admission/api"
17+
)
18+
19+
const (
20+
IngressAdmission = "openshift.io/IngressAdmission"
21+
)
22+
23+
func init() {
24+
kadmission.RegisterPlugin(IngressAdmission, func(clien clientset.Interface, config io.Reader) (kadmission.Interface, error) {
25+
pluginConfig, err := readConfig(config)
26+
if err != nil {
27+
return nil, err
28+
}
29+
return NewIngressAdmission(pluginConfig), nil
30+
})
31+
}
32+
33+
type ingressAdmission struct {
34+
*kadmission.Handler
35+
config *api.IngressAdmissionConfig
36+
}
37+
38+
func NewIngressAdmission(config *api.IngressAdmissionConfig) *ingressAdmission {
39+
return &ingressAdmission{
40+
Handler: kadmission.NewHandler(kadmission.Create, kadmission.Update),
41+
config: config,
42+
}
43+
}
44+
45+
func readConfig(reader io.Reader) (*api.IngressAdmissionConfig, error) {
46+
if reader == nil || reflect.ValueOf(reader).IsNil() {
47+
return nil, nil
48+
}
49+
obj, err := configlatest.ReadYAML(reader)
50+
if err != nil {
51+
return nil, err
52+
}
53+
if obj == nil {
54+
return nil, nil
55+
}
56+
config, ok := obj.(*api.IngressAdmissionConfig)
57+
if !ok {
58+
return nil, fmt.Errorf("unexpected config object: %#v", obj)
59+
}
60+
// No validation needed since config is just list of strings
61+
return config, nil
62+
}
63+
64+
func (r *ingressAdmission) Admit(a kadmission.Attributes) error {
65+
if a.GetResource().GroupResource() == kextensions.Resource("ingresses") && a.GetOperation() == kadmission.Update {
66+
if r.config == nil || r.config.AllowHostnameChanges == false {
67+
oldIngress, ok := a.GetOldObject().(*kextensions.Ingress)
68+
if !ok {
69+
return nil
70+
}
71+
newIngress, ok := a.GetObject().(*kextensions.Ingress)
72+
if !ok {
73+
return nil
74+
}
75+
if !haveHostnamesChanged(oldIngress, newIngress) {
76+
return fmt.Errorf("cannot change hostname")
77+
}
78+
}
79+
}
80+
return nil
81+
}
82+
83+
func haveHostnamesChanged(oldIngress, newIngress *kextensions.Ingress) bool {
84+
hostnameSet := sets.NewString()
85+
for _, element := range oldIngress.Spec.Rules {
86+
hostnameSet.Insert(element.Host)
87+
}
88+
89+
for _, element := range newIngress.Spec.Rules {
90+
if present := hostnameSet.Has(element.Host); !present {
91+
return false
92+
}
93+
}
94+
95+
return true
96+
}

0 commit comments

Comments
 (0)