order modules
add configuration to supporting functionality
This commit is contained in:
parent
173957c034
commit
d5963a693d
@ -1,7 +1,6 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"log"
|
"log"
|
||||||
@ -10,6 +9,7 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
|
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
|
"encoding/json"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
"mutating-webhook/internal/certificate"
|
"mutating-webhook/internal/certificate"
|
||||||
@ -74,6 +74,7 @@ func httpServer(cfg *config.Config) {
|
|||||||
|
|
||||||
ah := &admissionHandler{
|
ah := &admissionHandler{
|
||||||
decoder: serializer.NewCodecFactory(runtime.NewScheme()).UniversalDeserializer(),
|
decoder: serializer.NewCodecFactory(runtime.NewScheme()).UniversalDeserializer(),
|
||||||
|
config: cfg,
|
||||||
}
|
}
|
||||||
|
|
||||||
// healthcheck
|
// healthcheck
|
||||||
@ -124,6 +125,7 @@ func webHealthCheck(w http.ResponseWriter, r *http.Request) {
|
|||||||
|
|
||||||
type admissionHandler struct {
|
type admissionHandler struct {
|
||||||
decoder runtime.Decoder
|
decoder runtime.Decoder
|
||||||
|
config *config.Config
|
||||||
}
|
}
|
||||||
|
|
||||||
// Serve returns a http.HandlerFunc for an admission webhook
|
// Serve returns a http.HandlerFunc for an admission webhook
|
||||||
@ -171,7 +173,7 @@ func (h *admissionHandler) Serve(hook operations.Hook) http.HandlerFunc {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
result, err := hook.Execute(review.Request)
|
result, err := hook.Execute(review.Request, h.config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
msg := err.Error()
|
msg := err.Error()
|
||||||
log.Printf("[ERROR] Internal Server Error: %s", msg)
|
log.Printf("[ERROR] Internal Server Error: %s", msg)
|
||||||
|
@ -1,8 +1,9 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
|
||||||
"log"
|
"log"
|
||||||
|
|
||||||
|
"encoding/json"
|
||||||
"net/http"
|
"net/http"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -3,9 +3,10 @@ package main
|
|||||||
import (
|
import (
|
||||||
"log"
|
"log"
|
||||||
"os"
|
"os"
|
||||||
"os/signal"
|
|
||||||
"syscall"
|
"syscall"
|
||||||
|
|
||||||
|
"os/signal"
|
||||||
|
|
||||||
"mutating-webhook/internal/config"
|
"mutating-webhook/internal/config"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -2,14 +2,15 @@ package certificate
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
|
"strconv"
|
||||||
|
"time"
|
||||||
|
|
||||||
"crypto/rand"
|
"crypto/rand"
|
||||||
"crypto/rsa"
|
"crypto/rsa"
|
||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
"crypto/x509/pkix"
|
"crypto/x509/pkix"
|
||||||
"encoding/pem"
|
"encoding/pem"
|
||||||
"math/big"
|
"math/big"
|
||||||
"strconv"
|
|
||||||
"time"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func CreateCA() ([]byte, []byte, []byte, error) {
|
func CreateCA() ([]byte, []byte, []byte, error) {
|
||||||
|
@ -2,14 +2,15 @@ package certificate
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
|
"strconv"
|
||||||
|
"time"
|
||||||
|
|
||||||
"crypto/rand"
|
"crypto/rand"
|
||||||
"crypto/rsa"
|
"crypto/rsa"
|
||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
"crypto/x509/pkix"
|
"crypto/x509/pkix"
|
||||||
"encoding/pem"
|
"encoding/pem"
|
||||||
"math/big"
|
"math/big"
|
||||||
"strconv"
|
|
||||||
"time"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func CreateCert() ([]byte, []byte, []byte, error) {
|
func CreateCert() ([]byte, []byte, []byte, error) {
|
||||||
|
@ -2,11 +2,12 @@ package certificate
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
|
"log"
|
||||||
|
|
||||||
"crypto/rand"
|
"crypto/rand"
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
"encoding/pem"
|
"encoding/pem"
|
||||||
"log"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func CreateServerCert() tls.Certificate {
|
func CreateServerCert() tls.Certificate {
|
||||||
|
@ -29,6 +29,9 @@ type Config struct {
|
|||||||
WebServerReadTimeout int `env:"webserver_read_timeout" default:"5"`
|
WebServerReadTimeout int `env:"webserver_read_timeout" default:"5"`
|
||||||
WebServerWriteTimeout int `env:"webserver_write_timeout" default:"1"`
|
WebServerWriteTimeout int `env:"webserver_write_timeout" default:"1"`
|
||||||
WebServerIdleTimeout int `env:"webserver_idle_timeout" default:"2"`
|
WebServerIdleTimeout int `env:"webserver_idle_timeout" default:"2"`
|
||||||
|
|
||||||
|
// mutation configuration
|
||||||
|
AllowAdminNoMutate bool `env:"allow_admin_nomutate" default:"false"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// DefaultConfig initializes the config variable for use with a prepared set of defaults.
|
// DefaultConfig initializes the config variable for use with a prepared set of defaults.
|
||||||
|
@ -1,22 +1,24 @@
|
|||||||
package operations
|
package operations
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"mutating-webhook/internal/config"
|
||||||
|
|
||||||
admission "k8s.io/api/admission/v1"
|
admission "k8s.io/api/admission/v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
func DeploymentsValidation() Hook {
|
func DeploymentsValidation() Hook {
|
||||||
return Hook{
|
return Hook{
|
||||||
// default allow
|
// default allow
|
||||||
Create: func(r *admission.AdmissionRequest) (*Result, error) {
|
Create: func(r *admission.AdmissionRequest, cfg config.Config) (*Result, error) {
|
||||||
return &Result{Allowed: true}, nil
|
return &Result{Allowed: true}, nil
|
||||||
},
|
},
|
||||||
Delete: func(r *admission.AdmissionRequest) (*Result, error) {
|
Delete: func(r *admission.AdmissionRequest, cfg config.Config) (*Result, error) {
|
||||||
return &Result{Allowed: true}, nil
|
return &Result{Allowed: true}, nil
|
||||||
},
|
},
|
||||||
Update: func(r *admission.AdmissionRequest) (*Result, error) {
|
Update: func(r *admission.AdmissionRequest, cfg config.Config) (*Result, error) {
|
||||||
return &Result{Allowed: true}, nil
|
return &Result{Allowed: true}, nil
|
||||||
},
|
},
|
||||||
Connect: func(r *admission.AdmissionRequest) (*Result, error) {
|
Connect: func(r *admission.AdmissionRequest, cfg config.Config) (*Result, error) {
|
||||||
return &Result{Allowed: true}, nil
|
return &Result{Allowed: true}, nil
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
@ -5,6 +5,8 @@ package operations
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"mutating-webhook/internal/config"
|
||||||
|
|
||||||
admission "k8s.io/api/admission/v1"
|
admission "k8s.io/api/admission/v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -16,7 +18,7 @@ type Result struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// AdmitFunc defines how to process an admission request
|
// AdmitFunc defines how to process an admission request
|
||||||
type AdmitFunc func(request *admission.AdmissionRequest) (*Result, error)
|
type AdmitFunc func(request *admission.AdmissionRequest, cfg config.Config) (*Result, error)
|
||||||
|
|
||||||
// Hook represents the set of functions for each operation in an admission webhook.
|
// Hook represents the set of functions for each operation in an admission webhook.
|
||||||
type Hook struct {
|
type Hook struct {
|
||||||
@ -27,25 +29,25 @@ type Hook struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Execute evaluates the request and try to execute the function for operation specified in the request.
|
// Execute evaluates the request and try to execute the function for operation specified in the request.
|
||||||
func (h *Hook) Execute(r *admission.AdmissionRequest) (*Result, error) {
|
func (h *Hook) Execute(r *admission.AdmissionRequest, cfg *config.Config) (*Result, error) {
|
||||||
switch r.Operation {
|
switch r.Operation {
|
||||||
case admission.Create:
|
case admission.Create:
|
||||||
return wrapperExecution(h.Create, r)
|
return wrapperExecution(h.Create, r, *cfg)
|
||||||
case admission.Update:
|
case admission.Update:
|
||||||
return wrapperExecution(h.Update, r)
|
return wrapperExecution(h.Update, r, *cfg)
|
||||||
case admission.Delete:
|
case admission.Delete:
|
||||||
return wrapperExecution(h.Delete, r)
|
return wrapperExecution(h.Delete, r, *cfg)
|
||||||
case admission.Connect:
|
case admission.Connect:
|
||||||
return wrapperExecution(h.Connect, r)
|
return wrapperExecution(h.Connect, r, *cfg)
|
||||||
}
|
}
|
||||||
|
|
||||||
return &Result{Msg: fmt.Sprintf("Invalid operation: %s", r.Operation)}, nil
|
return &Result{Msg: fmt.Sprintf("Invalid operation: %s", r.Operation)}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func wrapperExecution(fn AdmitFunc, r *admission.AdmissionRequest) (*Result, error) {
|
func wrapperExecution(fn AdmitFunc, r *admission.AdmissionRequest, cfg config.Config) (*Result, error) {
|
||||||
if fn == nil {
|
if fn == nil {
|
||||||
return nil, fmt.Errorf("operation %s is not registered", r.Operation)
|
return nil, fmt.Errorf("operation %s is not registered", r.Operation)
|
||||||
}
|
}
|
||||||
|
|
||||||
return fn(r)
|
return fn(r, cfg)
|
||||||
}
|
}
|
||||||
|
@ -3,6 +3,8 @@ package operations
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"mutating-webhook/internal/config"
|
||||||
|
|
||||||
admission "k8s.io/api/admission/v1"
|
admission "k8s.io/api/admission/v1"
|
||||||
core "k8s.io/api/core/v1"
|
core "k8s.io/api/core/v1"
|
||||||
)
|
)
|
||||||
@ -11,20 +13,20 @@ func PodsMutation() Hook {
|
|||||||
return Hook{
|
return Hook{
|
||||||
Create: podMutationCreate(),
|
Create: podMutationCreate(),
|
||||||
// default allow
|
// default allow
|
||||||
Delete: func(r *admission.AdmissionRequest) (*Result, error) {
|
Delete: func(r *admission.AdmissionRequest, cfg config.Config) (*Result, error) {
|
||||||
return &Result{Allowed: true}, nil
|
return &Result{Allowed: true}, nil
|
||||||
},
|
},
|
||||||
Update: func(r *admission.AdmissionRequest) (*Result, error) {
|
Update: func(r *admission.AdmissionRequest, cfg config.Config) (*Result, error) {
|
||||||
return &Result{Allowed: true}, nil
|
return &Result{Allowed: true}, nil
|
||||||
},
|
},
|
||||||
Connect: func(r *admission.AdmissionRequest) (*Result, error) {
|
Connect: func(r *admission.AdmissionRequest, cfg config.Config) (*Result, error) {
|
||||||
return &Result{Allowed: true}, nil
|
return &Result{Allowed: true}, nil
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func podMutationCreate() AdmitFunc {
|
func podMutationCreate() AdmitFunc {
|
||||||
return func(r *admission.AdmissionRequest) (*Result, error) {
|
return func(r *admission.AdmissionRequest, cfg config.Config) (*Result, error) {
|
||||||
var operations []PatchOperation
|
var operations []PatchOperation
|
||||||
pod, err := parsePod(r.Object.Raw)
|
pod, err := parsePod(r.Object.Raw)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -32,7 +34,7 @@ func podMutationCreate() AdmitFunc {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// if pod is administratively exempt
|
// if pod is administratively exempt
|
||||||
if func(pod *core.Pod) bool {
|
if cfg.AllowAdminNoMutate && func(pod *core.Pod) bool {
|
||||||
for label, value := range pod.Annotations {
|
for label, value := range pod.Annotations {
|
||||||
if label == "AdminNoMutate" && value == "true" {
|
if label == "AdminNoMutate" && value == "true" {
|
||||||
return false
|
return false
|
||||||
|
@ -4,6 +4,8 @@ import (
|
|||||||
"log"
|
"log"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
"mutating-webhook/internal/config"
|
||||||
|
|
||||||
admission "k8s.io/api/admission/v1"
|
admission "k8s.io/api/admission/v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -11,20 +13,20 @@ func PodsValidation() Hook {
|
|||||||
return Hook{
|
return Hook{
|
||||||
Create: podValidationCreate(),
|
Create: podValidationCreate(),
|
||||||
// default allow
|
// default allow
|
||||||
Delete: func(r *admission.AdmissionRequest) (*Result, error) {
|
Delete: func(r *admission.AdmissionRequest, cfg config.Config) (*Result, error) {
|
||||||
return &Result{Allowed: true}, nil
|
return &Result{Allowed: true}, nil
|
||||||
},
|
},
|
||||||
Update: func(r *admission.AdmissionRequest) (*Result, error) {
|
Update: func(r *admission.AdmissionRequest, cfg config.Config) (*Result, error) {
|
||||||
return &Result{Allowed: true}, nil
|
return &Result{Allowed: true}, nil
|
||||||
},
|
},
|
||||||
Connect: func(r *admission.AdmissionRequest) (*Result, error) {
|
Connect: func(r *admission.AdmissionRequest, cfg config.Config) (*Result, error) {
|
||||||
return &Result{Allowed: true}, nil
|
return &Result{Allowed: true}, nil
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func podValidationCreate() AdmitFunc {
|
func podValidationCreate() AdmitFunc {
|
||||||
return func(r *admission.AdmissionRequest) (*Result, error) {
|
return func(r *admission.AdmissionRequest, cfg config.Config) (*Result, error) {
|
||||||
pod, err := parsePod(r.Object.Raw)
|
pod, err := parsePod(r.Object.Raw)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return &Result{Msg: err.Error()}, nil
|
return &Result{Msg: err.Error()}, nil
|
||||||
|
Loading…
x
Reference in New Issue
Block a user