121 lines
3.6 KiB
Go

package operations
import (
"fmt"
"log"
"regexp"
"strings"
admission "k8s.io/api/admission/v1"
core "k8s.io/api/core/v1"
"mutating-webhook/internal/config"
)
func PodsMutation() Hook {
return Hook{
Create: podMutationCreate(),
// default allow
Delete: func(r *admission.AdmissionRequest, cfg *config.Config) (*Result, error) {
return &Result{Allowed: true}, nil
},
Update: func(r *admission.AdmissionRequest, cfg *config.Config) (*Result, error) {
return &Result{Allowed: true}, nil
},
Connect: func(r *admission.AdmissionRequest, cfg *config.Config) (*Result, error) {
return &Result{Allowed: true}, nil
},
}
}
func podMutationCreate() AdmitFunc {
return func(r *admission.AdmissionRequest, cfg *config.Config) (*Result, error) {
var (
operations []PatchOperation
mutated bool
)
pod, err := parsePod(r.Object.Raw)
if err != nil {
return &Result{Msg: err.Error()}, nil
}
// if pod is administratively exempt
if func(serviceEnabled bool, pod *core.Pod) bool {
if serviceEnabled {
for label, value := range pod.Annotations {
if label == "AdminNoMutate" && value == "true" {
return false
}
}
}
return true
}(cfg.AllowAdminNoMutate, pod) {
for i, p := range pod.Spec.Containers {
img, mutationOccurred, err := mutateImage(p.Image, cfg)
if err != nil {
return &Result{Msg: err.Error()}, nil
}
if mutationOccurred {
mutated = true
path := fmt.Sprintf("/spec/containers/%d/image", i)
operations = append(operations, ReplacePatchOperation(path, img))
log.Printf("[INFO] Image has been mutated: %s -> %s", p.Image, img)
} else {
log.Printf("[INFO] No mutation required for image: %s", p.Image)
}
}
} else {
log.Printf("[INFO] Mutations administratively disabled.")
}
if mutated {
// mutate pod (annotation)
metadata := map[string]string{
"mutation-status": "pod mutated by mutation-controller",
}
// add original image to annotations
for _, p := range pod.Spec.Containers {
metadata[fmt.Sprintf("mutation-original-image-%s", p.Name)] = p.Image
}
// add annotation stating that the pos had been mutated
operations = append(operations, AddPatchOperation("/metadata/annotations", metadata))
}
return &Result{
Allowed: true,
PatchOps: operations,
}, nil
}
}
func mutateImage(imgPath string, cfg *config.Config) (string, bool, error) {
if len(cfg.DockerhubRegistry) == 0 {
return imgPath, false, nil
}
// Is image on allow-list
for _, i := range cfg.MutateIgnoredImages {
if strings.Contains(strings.ToLower(imgPath), strings.ToLower(i)) {
log.Printf("[DEBUG] Image is on allow-list: %s", imgPath)
return "", false, nil
}
}
switch {
// Is image already using defined registry?
case strings.Contains(strings.ToLower(imgPath), strings.Split(strings.ToLower(cfg.DockerhubRegistry), "/")[0]):
log.Printf("[DEBUG] Image is already using required registry: %s", imgPath)
return "", false, nil
// Is this an official dockerhub image?
case regexp.MustCompile(fmt.Sprintf(`^%s:%s$`, `([a-z0-9]|_|-)+`, `([a-zA-Z0-9]|_|\.|-)+`)).MatchString(imgPath):
log.Printf("[DEBUG] Official dockerhub image detected: %s", imgPath)
return fmt.Sprintf("%s/library/%s", cfg.DockerhubRegistry, imgPath), true, nil
// Is this a normal DockerHub Image?
case regexp.MustCompile(fmt.Sprintf(`^%s\/%s:%s$`, `([a-z0-9]|_|-)+`, `([a-z0-9]|_|-)+`, `([a-zA-Z0-9]|_|\.|-)+`)).MatchString(imgPath):
log.Printf("[DEBUG] Standard dockerhub image detected: %s", imgPath)
return fmt.Sprintf("%s/%s", cfg.DockerhubRegistry, imgPath), true, nil
}
return "", false, nil
}