135 lines
4.2 KiB
Go
135 lines
4.2 KiB
Go
/*
|
|
Copyright 2018 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package validating
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/golang/glog"
|
|
|
|
admissionv1beta1 "k8s.io/api/admission/v1beta1"
|
|
"k8s.io/api/admissionregistration/v1beta1"
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
|
admissionmetrics "k8s.io/apiserver/pkg/admission/metrics"
|
|
webhookerrors "k8s.io/apiserver/pkg/admission/plugin/webhook/errors"
|
|
"k8s.io/apiserver/pkg/admission/plugin/webhook/generic"
|
|
"k8s.io/apiserver/pkg/admission/plugin/webhook/request"
|
|
"k8s.io/apiserver/pkg/admission/plugin/webhook/util"
|
|
"k8s.io/apiserver/pkg/util/webhook"
|
|
)
|
|
|
|
type validatingDispatcher struct {
|
|
cm *webhook.ClientManager
|
|
}
|
|
|
|
func newValidatingDispatcher(cm *webhook.ClientManager) generic.Dispatcher {
|
|
return &validatingDispatcher{cm}
|
|
}
|
|
|
|
var _ generic.Dispatcher = &validatingDispatcher{}
|
|
|
|
func (d *validatingDispatcher) Dispatch(ctx context.Context, attr *generic.VersionedAttributes, relevantHooks []*v1beta1.Webhook) error {
|
|
wg := sync.WaitGroup{}
|
|
errCh := make(chan error, len(relevantHooks))
|
|
wg.Add(len(relevantHooks))
|
|
for i := range relevantHooks {
|
|
go func(hook *v1beta1.Webhook) {
|
|
defer wg.Done()
|
|
|
|
t := time.Now()
|
|
err := d.callHook(ctx, hook, attr)
|
|
admissionmetrics.Metrics.ObserveWebhook(time.Since(t), err != nil, attr.Attributes, "validating", hook.Name)
|
|
if err == nil {
|
|
return
|
|
}
|
|
|
|
ignoreClientCallFailures := hook.FailurePolicy != nil && *hook.FailurePolicy == v1beta1.Ignore
|
|
if callErr, ok := err.(*webhook.ErrCallingWebhook); ok {
|
|
if ignoreClientCallFailures {
|
|
glog.Warningf("Failed calling webhook, failing open %v: %v", hook.Name, callErr)
|
|
utilruntime.HandleError(callErr)
|
|
return
|
|
}
|
|
|
|
glog.Warningf("Failed calling webhook, failing closed %v: %v", hook.Name, err)
|
|
errCh <- apierrors.NewInternalError(err)
|
|
return
|
|
}
|
|
|
|
glog.Warningf("rejected by webhook %q: %#v", hook.Name, err)
|
|
errCh <- err
|
|
}(relevantHooks[i])
|
|
}
|
|
wg.Wait()
|
|
close(errCh)
|
|
|
|
var errs []error
|
|
for e := range errCh {
|
|
errs = append(errs, e)
|
|
}
|
|
if len(errs) == 0 {
|
|
return nil
|
|
}
|
|
if len(errs) > 1 {
|
|
for i := 1; i < len(errs); i++ {
|
|
// TODO: merge status errors; until then, just return the first one.
|
|
utilruntime.HandleError(errs[i])
|
|
}
|
|
}
|
|
return errs[0]
|
|
}
|
|
|
|
func (d *validatingDispatcher) callHook(ctx context.Context, h *v1beta1.Webhook, attr *generic.VersionedAttributes) error {
|
|
if attr.IsDryRun() {
|
|
if h.SideEffects == nil {
|
|
return &webhook.ErrCallingWebhook{WebhookName: h.Name, Reason: fmt.Errorf("Webhook SideEffects is nil")}
|
|
}
|
|
if !(*h.SideEffects == v1beta1.SideEffectClassNone || *h.SideEffects == v1beta1.SideEffectClassNoneOnDryRun) {
|
|
return webhookerrors.NewDryRunUnsupportedErr(h.Name)
|
|
}
|
|
}
|
|
|
|
// Make the webhook request
|
|
request := request.CreateAdmissionReview(attr)
|
|
client, err := d.cm.HookClient(util.HookClientConfigForWebhook(h))
|
|
if err != nil {
|
|
return &webhook.ErrCallingWebhook{WebhookName: h.Name, Reason: err}
|
|
}
|
|
response := &admissionv1beta1.AdmissionReview{}
|
|
if err := client.Post().Context(ctx).Body(&request).Do().Into(response); err != nil {
|
|
return &webhook.ErrCallingWebhook{WebhookName: h.Name, Reason: err}
|
|
}
|
|
|
|
if response.Response == nil {
|
|
return &webhook.ErrCallingWebhook{WebhookName: h.Name, Reason: fmt.Errorf("Webhook response was absent")}
|
|
}
|
|
for k, v := range response.Response.AuditAnnotations {
|
|
key := h.Name + "/" + k
|
|
if err := attr.AddAnnotation(key, v); err != nil {
|
|
glog.Warningf("Failed to set admission audit annotation %s to %s for validating webhook %s: %v", key, v, h.Name, err)
|
|
}
|
|
}
|
|
if response.Response.Allowed {
|
|
return nil
|
|
}
|
|
return webhookerrors.ToStatusErr(h.Name, response.Response.Result)
|
|
}
|