123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101 |
- /*
- Copyright 2014 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package scdeny
- import (
- "fmt"
- "io"
- apierrors "k8s.io/apimachinery/pkg/api/errors"
- "k8s.io/apiserver/pkg/admission"
- api "k8s.io/kubernetes/pkg/apis/core"
- )
- // PluginName indicates name of admission plugin.
- const PluginName = "SecurityContextDeny"
- // Register registers a plugin
- func Register(plugins *admission.Plugins) {
- plugins.Register(PluginName, func(config io.Reader) (admission.Interface, error) {
- return NewSecurityContextDeny(), nil
- })
- }
- // Plugin implements admission.Interface.
- type Plugin struct {
- *admission.Handler
- }
- var _ admission.ValidationInterface = &Plugin{}
- // NewSecurityContextDeny creates a new instance of the SecurityContextDeny admission controller
- func NewSecurityContextDeny() *Plugin {
- return &Plugin{
- Handler: admission.NewHandler(admission.Create, admission.Update),
- }
- }
- // Validate will deny any pod that defines SupplementalGroups, SELinuxOptions, RunAsUser or FSGroup
- func (p *Plugin) Validate(a admission.Attributes, o admission.ObjectInterfaces) (err error) {
- if a.GetSubresource() != "" || a.GetResource().GroupResource() != api.Resource("pods") {
- return nil
- }
- pod, ok := a.GetObject().(*api.Pod)
- if !ok {
- return apierrors.NewBadRequest("Resource was marked with kind Pod but was unable to be converted")
- }
- if pod.Spec.SecurityContext != nil {
- if pod.Spec.SecurityContext.SupplementalGroups != nil {
- return apierrors.NewForbidden(a.GetResource().GroupResource(), pod.Name, fmt.Errorf("pod.Spec.SecurityContext.SupplementalGroups is forbidden"))
- }
- if pod.Spec.SecurityContext.SELinuxOptions != nil {
- return apierrors.NewForbidden(a.GetResource().GroupResource(), pod.Name, fmt.Errorf("pod.Spec.SecurityContext.SELinuxOptions is forbidden"))
- }
- if pod.Spec.SecurityContext.RunAsUser != nil {
- return apierrors.NewForbidden(a.GetResource().GroupResource(), pod.Name, fmt.Errorf("pod.Spec.SecurityContext.RunAsUser is forbidden"))
- }
- if pod.Spec.SecurityContext.FSGroup != nil {
- return apierrors.NewForbidden(a.GetResource().GroupResource(), pod.Name, fmt.Errorf("pod.Spec.SecurityContext.FSGroup is forbidden"))
- }
- }
- for _, v := range pod.Spec.InitContainers {
- if v.SecurityContext != nil {
- if v.SecurityContext.SELinuxOptions != nil {
- return apierrors.NewForbidden(a.GetResource().GroupResource(), pod.Name, fmt.Errorf("SecurityContext.SELinuxOptions is forbidden"))
- }
- if v.SecurityContext.RunAsUser != nil {
- return apierrors.NewForbidden(a.GetResource().GroupResource(), pod.Name, fmt.Errorf("SecurityContext.RunAsUser is forbidden"))
- }
- }
- }
- for _, v := range pod.Spec.Containers {
- if v.SecurityContext != nil {
- if v.SecurityContext.SELinuxOptions != nil {
- return apierrors.NewForbidden(a.GetResource().GroupResource(), pod.Name, fmt.Errorf("SecurityContext.SELinuxOptions is forbidden"))
- }
- if v.SecurityContext.RunAsUser != nil {
- return apierrors.NewForbidden(a.GetResource().GroupResource(), pod.Name, fmt.Errorf("SecurityContext.RunAsUser is forbidden"))
- }
- }
- }
- return nil
- }
|