webhook

command module
v0.6.1 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Nov 8, 2024 License: Apache-2.0 Imports: 9 Imported by: 0

README

Rancher Webhook

Rancher webhook is both a validating admission webhook and a mutating admission webhook for Kubernetes.

Explanation of Webhooks in Kubernetes

Background

The Rancher Webhook is an instance of a Kubernetes admission controller. Admission controllers are a standard Kubernetes mechanism to intercept requests to a cluster's API server and perform validation or mutation of resources prior to their persistence in the cluster database. The validation and mutation are performed by custom code whose logic is defined by the instance of an admission controller. Cluster administrators may create many such controllers that perform custom validation or mutation in series. The Rancher Webhook is one such controller that runs both in the local cluster and all downstream clusters automatically.

A typical admission controller, such as Rancher's webhook, works as a web-server that receives requests forwarded by the main API server. If the Webhook runs its custom validation logic for the resource in question and rejects it because the object's structure violates some custom rules, then the whole request to the API server is also rejected.

The Go web-server itself is configured by dynamiclistener. It handles TLS certificates and the management of associated Secrets for secure communication of other Rancher components with the Webhook.

Docs

Documentation on each of the resources that are validated or mutated can be found in docs.md. It is recommended to review the kubernetes docs on CRDs as well.

Docs are added by creating a resource-specific readme in the directory of your mutator/validator (e.x. pkg/resources/$GROUP/$GROUP_VERSION/$RESOURCE/$READABLE_RESOURCE.MD). These files should be named with a human-readable version of the resource's name. For example, GlobalRole.md. Running go generate will then aggregate these into the user-facing docs in the docs.md file.

Webhooks

Rancher-Webhook is composed of multiple WebhookHandlers which is used when creating ValidatingWebhooks and MutatingWebhooks.

// WebhookHandler base interface for both ValidatingAdmissionHandler and MutatingAdmissionHandler.
// WebhookHandler is used for creating new http.HandlerFunc for each Webhook.
type WebhookHandler interface {

    // GVR returns GroupVersionResource that the Webhook reviews.
    // The returned GVR is used to define the route for accessing this webhook as well as creating the Webhooks Name.
    // Thus the GVR returned must be unique from other WebhookHandlers of the same type e.g.(Mutating or Validating).
    // If a WebhookHandler desires to monitor all resources in a group the Resource defined int he GVR should be "*".
    // If a WebhookHandler desires to monitor a core type the Group can be left empty "".
    GVR() schema.GroupVersionResource

    // Operations returns list of operations that this WebhookHandler supports.
    // Handlers will only be sent request with operations that are contained in the provided list.
    Operations() []v1.OperationType

    // Admit handles the webhook admission request sent to this webhook.
    // The response returned by the WebhookHandler will be forwarded to the kube-api server.
    // If the WebhookHandler can not accurately evaluate the request it should return an error.
    Admit(*Request) (*admissionv1.AdmissionResponse, error)
}

// ValidatingAdmissionHandler is a handler used for creating a ValidationAdmission Webhook.
type ValidatingAdmissionHandler interface {
    WebhookHandler

    // ValidatingWebhook returns a list of configurations to route to this handler.
    //
    // This functions allows ValidatingAdmissionHandler to perform modifications to the default configuration if needed.
    // A default configuration can be made using NewDefaultValidatingWebhook(...)
    // Most Webhooks implementing ValidatingWebhook will only return one configuration.
    ValidatingWebhook(clientConfig v1.WebhookClientConfig) []v1.ValidatingWebhook
}

// MutatingAdmissionHandler is a handler used for creating a MutatingAdmission Webhook.
type MutatingAdmissionHandler interface {
    WebhookHandler

    // MutatingWebhook returns a list of configurations to route to this handler.
    //
    // MutatingWebhook functions allows MutatingAdmissionHandler to perform modifications to the default configuration if needed.
    // A default configuration can be made using NewDefaultMutatingWebhook(...)
    // Most Webhooks implementing MutatingWebhook will only return one configuration.
    MutatingWebhook(clientConfig v1.WebhookClientConfig) []v1.MutatingWebhook
}

Any admission controller, as an app, consists of two main things:

  1. The configuration which describes the resources and actions for which the webhook is active. This configuration also references the Kubernetes service which directs traffic to the actual web-server (this Webhook project) that does the work. The configuration exists as ValidatingWebhookConfiguration and MutatingWebhookConfiguration resources.
  2. The actual web-server with all the validation and mutation logic found in each object's Admit method.

Note: both the ValidatingWebhookConfiguration and MutatingWebhookConfiguration are dynamically created at webhook startup, not beforehand.

All objects with custom validation logic exist in the pkg/resources package.

Validation

Both Mutating and Validating webhooks can be used for basic validation of user input. A ValidatingAdmissionHandler should be used when validation is needed after all mutations are completed.

For example, there is a globalrole package that has a type with an Admit method. Every time the local cluster's kube-api server receives a request to create or update a GlobalRole (a Rancher CRD), the Webhook, being an instance of an admission controller, intercepts the request. The Admit method for Global Roles runs. It inspects the Global Role object and leads it through a series of custom checks. One of them ensures that each rule of the GlobalRole has at least one verb. If it does not, then the Webhook changes returns a response value with Allowed set to false.

    for _, rule := range newGR.Rules {
        if len(rule.Verbs) == 0 {
            return &admissionv1.AdmissionResponse{
                Result: &metav1.Status{
                    Status:  "Failure",
                    Message: "GlobalRole.Rules: PolicyRules must have at least one verb",
                    Reason:  metav1.StatusReasonBadRequest,
                    Code:    http.StatusBadRequest,
                },
                Allowed: false,
            }, nil
        }
    }

This logic is the main part of object inspection and admission control.

Mutation

A MutatingAdmissionHandler should be used when the data being updated needs to be modified. All modifications must be recorded using a JSONpatch. This can be done easily using the pkg/patch library for example the MutatingAdmissionHandler for secrets add the creator's username as an annotation then creates a patch that is attached to the response.

    newSecret.Annotations[auth.CreatorIDAnn] = request.UserInfo.Username
    response := &admissionv1.AdmissionResponse{}
    if err := patch.CreatePatch(request.Object.Raw, newSecret, response); err != nil {
        return nil, fmt.Errorf("failed to create patch: %w", err)
    }
    response.Allowed = true
    return response, nil
Creating a WebhookHandler

The pkg/server package is the main setup package of the Webhook server itself. The package defines the rules for resources and actions for which the Webhook will be active. These are later brought to life as cluster-wide Kubernetes resources (ValidatingWebhookConfiguration and MutatingWebhookConfiguration). It also binds resources with their respective admission handlers.

To add a new Webhook handler one simply needs to create a struct that satisfies either the ValidatingAdmissionHandler or MutatingAdmissionhandler Interface. Then add an initialized instance of the struct in pkg/server/handler.go

Building

make

Running

./bin/webhook

Development

  1. Get a new address that forwards to https://localhost:9443 using ngrok.

    ngrok http https://localhost:9443
    
  2. Run the webhook with the given address and the kubeconfig for the cluster hosting Rancher.

    export KUBECONFIG=<rancher_kube_config>
    export CATTLE_WEBHOOK_URL="https://<NGROK_URL>.ngrok.io"
    ./bin/webhook
    

After 15 seconds the webhook will update the ValidatingWebhookConfiguration and MutatingWebhookConfiguration in the Kubernetes cluster to point at the locally running instance.

⚠ Kubernetes API server authentication will not work with ngrok.

License

Copyright (c) 2019-2021 Rancher Labs, Inc.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

Documentation

The Go Gopher

There is no documentation for this package.

Directories

Path Synopsis
pkg
admission
Package admission holds definitions and functions for admissionWebhook.
Package admission holds definitions and functions for admissionWebhook.
auth
Package auth is holds common webhook code used during authentication
Package auth is holds common webhook code used during authentication
health
Package health handles health checking for the webhook
Package health handles health checking for the webhook
mocks
Package resolvers is a generated GoMock package.
Package resolvers is a generated GoMock package.
podsecurityadmission
Package podsecurityadmission contains utility functions for managing PodSecurity-related resources
Package podsecurityadmission contains utility functions for managing PodSecurity-related resources
resolvers
Package resolvers resolves what rules different users and roleTemplates our bound to
Package resolvers resolves what rules different users and roleTemplates our bound to
resources/catalog.cattle.io/v1/clusterrepo
Package clusterrepo is used for validating clusterrepo admission request.
Package clusterrepo is used for validating clusterrepo admission request.
resources/core/v1/namespace
Package namespace holds the Admitters and Validator for webhook validation of requests modifying namespace objects.
Package namespace holds the Admitters and Validator for webhook validation of requests modifying namespace objects.
resources/management.cattle.io/v3/clusterroletemplatebinding
Package clusterroletemplatebinding is used for validating clusterroletemplatebing admission request.
Package clusterroletemplatebinding is used for validating clusterroletemplatebing admission request.
resources/management.cattle.io/v3/globalrole
Package globalrole holds admission logic for the v3 management.cattle.io.globalroles CRD.
Package globalrole holds admission logic for the v3 management.cattle.io.globalroles CRD.
resources/management.cattle.io/v3/globalrolebinding
Package globalrolebinding holds admission logic for the v3 management.cattle.io.globalrolebindings CRD.
Package globalrolebinding holds admission logic for the v3 management.cattle.io.globalrolebindings CRD.
resources/management.cattle.io/v3/nodedriver
Package nodedriver handles validation and creation for rke1 and rke2 nodedrivers.
Package nodedriver handles validation and creation for rke1 and rke2 nodedrivers.
resources/management.cattle.io/v3/podsecurityadmissionconfigurationtemplate
Package podsecurityadmissionconfigurationtemplate is used for validating podsecurityadmissionconfigurationtemplate admission requests.
Package podsecurityadmissionconfigurationtemplate is used for validating podsecurityadmissionconfigurationtemplate admission requests.
resources/management.cattle.io/v3/projectroletemplatebinding
Package projectroletemplatebinding is used for validating ProjectRoleTemplateBinding admission requests.
Package projectroletemplatebinding is used for validating ProjectRoleTemplateBinding admission requests.
resources/management.cattle.io/v3/roletemplate
Package roletemplate is used for validating roletemplate objects.
Package roletemplate is used for validating roletemplate objects.
server
Package server is used to create and run the webhook server
Package server is used to create and run the webhook server

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL