blob: 2699bbe476b1753e32fce66ec30e74731fe7d213 [file] [log] [blame]
// Copyright Istio Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package deployment
import (
apps_v1 "k8s.io/api/apps/v1"
v1 "k8s.io/api/core/v1"
)
import (
"github.com/apache/dubbo-go-pixiu/pkg/config/analysis"
"github.com/apache/dubbo-go-pixiu/pkg/config/analysis/analyzers/util"
"github.com/apache/dubbo-go-pixiu/pkg/config/analysis/msg"
"github.com/apache/dubbo-go-pixiu/pkg/config/resource"
"github.com/apache/dubbo-go-pixiu/pkg/config/schema/collection"
"github.com/apache/dubbo-go-pixiu/pkg/config/schema/collections"
)
type ApplicationUIDAnalyzer struct{}
var _ analysis.Analyzer = &ApplicationUIDAnalyzer{}
const (
UserID = int64(1337)
)
func (appUID *ApplicationUIDAnalyzer) Metadata() analysis.Metadata {
return analysis.Metadata{
Name: "applicationUID.Analyzer",
Description: "Checks invalid application UID",
Inputs: collection.Names{
collections.K8SCoreV1Pods.Name(),
collections.K8SAppsV1Deployments.Name(),
},
}
}
func (appUID *ApplicationUIDAnalyzer) Analyze(context analysis.Context) {
context.ForEach(collections.K8SCoreV1Pods.Name(), func(resource *resource.Instance) bool {
appUID.analyzeAppUIDForPod(resource, context)
return true
})
context.ForEach(collections.K8SAppsV1Deployments.Name(), func(resource *resource.Instance) bool {
appUID.analyzeAppUIDForDeployment(resource, context)
return true
})
}
func (appUID *ApplicationUIDAnalyzer) analyzeAppUIDForPod(resource *resource.Instance, context analysis.Context) {
p := resource.Message.(*v1.PodSpec)
// Skip analyzing control plane for IST0144
if util.IsIstioControlPlane(resource) {
return
}
message := msg.NewInvalidApplicationUID(resource)
if p.SecurityContext != nil && p.SecurityContext.RunAsUser != nil {
if *p.SecurityContext.RunAsUser == UserID {
context.Report(collections.K8SCoreV1Pods.Name(), message)
}
}
for _, container := range p.Containers {
if container.Name != util.IstioProxyName && container.Name != util.IstioOperator {
if container.SecurityContext != nil && container.SecurityContext.RunAsUser != nil {
if *container.SecurityContext.RunAsUser == UserID {
context.Report(collections.K8SCoreV1Pods.Name(), message)
}
}
}
}
}
func (appUID *ApplicationUIDAnalyzer) analyzeAppUIDForDeployment(resource *resource.Instance, context analysis.Context) {
d := resource.Message.(*apps_v1.DeploymentSpec)
// Skip analyzing control plane for IST0144
if util.IsIstioControlPlane(resource) {
return
}
message := msg.NewInvalidApplicationUID(resource)
spec := d.Template.Spec
if spec.SecurityContext != nil && spec.SecurityContext.RunAsUser != nil {
if *spec.SecurityContext.RunAsUser == UserID {
context.Report(collections.K8SAppsV1Deployments.Name(), message)
}
}
for _, container := range spec.Containers {
if container.Name != util.IstioProxyName && container.Name != util.IstioOperator {
if container.SecurityContext != nil && container.SecurityContext.RunAsUser != nil {
if *container.SecurityContext.RunAsUser == UserID {
context.Report(collections.K8SAppsV1Deployments.Name(), message)
}
}
}
}
}