-
Notifications
You must be signed in to change notification settings - Fork 234
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
191de10
commit b7b01f5
Showing
10 changed files
with
370 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
name: "image-sha" | ||
description: "Indicates if there are any image references that are not references by sha256 tags" | ||
remediation: "Reference all images using their sha256 tags." | ||
scope: | ||
objectKinds: | ||
- DeploymentLike | ||
template: "image-sha" | ||
params: | ||
AllowList: [".*:[a-fA-F0-9]{64}$"] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
package params | ||
|
||
// Params represents the params accepted by this template. | ||
type Params struct { | ||
|
||
// list of regular expressions specifying pattern(s) for container images that will be blocked. */ | ||
BlockList []string | ||
|
||
// list of regular expressions specifying pattern(s) for container images that will be allowed. | ||
AllowList []string | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,77 @@ | ||
package imageshatag | ||
|
||
import ( | ||
"fmt" | ||
"regexp" | ||
|
||
"github.com/pkg/errors" | ||
"golang.stackrox.io/kube-linter/pkg/check" | ||
"golang.stackrox.io/kube-linter/pkg/config" | ||
"golang.stackrox.io/kube-linter/pkg/diagnostic" | ||
"golang.stackrox.io/kube-linter/pkg/objectkinds" | ||
"golang.stackrox.io/kube-linter/pkg/templates" | ||
"golang.stackrox.io/kube-linter/pkg/templates/imageshatag/internal/params" | ||
"golang.stackrox.io/kube-linter/pkg/templates/util" | ||
v1 "k8s.io/api/core/v1" | ||
) | ||
|
||
const ( | ||
templateKey = "image-sha" | ||
) | ||
|
||
func init() { | ||
templates.Register(check.Template{ | ||
HumanName: "Latest Tag", | ||
Key: templateKey, | ||
Description: "Flag applications running container images that do not satisfies \"allowList\" & \"blockList\" parameters criteria.", | ||
SupportedObjectKinds: config.ObjectKindsDesc{ | ||
ObjectKinds: []string{objectkinds.DeploymentLike}, | ||
}, | ||
Parameters: params.ParamDescs, | ||
ParseAndValidateParams: params.ParseAndValidate, | ||
Instantiate: params.WrapInstantiateFunc(func(p params.Params) (check.Func, error) { | ||
|
||
blockedRegexes := make([]*regexp.Regexp, 0, len(p.BlockList)) | ||
for _, res := range p.BlockList { | ||
rg, err := regexp.Compile(res) | ||
if err != nil { | ||
return nil, errors.Wrapf(err, "invalid regex %s", res) | ||
} | ||
blockedRegexes = append(blockedRegexes, rg) | ||
} | ||
|
||
allowedRegexes := make([]*regexp.Regexp, 0, len(p.AllowList)) | ||
for _, res := range p.AllowList { | ||
rg, err := regexp.Compile(res) | ||
if err != nil { | ||
return nil, errors.Wrapf(err, "invalid regex %s", res) | ||
} | ||
allowedRegexes = append(allowedRegexes, rg) | ||
} | ||
|
||
if len(blockedRegexes) > 0 && len(allowedRegexes) > 0 { | ||
err := fmt.Errorf("check has both \"allowList\" & \"blockList\" parameter's values set") | ||
return nil, errors.Wrapf(err, "only one of the paramater lists can be used at a time") | ||
} | ||
|
||
return util.PerContainerCheck(func(container *v1.Container) (results []diagnostic.Diagnostic) { | ||
if len(blockedRegexes) > 0 && isInList(blockedRegexes, container.Image) { | ||
results = append(results, diagnostic.Diagnostic{Message: fmt.Sprintf("The container %q is using an invalid container image, %q. Please reference the image using a SHA256 tag.", container.Name, container.Image)}) | ||
} else if len(allowedRegexes) > 0 && !isInList(allowedRegexes, container.Image) { | ||
results = append(results, diagnostic.Diagnostic{Message: fmt.Sprintf("The container %q is using an invalid container image, %q. Please reference the image using a SHA256 tag.", container.Name, container.Image)}) | ||
} | ||
return results | ||
}), nil | ||
}), | ||
}) | ||
} | ||
|
||
// isInList returns true if a match found in the list for the given name | ||
func isInList(regexlist []*regexp.Regexp, name string) bool { | ||
for _, regex := range regexlist { | ||
if regex.MatchString(name) { | ||
return true | ||
} | ||
} | ||
return false | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,79 @@ | ||
package imageshatag | ||
|
||
import ( | ||
"testing" | ||
|
||
"github.com/stretchr/testify/suite" | ||
|
||
"golang.stackrox.io/kube-linter/pkg/diagnostic" | ||
"golang.stackrox.io/kube-linter/pkg/lintcontext/mocks" | ||
"golang.stackrox.io/kube-linter/pkg/templates" | ||
"golang.stackrox.io/kube-linter/pkg/templates/imageshatag/internal/params" | ||
|
||
v1 "k8s.io/api/core/v1" | ||
) | ||
|
||
var ( | ||
containerName = "test-container" | ||
) | ||
|
||
func TestContainerImage(t *testing.T) { | ||
suite.Run(t, new(ContainerImageTestSuite)) | ||
} | ||
|
||
type ContainerImageTestSuite struct { | ||
templates.TemplateTestSuite | ||
|
||
ctx *mocks.MockLintContext | ||
} | ||
|
||
func (s *ContainerImageTestSuite) SetupTest() { | ||
s.Init(templateKey) | ||
s.ctx = mocks.NewMockContext() | ||
} | ||
|
||
func (s *ContainerImageTestSuite) addDeploymentWithContainerImage(name, containerImage string) { | ||
s.ctx.AddMockDeployment(s.T(), name) | ||
s.ctx.AddContainerToDeployment(s.T(), name, v1.Container{Name: containerName, Image: containerImage}) | ||
} | ||
|
||
func (s *ContainerImageTestSuite) TestImproperContainerImage() { | ||
const ( | ||
depwithNotAllowedImageTag = "dep-with-not-allowed-image-tag" | ||
) | ||
|
||
s.addDeploymentWithContainerImage(depwithNotAllowedImageTag, "example.com/test:latest") | ||
|
||
s.Validate(s.ctx, []templates.TestCase{ | ||
{ | ||
Param: params.Params{ | ||
AllowList: []string{".*:[a-fA-F0-9]{64}$"}, | ||
}, | ||
Diagnostics: map[string][]diagnostic.Diagnostic{ | ||
depwithNotAllowedImageTag: { | ||
{Message: "The container \"test-container\" is using an invalid container image, \"example.com/test:latest\". Please reference the image using a SHA256 tag."}, | ||
}, | ||
}, | ||
ExpectInstantiationError: false, | ||
}, | ||
}) | ||
} | ||
|
||
func (s *ContainerImageTestSuite) TestAcceptableContainerImage() { | ||
const ( | ||
depWithAcceptableImageTag = "dep-with-acceptable-container-image" | ||
) | ||
|
||
s.addDeploymentWithContainerImage(depWithAcceptableImageTag, "example.com/latest@sha256:75bf9b911b6481dcf29f7942240d1555adaa607eec7fc61bedb7f624f87c36d4") | ||
s.Validate(s.ctx, []templates.TestCase{ | ||
{ | ||
Param: params.Params{ | ||
AllowList: []string{".*:[a-fA-F0-9]{64}$"}, | ||
}, | ||
Diagnostics: map[string][]diagnostic.Diagnostic{ | ||
depWithAcceptableImageTag: nil, | ||
}, | ||
ExpectInstantiationError: false, | ||
}, | ||
}) | ||
} |
Oops, something went wrong.