mirror of
https://github.com/openappsec/attachment.git
synced 2025-06-28 16:41:03 +03:00
712 lines
30 KiB
Python
Executable File
712 lines
30 KiB
Python
Executable File
import os
|
|
import json
|
|
import logging
|
|
import base64
|
|
import secretgen
|
|
import sys
|
|
from kubernetes import client, config
|
|
from flask import Flask, request, jsonify, Response
|
|
|
|
app = Flask(__name__)
|
|
|
|
# Read agent image and tag from environment variables
|
|
AGENT_IMAGE = os.getenv('AGENT_IMAGE', 'ghcr.io/openappsec/agent')
|
|
AGENT_TAG = os.getenv('AGENT_TAG', 'latest')
|
|
FULL_AGENT_IMAGE = f"{AGENT_IMAGE}:{AGENT_TAG}"
|
|
|
|
config.load_incluster_config()
|
|
|
|
def configure_logging():
|
|
# Read the DEBUG_LEVEL from environment variables, defaulting to WARNING
|
|
DEBUG_LEVEL = os.getenv('DEBUG_LEVEL', 'WARNING').upper()
|
|
|
|
# Map the string value of DEBUG_LEVEL to actual logging level
|
|
logging_levels = {
|
|
'DEBUG': logging.DEBUG,
|
|
'INFO': logging.INFO,
|
|
'WARNING': logging.WARNING,
|
|
'ERROR': logging.ERROR,
|
|
'CRITICAL': logging.CRITICAL
|
|
}
|
|
|
|
# Set the logging level based on the environment variable
|
|
log_level = logging_levels.get(DEBUG_LEVEL, logging.INFO)
|
|
|
|
# Configure Flask's logger to handle the specified logging level
|
|
handler = logging.StreamHandler()
|
|
handler.setLevel(log_level)
|
|
formatter = logging.Formatter('%(asctime)s - %(levelname)s - %(message)s')
|
|
handler.setFormatter(formatter)
|
|
|
|
# Remove any existing handlers
|
|
if app.logger.hasHandlers():
|
|
app.logger.handlers.clear()
|
|
|
|
app.logger.addHandler(handler)
|
|
app.logger.setLevel(log_level)
|
|
|
|
# The sidecar container spec with configurable image
|
|
def get_sidecar_container():
|
|
app.logger.debug("Entering get_sidecar_container()")
|
|
token = os.getenv("TOKEN")
|
|
custom_fog_enabled = os.getenv("CUSTOM_FOG_ENABLED") == "true" # Check if it's set to "true"
|
|
fog_address = os.getenv("FOG_ADDRESS")
|
|
appsec_proxy = os.getenv("APPSEC_PROXY")
|
|
config_map_ref = os.getenv("CONFIG_MAP_REF")
|
|
secret_ref = os.getenv("SECRET_REF")
|
|
persistence_enabled = os.getenv("APPSEC_PERSISTENCE_ENABLED", "false").lower() == "true"
|
|
|
|
# Prepare the volumeMounts list
|
|
volume_mounts = [
|
|
{"name": "envoy-attachment-shared", "mountPath": "/envoy/attachment/shared/"},
|
|
{"name": "advanced-model", "mountPath": "/advanced-model"}
|
|
]
|
|
|
|
if persistence_enabled:
|
|
volume_mounts.extend([
|
|
{"name": "appsec-conf", "mountPath": "/etc/cp/conf"},
|
|
{"name": "appsec-data", "mountPath": "/etc/cp/data"}
|
|
])
|
|
|
|
args = []
|
|
if token:
|
|
args.extend(["--token", token])
|
|
else:
|
|
args.append("--hybrid-mode")
|
|
|
|
if custom_fog_enabled and fog_address:
|
|
args.extend(["--fog", fog_address])
|
|
|
|
if appsec_proxy:
|
|
args.extend(["--proxy", appsec_proxy])
|
|
|
|
optional_env_vars = {
|
|
"AGENT_TOKEN": os.getenv("AGENT_TOKEN"),
|
|
"user_email": os.getenv("user_email"),
|
|
"appsecClassName": os.getenv("appsecClassName"),
|
|
"SHARED_STORAGE_HOST": os.getenv("SHARED_STORAGE_HOST"),
|
|
"LEARNING_HOST": os.getenv("LEARNING_HOST"),
|
|
"TUNING_HOST": os.getenv("TUNING_HOST"),
|
|
"LOCAL_TUNING_ENABLED": os.getenv("LOCAL_TUNING_ENABLED"),
|
|
"PLAYGROUND": os.getenv("PLAYGROUND"),
|
|
"CRDS_SCOPE": os.getenv("CRDS_SCOPE"),
|
|
}
|
|
|
|
# Base environment variables
|
|
env = [
|
|
{"name": "registered_server", "value": "ISTIO Server"}
|
|
]
|
|
|
|
# Add optional environment variables if they are set
|
|
for var_name, var_value in optional_env_vars.items():
|
|
if var_value is not None: # Only add if the variable is set
|
|
env.append({"name": var_name, "value": var_value})
|
|
|
|
sidecar = {
|
|
"name": "infinity-next-nano-agent",
|
|
"image": FULL_AGENT_IMAGE,
|
|
"imagePullPolicy": "Always",
|
|
"command": ["/cp-nano-agent"],
|
|
"args": args,
|
|
"env": env,
|
|
"volumeMounts": volume_mounts,
|
|
"resources": {
|
|
"requests": {
|
|
"cpu": "200m"
|
|
}
|
|
},
|
|
"envFrom": [
|
|
{
|
|
"configMapRef": {
|
|
"name": config_map_ref
|
|
}
|
|
},
|
|
{
|
|
"secretRef": {
|
|
"name": secret_ref
|
|
}
|
|
}
|
|
],
|
|
"securityContext": {
|
|
"runAsNonRoot": False,
|
|
"runAsUser": 0
|
|
},
|
|
"terminationMessagePath": "/dev/termination-log",
|
|
"terminationMessagePolicy": "File"
|
|
}
|
|
app.logger.debug(f"Sidecar container spec: {sidecar}")
|
|
app.logger.debug("Exiting get_sidecar_container()")
|
|
return sidecar
|
|
|
|
def get_init_container():
|
|
# Define the initContainer you want to inject
|
|
init_container = {
|
|
"name": "prepare-attachment",
|
|
"image": FULL_AGENT_IMAGE,
|
|
"imagePullPolicy": "Always",
|
|
"command": [
|
|
"sh", "-c",
|
|
"mkdir -p /envoy/attachment/shared && cp -r /envoy/attachment/lib* /envoy/attachment/shared"
|
|
],
|
|
"volumeMounts": [
|
|
{
|
|
"mountPath": "/envoy/attachment/shared",
|
|
"name": "envoy-attachment-shared"
|
|
}
|
|
]
|
|
}
|
|
app.logger.debug(f"Init container spec: {init_container}")
|
|
app.logger.debug("Exiting get_init_container()")
|
|
return init_container
|
|
|
|
# The volume mount configuration for both the original and sidecar containers
|
|
def get_volume_mount():
|
|
app.logger.debug("Entering get_volume_mount()")
|
|
volume_mount = {
|
|
"name": "envoy-attachment-shared",
|
|
"mountPath": "/usr/lib/attachment/"
|
|
}
|
|
app.logger.debug(f"Volume mount spec: {volume_mount}")
|
|
app.logger.debug("Exiting get_volume_mount()")
|
|
return volume_mount
|
|
|
|
# Volume definition for the pod
|
|
def get_volume_definition():
|
|
app.logger.debug("Entering get_volume_definition()")
|
|
volume_def = {
|
|
"name": "envoy-attachment-shared",
|
|
"emptyDir": {}
|
|
}
|
|
app.logger.debug(f"Volume definition: {volume_def}")
|
|
app.logger.debug("Exiting get_volume_definition()")
|
|
return volume_def
|
|
|
|
def add_env_if_not_exist(containers, container_name, patches):
|
|
# Find the container by name
|
|
container = next((c for c in containers if c.get('name') == container_name), None)
|
|
|
|
if container:
|
|
# Get the existing environment variables (if any)
|
|
env_vars = container.get('env', None)
|
|
|
|
if env_vars is None:
|
|
# If no env variables exist, add an empty env array first
|
|
patches.append({
|
|
"op": "add",
|
|
"path": f"/spec/containers/{containers.index(container)}/env",
|
|
"value": []
|
|
})
|
|
|
|
def add_env_variable_value_from(containers, container_name, env_var_name, env_value, patches, value_from):
|
|
"""Adds or updates a specified environment variable in a given container."""
|
|
container_index = next((i for i, container in enumerate(containers) if container['name'] == container_name), None)
|
|
|
|
if container_index is not None:
|
|
env_vars = containers[container_index].get('env', [])
|
|
existing_env_var = next((env for env in env_vars if env['name'] == env_var_name), None)
|
|
|
|
if existing_env_var:
|
|
env_var_patch = {
|
|
"op": "replace",
|
|
"path": f"/spec/containers/{container_index}/env/{env_vars.index(existing_env_var)}",
|
|
"value": {"name": env_var_name, "valueFrom": value_from}
|
|
}
|
|
patches.append(env_var_patch)
|
|
app.logger.debug(f"Updated {env_var_name} environment variable in {container_name} container to use valueFrom.")
|
|
else:
|
|
env_var_patch = {
|
|
"op": "add",
|
|
"path": f"/spec/containers/{container_index}/env/-",
|
|
"value": {"name": env_var_name, "valueFrom": value_from}
|
|
}
|
|
patches.append(env_var_patch)
|
|
app.logger.debug(f"Added {env_var_name} environment variable with valueFrom to {container_name} container.")
|
|
else:
|
|
app.logger.warning(f"{container_name} container not found; no environment variable modification applied.")
|
|
|
|
def add_env_variable(containers, container_name, env_var_name, env_value, patches):
|
|
"""Adds or updates a specified environment variable in a given container."""
|
|
# Find the specified container by name
|
|
container_index = next((i for i, container in enumerate(containers) if container['name'] == container_name), None)
|
|
|
|
if container_index is not None:
|
|
# Get the list of environment variables for the specified container
|
|
env_vars = containers[container_index].get('env', [])
|
|
|
|
# Find the specified environment variable if it exists
|
|
existing_env_var = next((env for env in env_vars if env['name'] == env_var_name), None)
|
|
|
|
# If the environment variable exists, handle it based on its name
|
|
if existing_env_var:
|
|
current_value = existing_env_var['value']
|
|
|
|
if env_var_name == 'LD_LIBRARY_PATH':
|
|
# For LD_LIBRARY_PATH, append env_value if not already present
|
|
if env_value not in current_value:
|
|
new_value = f"{current_value}:{env_value}"
|
|
env_var_patch = {
|
|
"op": "replace",
|
|
"path": f"/spec/containers/{container_index}/env/{env_vars.index(existing_env_var)}/value",
|
|
"value": new_value
|
|
}
|
|
patches.append(env_var_patch)
|
|
app.logger.debug(f"Updated {env_var_name} environment variable in {container_name} container to new value.")
|
|
else:
|
|
app.logger.debug(f"{env_var_name} already exists with the correct value; no changes made.")
|
|
else:
|
|
# For other environment variables, replace the value directly
|
|
env_var_patch = {
|
|
"op": "replace",
|
|
"path": f"/spec/containers/{container_index}/env/{env_vars.index(existing_env_var)}/value",
|
|
"value": env_value
|
|
}
|
|
patches.append(env_var_patch)
|
|
app.logger.debug(f"Replaced {env_var_name} environment variable in {container_name} container with new value.")
|
|
|
|
else:
|
|
# Add the environment variable if it does not exist
|
|
env_var_patch = {
|
|
"op": "add",
|
|
"path": f"/spec/containers/{container_index}/env/-",
|
|
"value": {
|
|
"name": env_var_name,
|
|
"value": env_value
|
|
}
|
|
}
|
|
patches.append(env_var_patch)
|
|
app.logger.debug(f"Added {env_var_name} environment variable to {container_name} container.")
|
|
else:
|
|
app.logger.warning(f"{container_name} container not found; no environment variable modification applied.")
|
|
|
|
def remove_env_variable(containers, container_name, env_var_name, patches):
|
|
"""Removes a specified environment variable from a given container if it exists."""
|
|
# Find the specified container by name
|
|
container_index = next((i for i, container in enumerate(containers) if container['name'] == container_name), None)
|
|
|
|
if container_index is not None:
|
|
# Get the list of environment variables for the specified container
|
|
env_vars = containers[container_index].get('env', [])
|
|
|
|
# Check if the specified environment variable exists
|
|
env_var_exists = any(env['name'] == env_var_name for env in env_vars)
|
|
|
|
# Remove the environment variable if it exists
|
|
if env_var_exists:
|
|
# Find the index of the specified environment variable in the env array
|
|
env_var_index = next(i for i, env in enumerate(env_vars) if env['name'] == env_var_name)
|
|
patches.append({
|
|
"op": "remove",
|
|
"path": f"/spec/containers/{container_index}/env/{env_var_index}"
|
|
})
|
|
app.logger.debug(f"Removed {env_var_name} environment variable from {container_name} container.")
|
|
else:
|
|
app.logger.debug(f"{env_var_name} does not exist, nothing to remove.")
|
|
else:
|
|
app.logger.warning(f"{container_name} container not found; no environment variable modification applied.")
|
|
|
|
def create_or_update_envoy_filter(name, namespace, selector_label_name, selector_label_value):
|
|
api = client.CustomObjectsApi()
|
|
# Define the EnvoyFilter specification
|
|
envoy_filter_spec = {
|
|
"apiVersion": "networking.istio.io/v1alpha3",
|
|
"kind": "EnvoyFilter",
|
|
"metadata": {
|
|
"name": name,
|
|
"namespace": namespace,
|
|
"labels": {
|
|
"owner": "waf"
|
|
}
|
|
},
|
|
"spec": {
|
|
"workloadSelector": {
|
|
"labels": {
|
|
selector_label_name: selector_label_value
|
|
}
|
|
},
|
|
"configPatches": [
|
|
{
|
|
"applyTo": "HTTP_FILTER",
|
|
"match": {
|
|
"context": "GATEWAY",
|
|
"listener": {
|
|
"filterChain": {
|
|
"filter": {
|
|
"name": "envoy.filters.network.http_connection_manager"
|
|
}
|
|
}
|
|
}
|
|
},
|
|
"patch": {
|
|
"operation": "INSERT_BEFORE",
|
|
"value": {
|
|
"name": "envoy.filters.http.golang",
|
|
"typed_config": {
|
|
"@type": "type.googleapis.com/envoy.extensions.filters.http.golang.v3alpha.Config",
|
|
"library_id": "cp_nano_filter",
|
|
"library_path": "/usr/lib/attachment/libenvoy_attachment.so",
|
|
"plugin_name": "cp_nano_filter",
|
|
"plugin_config": {
|
|
"@type": "type.googleapis.com/xds.type.v3.TypedStruct",
|
|
"type_url": "type.googleapis.com/envoy.extensions.filters.http.golang.v3alpha.PluginConfig",
|
|
"value": {
|
|
"prefix_localreply_body": "Configured local reply from go"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
|
|
# Check if the EnvoyFilter exists
|
|
try:
|
|
existing_envoy_filter = api.get_namespaced_custom_object(
|
|
group="networking.istio.io",
|
|
version="v1alpha3",
|
|
namespace=namespace,
|
|
plural="envoyfilters",
|
|
name=name
|
|
)
|
|
|
|
# Compare workloadSelector labels
|
|
existing_labels = existing_envoy_filter.get("spec", {}).get("workloadSelector", {}).get("labels", {})
|
|
new_labels = envoy_filter_spec["spec"]["workloadSelector"]["labels"]
|
|
|
|
if existing_labels == new_labels:
|
|
app.logger.info(f"EnvoyFilter '{name}' already exists with matching selector labels.")
|
|
return
|
|
else:
|
|
# Update the existing EnvoyFilter's workloadSelector labels
|
|
existing_envoy_filter["spec"]["workloadSelector"]["labels"] = new_labels
|
|
api.replace_namespaced_custom_object(
|
|
group="networking.istio.io",
|
|
version="v1alpha3",
|
|
namespace=namespace,
|
|
plural="envoyfilters",
|
|
name=name,
|
|
body=existing_envoy_filter
|
|
)
|
|
app.logger.info(f"EnvoyFilter '{name}' updated successfully with new selector labels.")
|
|
return
|
|
|
|
except client.exceptions.ApiException as e:
|
|
if e.status == 404:
|
|
# EnvoyFilter doesn't exist, proceed with creation
|
|
api.create_namespaced_custom_object(
|
|
group="networking.istio.io",
|
|
version="v1alpha3",
|
|
namespace=namespace,
|
|
plural="envoyfilters",
|
|
body=envoy_filter_spec
|
|
)
|
|
app.logger.info(f"EnvoyFilter '{name}' created successfully.")
|
|
|
|
def remove_envoy_filter_by_selector(namespace, selector_label_name, selector_label_value):
|
|
api = client.CustomObjectsApi()
|
|
try:
|
|
# List all EnvoyFilters in the namespace
|
|
existing_envoy_filters = api.list_namespaced_custom_object(
|
|
group="networking.istio.io",
|
|
version="v1alpha3",
|
|
namespace=namespace,
|
|
plural="envoyfilters"
|
|
)
|
|
|
|
# Check if there is any EnvoyFilter with the same selector labels
|
|
for item in existing_envoy_filters.get("items", []):
|
|
workload_selector = item["spec"].get("workloadSelector", {}).get("labels", {})
|
|
if workload_selector.get(selector_label_name) == selector_label_value:
|
|
# Delete the matching EnvoyFilter
|
|
api.delete_namespaced_custom_object(
|
|
group="networking.istio.io",
|
|
version="v1alpha3",
|
|
namespace=namespace,
|
|
plural="envoyfilters",
|
|
name=item["metadata"]["name"],
|
|
body=client.V1DeleteOptions()
|
|
)
|
|
print(f"EnvoyFilter '{item['metadata']['name']}' with matching selector labels deleted successfully.")
|
|
return
|
|
print("No EnvoyFilter found with the specified selector labels.")
|
|
|
|
except client.exceptions.ApiException as e:
|
|
print(f"Failed to delete EnvoyFilter: {e}")
|
|
|
|
@app.route('/mutate', methods=['POST'])
|
|
def mutate():
|
|
app.logger.debug("Received request to mutate deployment.")
|
|
|
|
try:
|
|
request_data = request.get_json()
|
|
app.logger.debug("Admission Review Request: %s", json.dumps(request_data, indent=2))
|
|
except Exception as e:
|
|
app.logger.error("Failed to parse request JSON: %s", str(e))
|
|
return Response(status=400)
|
|
|
|
# Extract the UID and the object from the request
|
|
uid = request_data.get('request', {}).get('uid', '')
|
|
obj = request_data.get('request', {}).get('object', {})
|
|
namespace = request_data.get("request", {}).get("namespace")
|
|
app.logger.debug("Extracted UID: %s", uid)
|
|
app.logger.debug("Extracted Object: %s", json.dumps(obj, indent=2))
|
|
|
|
# Initialize patches
|
|
patches = []
|
|
|
|
# Extract deployment annotations and spec
|
|
annotations = obj.get('metadata', {}).get('annotations', {})
|
|
spec = obj.get('spec', {})
|
|
app.logger.debug("Current annotations: %s", json.dumps(annotations, indent=2))
|
|
app.logger.debug("Deployment spec: %s", json.dumps(spec, indent=2))
|
|
|
|
# Check if the 'original-configuration' annotation already exists
|
|
if 'original-configuration' not in annotations:
|
|
app.logger.debug("Original configuration annotation not found, storing original spec.")
|
|
# Store the original spec in an annotation as a JSON string
|
|
original_spec_json = json.dumps(spec)
|
|
patches.append({
|
|
"op": "add",
|
|
"path": "/metadata/annotations/original-configuration",
|
|
"value": original_spec_json
|
|
})
|
|
app.logger.debug("Added original-configuration annotation patch: %s", patches[-1])
|
|
|
|
# Extract containers and check if sidecar exists
|
|
containers = obj.get('spec', {}).get('containers', [])
|
|
init_containers = obj.get('spec', {}).get('initContainers', [])
|
|
volumes = obj.get('spec', {}).get('volumes', [])
|
|
app.logger.debug("Current containers in the pod: %s", json.dumps(containers, indent=2))
|
|
sidecar_exists = any(container['name'] == 'infinity-next-nano-agent' for container in containers)
|
|
init_container_exist = any(init_container['name'] == 'prepare-attachment' for init_container in init_containers)
|
|
volume_exist = any(volume['name'] == 'envoy-attachment-shared' for volume in volumes)
|
|
app.logger.debug("Does sidecar 'infinity-next-nano-agent' exist? %s", sidecar_exists)
|
|
|
|
# Determine if we should remove the injected data
|
|
REMOVE_WAF = os.getenv('REMOVE_INJECTED_DATA', 'false').lower() == 'true'
|
|
DEPLOY_FILTER = os.getenv('DEPLOY_ENVOY_FILTER', 'false').lower() == 'true'
|
|
|
|
ISTIO_CONTAINER_NAME = os.getenv('ISTIO_CONTAINER_NAME', 'istio-proxy')
|
|
LIBRARY_PATH_VALUE = os.getenv('LIBRARY_PATH_VALUE', '/usr/lib/attachment')
|
|
SELECTOR_LABEL_NAME = os.getenv("SELECTOR_LABEL_NAME")
|
|
SELECTOR_LABEL_VALUE = os.getenv("SELECTOR_LABEL_VALUE")
|
|
CONCURRENCY_CALC_VALUE = os.getenv('CONCURRENCY_CALC')
|
|
CONFIG_PORT_VALUE = os.getenv('CONFIG_PORT')
|
|
CONCURRENCY_NUMBER_VALUE = os.getenv('CONCURRENCY_NUMBER')
|
|
if REMOVE_WAF:
|
|
if DEPLOY_FILTER and SELECTOR_LABEL_NAME and SELECTOR_LABEL_VALUE:
|
|
remove_envoy_filter_by_selector(namespace, SELECTOR_LABEL_NAME, SELECTOR_LABEL_VALUE)
|
|
|
|
app.logger.debug("Removing injected sidecar and associated resources.")
|
|
|
|
# Remove ld library path env variable
|
|
if ISTIO_CONTAINER_NAME:
|
|
if CONCURRENCY_NUMBER_VALUE:
|
|
remove_env_variable(containers, ISTIO_CONTAINER_NAME, 'CONCURRENCY_NUMBER', patches)
|
|
if CONFIG_PORT_VALUE:
|
|
remove_env_variable(containers, ISTIO_CONTAINER_NAME, 'CONFIG_PORT', patches)
|
|
if CONCURRENCY_CALC_VALUE:
|
|
remove_env_variable(containers, ISTIO_CONTAINER_NAME, 'CONCURRENCY_CALC', patches)
|
|
if LIBRARY_PATH_VALUE:
|
|
remove_env_variable(containers, ISTIO_CONTAINER_NAME, 'LD_LIBRARY_PATH', patches)
|
|
|
|
if 'shareProcessNamespace' in obj.get('spec', {}):
|
|
patches.append({
|
|
"op": "remove",
|
|
"path": "/spec/shareProcessNamespace"
|
|
})
|
|
app.logger.debug("Removed shareProcessNamespace patch")
|
|
else:
|
|
app.logger.debug("shareProcessNamespace not found; no patch to remove it")
|
|
|
|
# Remove the init container if it exists
|
|
if init_container_exist:
|
|
for idx, init_container in enumerate(init_containers):
|
|
if init_container['name'] == 'prepare-attachment':
|
|
patches.append({
|
|
"op": "remove",
|
|
"path": f"/spec/initContainers/{idx}"
|
|
})
|
|
app.logger.debug(f"Removed init container patch: {patches[-1]}")
|
|
break # Stop once we find and remove the target container
|
|
|
|
# Remove the sidecar container if it exists
|
|
if sidecar_exists:
|
|
for idx, container in enumerate(containers):
|
|
volume_mounts = container.get('volumeMounts', [])
|
|
for idx_v, volume_mount in enumerate(volume_mounts):
|
|
if volume_mount['name'] == 'envoy-attachment-shared':
|
|
patches.append({
|
|
"op": "remove",
|
|
"path": f"/spec/containers/{idx}/volumeMounts/{idx_v}"
|
|
})
|
|
app.logger.debug(f"Removed volumeMount: {patches[-1]}")
|
|
if container['name'] == 'infinity-next-nano-agent':
|
|
patches.append({
|
|
"op": "remove",
|
|
"path": f"/spec/containers/{idx}"
|
|
})
|
|
app.logger.debug(f"Removed sidecar container patch: {patches[-1]}")
|
|
|
|
# Remove the volume if it exists
|
|
if volume_exist:
|
|
for idx, volume in enumerate(volumes):
|
|
if volume['name'] == 'envoy-attachment-shared':
|
|
patches.append({
|
|
"op": "remove",
|
|
"path": f"/spec/volumes/{idx}"
|
|
})
|
|
app.logger.debug(f"Removed volume patch: {patches[-1]}")
|
|
break # Stop once we find and remove the target container
|
|
|
|
else:
|
|
app.logger.debug("Before if: Sidecar 'infinity-next-nano-agent' does not exist. Preparing to add it.")
|
|
|
|
# Define the sidecar container
|
|
sidecar = get_sidecar_container()
|
|
|
|
# Define the init container()
|
|
init_container = get_init_container()
|
|
|
|
# Define the volume mount for istio-proxy
|
|
volume_mount = get_volume_mount()
|
|
|
|
# Define the volume
|
|
volume_def = get_volume_definition()
|
|
|
|
if ISTIO_CONTAINER_NAME:
|
|
add_env_if_not_exist(containers, ISTIO_CONTAINER_NAME, patches)
|
|
add_env_variable_value_from(containers, ISTIO_CONTAINER_NAME, 'OPENAPPSEC_UID', None, patches, value_from={"fieldRef": {"fieldPath": "metadata.uid"}})
|
|
if LIBRARY_PATH_VALUE:
|
|
add_env_variable(containers, ISTIO_CONTAINER_NAME, 'LD_LIBRARY_PATH', LIBRARY_PATH_VALUE, patches)
|
|
if CONCURRENCY_CALC_VALUE:
|
|
add_env_variable(containers, ISTIO_CONTAINER_NAME, 'CONCURRENCY_CALC', CONCURRENCY_CALC_VALUE, patches)
|
|
if CONFIG_PORT_VALUE:
|
|
add_env_variable(containers, ISTIO_CONTAINER_NAME, 'CONFIG_PORT', CONFIG_PORT_VALUE, patches)
|
|
if CONCURRENCY_NUMBER_VALUE:
|
|
add_env_variable(containers, ISTIO_CONTAINER_NAME, 'CONCURRENCY_NUMBER', CONCURRENCY_NUMBER_VALUE, patches)
|
|
else:
|
|
app.logger.debug("ISTIO_CONTAINER_NAME skipping environment variable addition")
|
|
|
|
# Add the sidecar container
|
|
if not sidecar_exists:
|
|
|
|
# Add shareProcessNamespace if not already set
|
|
patches.append({
|
|
"op": "add",
|
|
"path": "/spec/shareProcessNamespace",
|
|
"value": True
|
|
})
|
|
app.logger.debug("Added shareProcessNamespace patch")
|
|
|
|
patches.append({
|
|
"op": "add",
|
|
"path": "/spec/containers/-",
|
|
"value": sidecar
|
|
})
|
|
app.logger.debug("Added sidecar container patch: %s", patches[-1])
|
|
|
|
# Add the volume mount to istio-proxy container (assumes istio-proxy is first container)
|
|
patches.append({
|
|
"op": "add",
|
|
"path": "/spec/containers/0/volumeMounts/-",
|
|
"value": volume_mount
|
|
})
|
|
app.logger.debug("Added volume mount patch to istio-proxy: %s", patches[-1])
|
|
|
|
# Add the new volume definition
|
|
patches.append({
|
|
"op": "add",
|
|
"path": "/spec/volumes/-",
|
|
"value": volume_def
|
|
})
|
|
app.logger.debug("Added volume definition patch: %s", patches[-1])
|
|
|
|
if DEPLOY_FILTER and SELECTOR_LABEL_NAME and SELECTOR_LABEL_VALUE:
|
|
RELEASE_NAME = os.getenv('RELEASE_NAME', 'openappsec-waf-injected')
|
|
envoy_filter_name = RELEASE_NAME + "-waf-filter"
|
|
create_or_update_envoy_filter(envoy_filter_name, namespace, SELECTOR_LABEL_NAME, SELECTOR_LABEL_VALUE)
|
|
else:
|
|
app.logger.debug("Before else: Sidecar 'infinity-next-nano-agent' already exists. Checking for image updates.")
|
|
|
|
# Optionally, update the sidecar image and tag if necessary
|
|
for idx, container in enumerate(containers):
|
|
if container['name'] == 'infinity-next-nano-agent':
|
|
current_image = container.get('image', '')
|
|
app.logger.debug("Current sidecar image: %s", current_image)
|
|
app.logger.debug("Desired sidecar image: %s", FULL_AGENT_IMAGE)
|
|
if current_image != FULL_AGENT_IMAGE:
|
|
patches.append({
|
|
"op": "replace",
|
|
"path": f"/spec/containers/{idx}/image",
|
|
"value": FULL_AGENT_IMAGE
|
|
})
|
|
app.logger.debug(f"Updated sidecar image patch: {patches[-1]}")
|
|
break # Sidecar found and handled
|
|
|
|
if not init_container_exist:
|
|
# Add the initContainer to the pod spec in the deployment
|
|
if 'initContainers' in obj['spec']:
|
|
obj['spec']['initContainers'].append(init_container)
|
|
else:
|
|
obj['spec']['initContainers'] = [init_container]
|
|
|
|
patches.append({
|
|
"op": "add",
|
|
"path": "/spec/initContainers",
|
|
"value": obj['spec']['initContainers']
|
|
})
|
|
else:
|
|
app.logger.debug("Before else: init-container 'prepare-attachment' already exists. Checking for image updates.")
|
|
|
|
# Optionally, update the sidecar image and tag if necessary
|
|
for idx, container in enumerate(containers):
|
|
if container['name'] == 'prepare-attachment':
|
|
current_image = container.get('image', '')
|
|
app.logger.debug("Current init container image: %s", current_image)
|
|
app.logger.debug("Desired init container image: %s", FULL_AGENT_IMAGE)
|
|
if current_image != FULL_AGENT_IMAGE:
|
|
patches.append({
|
|
"op": "replace",
|
|
"path": f"/spec/containers/{idx}/image",
|
|
"value": FULL_AGENT_IMAGE
|
|
})
|
|
app.logger.debug(f"Updated sidecar image patch: {patches[-1]}")
|
|
break # Sidecar found and handled
|
|
|
|
|
|
app.logger.info("Total patches: %s", json.dumps(patches, indent=2))
|
|
|
|
# Prepare the AdmissionReview response
|
|
admission_response = {
|
|
"kind": "AdmissionReview",
|
|
"apiVersion": "admission.k8s.io/v1",
|
|
"response": {
|
|
"uid": uid,
|
|
"allowed": True,
|
|
"patchType": "JSONPatch",
|
|
"patch": base64.b64encode(json.dumps(patches).encode('utf-8')).decode('utf-8')
|
|
}
|
|
}
|
|
app.logger.debug("Sending admission response: %s", json.dumps(admission_response, indent=2))
|
|
|
|
return jsonify(admission_response)
|
|
|
|
if __name__ == '__main__':
|
|
# Configure logger
|
|
configure_logging()
|
|
|
|
# Ensure certificates exist
|
|
secretgen.main()
|
|
if not os.path.exists("/certs/server.crt") or not os.path.exists("/certs/server.key"):
|
|
print("Error: Certificates not found. Exiting...")
|
|
exit(1)
|
|
|
|
cli = sys.modules['flask.cli']
|
|
cli.show_server_banner = lambda *x: None
|
|
|
|
# Run the Flask app with the generated certificates
|
|
app.run(host='0.0.0.0', port=443, ssl_context=('/certs/server.crt', '/certs/server.key'))
|
|
|