A template repository for building external data providers for Gatekeeper.
-
Create a kind cluster.
-
Install the latest version of Gatekeeper and enable the external data feature.
# Add the Gatekeeper Helm repository
helm repo add gatekeeper https://open-policy-agent.github.io/gatekeeper/charts
# Install the latest version of Gatekeeper with the external data feature enabled.
helm install gatekeeper/gatekeeper \
--set enableExternalData=true \
--name-template=gatekeeper \
--namespace gatekeeper-system \
--create-namespace
- Build and deploy the external data provider.
git clone https://github.com/open-policy-agent/gatekeeper-external-data-provider.git
cd external-data-provider
# if you are not planning to establish mTLS between the provider and Gatekeeper,
# deploy the provider to a separate namespace. Otherwise, do not run the following command
# and deploy the provider to the same namespace as Gatekeeper.
export NAMESPACE=provider-system
# generate a self-signed certificate for the external data provider
./scripts/generate-tls-cert.sh
# build the image via docker buildx
make docker-buildx
# load the image into kind
make kind-load-image
# Choose one of the following ways to deploy the external data provider:
# 1. client and server auth enabled (recommended)
helm install external-data-provider charts/external-data-provider \
--set provider.tls.caBundle="$(cat certs/ca.crt | base64 | tr -d '\n\r')" \
--namespace "${NAMESPACE:-gatekeeper-system}"
# 2. client auth disabled and server auth enabled
helm install external-data-provider charts/external-data-provider \
--set clientCAFile="" \
--set provider.tls.caBundle="$(cat certs/ca.crt | base64 | tr -d '\n\r')" \
--namespace "${NAMESPACE:-gatekeeper-system}" \
--create-namespace
4a. Install constraint template and constraint.
kubectl apply -f validation/external-data-provider-constraint-template.yaml
kubectl apply -f validation/external-data-provider-constraint.yaml
4b. Test the external data provider by dry-running the following command:
kubectl run nginx --image=error_nginx --dry-run=server -ojson
Gatekeeper should deny the pod admission above because the image field has an error_nginx
prefix.
Error from server (Forbidden): admission webhook "validation.gatekeeper.sh" denied the request: [deny-images-with-invalid-suffix] invalid response: {"errors": [["error_nginx", "error_nginx_invalid"]], "responses": [], "status_code": 200, "system_error": ""}
5a. Install Assign mutation.
kubectl apply -f mutation/external-data-provider-mutation.yaml
5b. Test the external data provider by dry-running the following command:
kubectl run nginx --image=nginx --dry-run=server -ojson
The expected JSON output should have the following image field with _valid
appended by the external data provider:
"containers": [
{
"name": "nginx",
"image": "nginx_valid",
...
}
]
- Uninstall the external data provider and Gatekeeper.
kubectl delete -f validation/
kubectl delete -f mutation/
helm uninstall external-data-provider --namespace "${NAMESPACE:-gatekeeper-system}"
helm uninstall gatekeeper --namespace gatekeeper-system