Skip to content

Commit 57bf4ac

Browse files
authored
refactor: add clusterUuid and webhookVersion to clusterRequestMetadata (#382)
* refactor: add clusterUuid and webhookVersion to clusterRequestMetadata * improve uninstall script * improve uninstall script * improve uninstall script
1 parent c4e7cb4 commit 57bf4ac

File tree

3 files changed

+11
-3
lines changed

3 files changed

+11
-3
lines changed

pkg/clients/cliServiceClient.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,8 @@ func (c *CliClient) SendEvaluationResult(request *cliClient.EvaluationResultRequ
112112
}
113113

114114
type ClusterRequestMetadata struct {
115+
ClusterUuid k8sTypes.UID `json:"clusterUuid"`
116+
WebhookVersion string `json:"webhookVersion"`
115117
CliEvaluationId int `json:"cliEvaluationId"`
116118
Token string `json:"token"`
117119
Skipped bool `json:"skipped"`

pkg/services/validationService.go

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ func (vs *ValidationService) Validate(admissionReviewReq *admission.AdmissionRev
7777
namespace, resourceKind, resourceName, managers := getResourceMetadata(admissionReviewReq, rootObject)
7878

7979
saveMetadataAndReturnAResponseForSkippedResource := func() (admissionReview *admission.AdmissionReview, isSkipped bool) {
80-
clusterRequestMetadata := getClusterRequestMetadata(cliEvaluationId, token, true, true, resourceKind, resourceName, managers, clusterK8sVersion, "", namespace, server.ConfigMapScanningFilters)
80+
clusterRequestMetadata := getClusterRequestMetadata(vs.State.GetClusterUuid(), vs.State.GetServiceVersion(), cliEvaluationId, token, true, true, resourceKind, resourceName, managers, clusterK8sVersion, "", namespace, server.ConfigMapScanningFilters)
8181
vs.saveRequestMetadataLogInAggregator(clusterRequestMetadata)
8282
return ParseEvaluationResponseIntoAdmissionReview(admissionReviewReq.Request.UID, true, msg, *warningMessages), true
8383
}
@@ -220,7 +220,7 @@ func (vs *ValidationService) Validate(admissionReviewReq *admission.AdmissionRev
220220
}
221221
}
222222

223-
clusterRequestMetadata := getClusterRequestMetadata(cliEvaluationId, token, false, allowed, resourceKind, resourceName, managers, clusterK8sVersion, vs.State.GetPolicyName(), namespace, server.ConfigMapScanningFilters)
223+
clusterRequestMetadata := getClusterRequestMetadata(vs.State.GetClusterUuid(), vs.State.GetServiceVersion(), cliEvaluationId, token, false, allowed, resourceKind, resourceName, managers, clusterK8sVersion, vs.State.GetPolicyName(), namespace, server.ConfigMapScanningFilters)
224224
vs.saveRequestMetadataLogInAggregator(clusterRequestMetadata)
225225
return ParseEvaluationResponseIntoAdmissionReview(admissionReviewReq.Request.UID, allowed, msg, *warningMessages), false
226226
}
@@ -453,10 +453,12 @@ func (vs *ValidationService) getEvaluationRequestData(policyName string,
453453
return evaluationRequestData
454454
}
455455

456-
func getClusterRequestMetadata(cliEvaluationId int, token string, skipped bool, allowed bool, resourceKind string, resourceName string,
456+
func getClusterRequestMetadata(clusterUuid k8sTypes.UID, webhookVersion string, cliEvaluationId int, token string, skipped bool, allowed bool, resourceKind string, resourceName string,
457457
managers []string, clusterK8sVersion string, policyName string, namespace string, configMapScanningFilters server.ConfigMapScanningFiltersType) *cliClient.ClusterRequestMetadata {
458458

459459
clusterRequestMetadata := &cliClient.ClusterRequestMetadata{
460+
ClusterUuid: clusterUuid,
461+
WebhookVersion: webhookVersion,
460462
CliEvaluationId: cliEvaluationId,
461463
Token: token,
462464
Skipped: skipped,

scripts/uninstall.sh

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,10 @@ kubectl delete clusterrole/cluster-scanner-role
2020
# misc
2121
kubectl delete job/datree-wait-server-ready-hook-post-install -n $NAMESPACE
2222
kubectl label namespace kube-system admission.datree/validate-
23+
kubectl delete clusterrole/datree-validationwebhook-delete
24+
kubectl delete clusterrolebinding/datree-validationwebhook-delete
25+
kubectl delete clusterrole/datree-namespaces-update
26+
kubectl delete clusterrolebinding/datree-namespaces-update
2327

2428
# namespace
2529
kubectl delete namespace/datree

0 commit comments

Comments
 (0)