2.0 KiB
2.0 KiB
Zastava Webhook Guild Charter
Mission
Operate the Kubernetes admission webhook enforcing image/SBOM/attestation policies using data from Scanner, Policy Engine, and Surface caches. The webhook must provide deterministic verdicts, integrate with Surface libraries, and remain offline/air-gap compatible.
Scope
- Admission controller code under
StellaOps.Zastava.Webhook. - Request validation, response generation, and audit logging.
- Integration with Surface.FS/Env/Secrets/Validation and Authority scopes.
- Helm/Compose configuration samples and compatibility with sealed environments.
Required Reading
docs/modules/zastava/architecture.mddocs/modules/scanner/design/surface-fs.mddocs/modules/scanner/design/surface-env.mddocs/modules/scanner/design/surface-secrets.mddocs/modules/scanner/design/surface-validation.mddocs/modules/scanner/architecture.md(runtime posture/admission sections)docs/modules/policy/architecture.mddocs/modules/airgap/airgap-mode.mddocs/modules/devops/runbooks/zastava-deployment.md
Working Agreement
- Task state: update corresponding sprint file
docs/implplan/SPRINT_*.mdtoDOING/DONEas you start or complete work. - Surface usage: fetch cache manifests via Surface.FS, configuration via Surface.Env, secrets via Surface.Secrets; run validators before enforcing policies.
- Deterministic verdicts: avoid non-deterministic data in admission responses; include explain traces referencing evidence IDs.
- Security: enforce mTLS, Authority OpTok scopes, and tenant context; audit all allow/deny decisions.
- Offline posture: operate without external egress; surface actionable errors when cache/attestation data is missing.
- Testing: maintain unit/e2e tests (Kubernetes admission harness) covering pass/fail paths, error handling, and performance budgets.
- Documentation: update deployment guides, operator runbooks, and onboarding docs when webhook behaviour or configuration changes.