123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293 |
- /*
- Copyright 2016 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package master
- import (
- "sync"
- "k8s.io/kubernetes/pkg/api/rest"
- "k8s.io/kubernetes/pkg/apis/rbac"
- rbacapiv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
- rbacvalidation "k8s.io/kubernetes/pkg/apis/rbac/validation"
- "k8s.io/kubernetes/pkg/genericapiserver"
- "k8s.io/kubernetes/pkg/registry/clusterrole"
- clusterroleetcd "k8s.io/kubernetes/pkg/registry/clusterrole/etcd"
- clusterrolepolicybased "k8s.io/kubernetes/pkg/registry/clusterrole/policybased"
- "k8s.io/kubernetes/pkg/registry/clusterrolebinding"
- clusterrolebindingetcd "k8s.io/kubernetes/pkg/registry/clusterrolebinding/etcd"
- clusterrolebindingpolicybased "k8s.io/kubernetes/pkg/registry/clusterrolebinding/policybased"
- "k8s.io/kubernetes/pkg/registry/role"
- roleetcd "k8s.io/kubernetes/pkg/registry/role/etcd"
- rolepolicybased "k8s.io/kubernetes/pkg/registry/role/policybased"
- "k8s.io/kubernetes/pkg/registry/rolebinding"
- rolebindingetcd "k8s.io/kubernetes/pkg/registry/rolebinding/etcd"
- rolebindingpolicybased "k8s.io/kubernetes/pkg/registry/rolebinding/policybased"
- )
- type RBACRESTStorageProvider struct {
- AuthorizerRBACSuperUser string
- }
- var _ RESTStorageProvider = &RBACRESTStorageProvider{}
- func (p RBACRESTStorageProvider) NewRESTStorage(apiResourceConfigSource genericapiserver.APIResourceConfigSource, restOptionsGetter RESTOptionsGetter) (genericapiserver.APIGroupInfo, bool) {
- apiGroupInfo := genericapiserver.NewDefaultAPIGroupInfo(rbac.GroupName)
- if apiResourceConfigSource.AnyResourcesForVersionEnabled(rbacapiv1alpha1.SchemeGroupVersion) {
- apiGroupInfo.VersionedResourcesStorageMap[rbacapiv1alpha1.SchemeGroupVersion.Version] = p.v1alpha1Storage(apiResourceConfigSource, restOptionsGetter)
- apiGroupInfo.GroupMeta.GroupVersion = rbacapiv1alpha1.SchemeGroupVersion
- }
- return apiGroupInfo, true
- }
- func (p RBACRESTStorageProvider) v1alpha1Storage(apiResourceConfigSource genericapiserver.APIResourceConfigSource, restOptionsGetter RESTOptionsGetter) map[string]rest.Storage {
- version := rbacapiv1alpha1.SchemeGroupVersion
- once := new(sync.Once)
- var authorizationRuleResolver rbacvalidation.AuthorizationRuleResolver
- newRuleValidator := func() rbacvalidation.AuthorizationRuleResolver {
- once.Do(func() {
- authorizationRuleResolver = rbacvalidation.NewDefaultRuleResolver(
- role.NewRegistry(roleetcd.NewREST(restOptionsGetter(rbac.Resource("roles")))),
- rolebinding.NewRegistry(rolebindingetcd.NewREST(restOptionsGetter(rbac.Resource("rolebindings")))),
- clusterrole.NewRegistry(clusterroleetcd.NewREST(restOptionsGetter(rbac.Resource("clusterroles")))),
- clusterrolebinding.NewRegistry(clusterrolebindingetcd.NewREST(restOptionsGetter(rbac.Resource("clusterrolebindings")))),
- )
- })
- return authorizationRuleResolver
- }
- storage := map[string]rest.Storage{}
- if apiResourceConfigSource.ResourceEnabled(version.WithResource("roles")) {
- rolesStorage := roleetcd.NewREST(restOptionsGetter(rbac.Resource("roles")))
- storage["roles"] = rolepolicybased.NewStorage(rolesStorage, newRuleValidator(), p.AuthorizerRBACSuperUser)
- }
- if apiResourceConfigSource.ResourceEnabled(version.WithResource("rolebindings")) {
- roleBindingsStorage := rolebindingetcd.NewREST(restOptionsGetter(rbac.Resource("rolebindings")))
- storage["rolebindings"] = rolebindingpolicybased.NewStorage(roleBindingsStorage, newRuleValidator(), p.AuthorizerRBACSuperUser)
- }
- if apiResourceConfigSource.ResourceEnabled(version.WithResource("clusterroles")) {
- clusterRolesStorage := clusterroleetcd.NewREST(restOptionsGetter(rbac.Resource("clusterroles")))
- storage["clusterroles"] = clusterrolepolicybased.NewStorage(clusterRolesStorage, newRuleValidator(), p.AuthorizerRBACSuperUser)
- }
- if apiResourceConfigSource.ResourceEnabled(version.WithResource("clusterrolebindings")) {
- clusterRoleBindingsStorage := clusterrolebindingetcd.NewREST(restOptionsGetter(rbac.Resource("clusterrolebindings")))
- storage["clusterrolebindings"] = clusterrolebindingpolicybased.NewStorage(clusterRoleBindingsStorage, newRuleValidator(), p.AuthorizerRBACSuperUser)
- }
- return storage
- }
|