Merge pull request #39945 from sttts/sttts-cutoff-pkg-serviceaccount-dep
Automatic merge from submit-queue genericapiserver: cut off pkg/serviceaccount dependency **Blocked** by pkg/api/validation/genericvalidation to be split up and moved into apimachinery.
This commit is contained in:
@@ -25,7 +25,7 @@ kube::golang::setup_env
|
|||||||
|
|
||||||
|
|
||||||
for dep in $(ls -1 ${KUBE_ROOT}/staging/src/k8s.io/); do
|
for dep in $(ls -1 ${KUBE_ROOT}/staging/src/k8s.io/); do
|
||||||
if go list -f {{.Deps}} ./vendor/k8s.io/${dep}/... | sed 's/ /\n/g' - | grep k8s.io/kubernetes | grep -v 'k8s.io/kubernetes/vendor' | LC_ALL=C sort -u | grep -e "."; then
|
if go list -f {{.Deps}} ./vendor/k8s.io/${dep}/... | tr " " '\n' | grep k8s.io/kubernetes | grep -v 'k8s.io/kubernetes/vendor' | LC_ALL=C sort -u | grep -e "."; then
|
||||||
echo "${dep} has a cyclical dependency"
|
echo "${dep} has a cyclical dependency"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
@@ -33,6 +33,7 @@ go_library(
|
|||||||
"//vendor:github.com/exponent-io/jsonpath",
|
"//vendor:github.com/exponent-io/jsonpath",
|
||||||
"//vendor:github.com/golang/glog",
|
"//vendor:github.com/golang/glog",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/api/meta",
|
"//vendor:k8s.io/apimachinery/pkg/api/meta",
|
||||||
|
"//vendor:k8s.io/apimachinery/pkg/api/validation",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1",
|
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1/unstructured",
|
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1/unstructured",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1/validation",
|
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1/validation",
|
||||||
|
@@ -12,12 +12,13 @@ go_library(
|
|||||||
name = "go_default_library",
|
name = "go_default_library",
|
||||||
srcs = [
|
srcs = [
|
||||||
"doc.go",
|
"doc.go",
|
||||||
"validation.go",
|
"objectmeta.go",
|
||||||
],
|
],
|
||||||
tags = ["automanaged"],
|
tags = ["automanaged"],
|
||||||
deps = [
|
deps = [
|
||||||
"//pkg/api:go_default_library",
|
"//pkg/api:go_default_library",
|
||||||
"//pkg/api/v1:go_default_library",
|
"//pkg/api/v1:go_default_library",
|
||||||
|
"//vendor:k8s.io/apimachinery/pkg/api/validation",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1",
|
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1/validation",
|
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1/validation",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/runtime/schema",
|
"//vendor:k8s.io/apimachinery/pkg/runtime/schema",
|
||||||
@@ -29,11 +30,12 @@ go_library(
|
|||||||
|
|
||||||
go_test(
|
go_test(
|
||||||
name = "go_default_test",
|
name = "go_default_test",
|
||||||
srcs = ["validation_test.go"],
|
srcs = ["objectmeta_test.go"],
|
||||||
library = ":go_default_library",
|
library = ":go_default_library",
|
||||||
tags = ["automanaged"],
|
tags = ["automanaged"],
|
||||||
deps = [
|
deps = [
|
||||||
"//pkg/api:go_default_library",
|
"//pkg/api:go_default_library",
|
||||||
|
"//vendor:k8s.io/apimachinery/pkg/api/validation",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1",
|
"//vendor:k8s.io/apimachinery/pkg/apis/meta/v1",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/util/validation/field",
|
"//vendor:k8s.io/apimachinery/pkg/util/validation/field",
|
||||||
],
|
],
|
||||||
|
@@ -20,6 +20,7 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
apimachineyvalidation "k8s.io/apimachinery/pkg/api/validation"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
v1validation "k8s.io/apimachinery/pkg/apis/meta/v1/validation"
|
v1validation "k8s.io/apimachinery/pkg/apis/meta/v1/validation"
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
@@ -34,7 +35,6 @@ import (
|
|||||||
// fields by default.
|
// fields by default.
|
||||||
var RepairMalformedUpdates bool = true
|
var RepairMalformedUpdates bool = true
|
||||||
|
|
||||||
const IsNegativeErrorMsg string = `must be greater than or equal to 0`
|
|
||||||
const FieldImmutableErrorMsg string = `field is immutable`
|
const FieldImmutableErrorMsg string = `field is immutable`
|
||||||
|
|
||||||
const totalAnnotationSizeLimitB int = 256 * (1 << 10) // 256 kB
|
const totalAnnotationSizeLimitB int = 256 * (1 << 10) // 256 kB
|
||||||
@@ -44,67 +44,8 @@ var BannedOwners = map[schema.GroupVersionKind]struct{}{
|
|||||||
v1.SchemeGroupVersion.WithKind("Event"): {},
|
v1.SchemeGroupVersion.WithKind("Event"): {},
|
||||||
}
|
}
|
||||||
|
|
||||||
// ValidateNameFunc validates that the provided name is valid for a given resource type.
|
|
||||||
// Not all resources have the same validation rules for names. Prefix is true
|
|
||||||
// if the name will have a value appended to it. If the name is not valid,
|
|
||||||
// this returns a list of descriptions of individual characteristics of the
|
|
||||||
// value that were not valid. Otherwise this returns an empty list or nil.
|
|
||||||
type ValidateNameFunc func(name string, prefix bool) []string
|
|
||||||
|
|
||||||
// NameIsDNSSubdomain is a ValidateNameFunc for names that must be a DNS subdomain.
|
|
||||||
func NameIsDNSSubdomain(name string, prefix bool) []string {
|
|
||||||
if prefix {
|
|
||||||
name = maskTrailingDash(name)
|
|
||||||
}
|
|
||||||
return validation.IsDNS1123Subdomain(name)
|
|
||||||
}
|
|
||||||
|
|
||||||
// NameIsDNSLabel is a ValidateNameFunc for names that must be a DNS 1123 label.
|
|
||||||
func NameIsDNSLabel(name string, prefix bool) []string {
|
|
||||||
if prefix {
|
|
||||||
name = maskTrailingDash(name)
|
|
||||||
}
|
|
||||||
return validation.IsDNS1123Label(name)
|
|
||||||
}
|
|
||||||
|
|
||||||
// NameIsDNS1035Label is a ValidateNameFunc for names that must be a DNS 952 label.
|
|
||||||
func NameIsDNS1035Label(name string, prefix bool) []string {
|
|
||||||
if prefix {
|
|
||||||
name = maskTrailingDash(name)
|
|
||||||
}
|
|
||||||
return validation.IsDNS1035Label(name)
|
|
||||||
}
|
|
||||||
|
|
||||||
// ValidateNamespaceName can be used to check whether the given namespace name is valid.
|
|
||||||
// Prefix indicates this name will be used as part of generation, in which case
|
|
||||||
// trailing dashes are allowed.
|
|
||||||
var ValidateNamespaceName = NameIsDNSLabel
|
|
||||||
|
|
||||||
// ValidateClusterName can be used to check whether the given cluster name is valid.
|
// ValidateClusterName can be used to check whether the given cluster name is valid.
|
||||||
var ValidateClusterName = NameIsDNS1035Label
|
var ValidateClusterName = apimachineyvalidation.NameIsDNS1035Label
|
||||||
|
|
||||||
// ValidateServiceAccountName can be used to check whether the given service account name is valid.
|
|
||||||
// Prefix indicates this name will be used as part of generation, in which case
|
|
||||||
// trailing dashes are allowed.
|
|
||||||
var ValidateServiceAccountName = NameIsDNSSubdomain
|
|
||||||
|
|
||||||
// maskTrailingDash replaces the final character of a string with a subdomain safe
|
|
||||||
// value if is a dash.
|
|
||||||
func maskTrailingDash(name string) string {
|
|
||||||
if strings.HasSuffix(name, "-") {
|
|
||||||
return name[:len(name)-2] + "a"
|
|
||||||
}
|
|
||||||
return name
|
|
||||||
}
|
|
||||||
|
|
||||||
// Validates that given value is not negative.
|
|
||||||
func ValidateNonnegativeField(value int64, fldPath *field.Path) field.ErrorList {
|
|
||||||
allErrs := field.ErrorList{}
|
|
||||||
if value < 0 {
|
|
||||||
allErrs = append(allErrs, field.Invalid(fldPath, value, IsNegativeErrorMsg))
|
|
||||||
}
|
|
||||||
return allErrs
|
|
||||||
}
|
|
||||||
|
|
||||||
// ValidateAnnotations validates that a set of annotations are correctly defined.
|
// ValidateAnnotations validates that a set of annotations are correctly defined.
|
||||||
func ValidateAnnotations(annotations map[string]string, fldPath *field.Path) field.ErrorList {
|
func ValidateAnnotations(annotations map[string]string, fldPath *field.Path) field.ErrorList {
|
||||||
@@ -201,7 +142,7 @@ func ValidateImmutableField(newVal, oldVal interface{}, fldPath *field.Path) fie
|
|||||||
// ValidateObjectMeta validates an object's metadata on creation. It expects that name generation has already
|
// ValidateObjectMeta validates an object's metadata on creation. It expects that name generation has already
|
||||||
// been performed.
|
// been performed.
|
||||||
// It doesn't return an error for rootscoped resources with namespace, because namespace should already be cleared before.
|
// It doesn't return an error for rootscoped resources with namespace, because namespace should already be cleared before.
|
||||||
func ValidateObjectMeta(meta *api.ObjectMeta, requiresNamespace bool, nameFn ValidateNameFunc, fldPath *field.Path) field.ErrorList {
|
func ValidateObjectMeta(meta *api.ObjectMeta, requiresNamespace bool, nameFn apimachineyvalidation.ValidateNameFunc, fldPath *field.Path) field.ErrorList {
|
||||||
allErrs := field.ErrorList{}
|
allErrs := field.ErrorList{}
|
||||||
|
|
||||||
if len(meta.GenerateName) != 0 {
|
if len(meta.GenerateName) != 0 {
|
||||||
@@ -223,7 +164,7 @@ func ValidateObjectMeta(meta *api.ObjectMeta, requiresNamespace bool, nameFn Val
|
|||||||
if len(meta.Namespace) == 0 {
|
if len(meta.Namespace) == 0 {
|
||||||
allErrs = append(allErrs, field.Required(fldPath.Child("namespace"), ""))
|
allErrs = append(allErrs, field.Required(fldPath.Child("namespace"), ""))
|
||||||
} else {
|
} else {
|
||||||
for _, msg := range ValidateNamespaceName(meta.Namespace, false) {
|
for _, msg := range apimachineyvalidation.ValidateNamespaceName(meta.Namespace, false) {
|
||||||
allErrs = append(allErrs, field.Invalid(fldPath.Child("namespace"), meta.Namespace, msg))
|
allErrs = append(allErrs, field.Invalid(fldPath.Child("namespace"), meta.Namespace, msg))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -237,7 +178,7 @@ func ValidateObjectMeta(meta *api.ObjectMeta, requiresNamespace bool, nameFn Val
|
|||||||
allErrs = append(allErrs, field.Invalid(fldPath.Child("clusterName"), meta.ClusterName, msg))
|
allErrs = append(allErrs, field.Invalid(fldPath.Child("clusterName"), meta.ClusterName, msg))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
allErrs = append(allErrs, ValidateNonnegativeField(meta.Generation, fldPath.Child("generation"))...)
|
allErrs = append(allErrs, apimachineyvalidation.ValidateNonnegativeField(meta.Generation, fldPath.Child("generation"))...)
|
||||||
allErrs = append(allErrs, v1validation.ValidateLabels(meta.Labels, fldPath.Child("labels"))...)
|
allErrs = append(allErrs, v1validation.ValidateLabels(meta.Labels, fldPath.Child("labels"))...)
|
||||||
allErrs = append(allErrs, ValidateAnnotations(meta.Annotations, fldPath.Child("annotations"))...)
|
allErrs = append(allErrs, ValidateAnnotations(meta.Annotations, fldPath.Child("annotations"))...)
|
||||||
allErrs = append(allErrs, ValidateOwnerReferences(meta.OwnerReferences, fldPath.Child("ownerReferences"))...)
|
allErrs = append(allErrs, ValidateOwnerReferences(meta.OwnerReferences, fldPath.Child("ownerReferences"))...)
|
@@ -23,6 +23,7 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
apimachineryvalidation "k8s.io/apimachinery/pkg/api/validation"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/util/validation/field"
|
"k8s.io/apimachinery/pkg/util/validation/field"
|
||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
@@ -409,7 +410,7 @@ func TestValidateObjectMetaTrimsTrailingSlash(t *testing.T) {
|
|||||||
errs := ValidateObjectMeta(
|
errs := ValidateObjectMeta(
|
||||||
&api.ObjectMeta{Name: "test", GenerateName: "foo-"},
|
&api.ObjectMeta{Name: "test", GenerateName: "foo-"},
|
||||||
false,
|
false,
|
||||||
NameIsDNSSubdomain,
|
apimachineryvalidation.NameIsDNSSubdomain,
|
||||||
field.NewPath("field"))
|
field.NewPath("field"))
|
||||||
if len(errs) != 0 {
|
if len(errs) != 0 {
|
||||||
t.Fatalf("unexpected errors: %v", errs)
|
t.Fatalf("unexpected errors: %v", errs)
|
@@ -28,6 +28,7 @@ import (
|
|||||||
|
|
||||||
"github.com/golang/glog"
|
"github.com/golang/glog"
|
||||||
|
|
||||||
|
apimachineryvalidation "k8s.io/apimachinery/pkg/api/validation"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
unversionedvalidation "k8s.io/apimachinery/pkg/apis/meta/v1/validation"
|
unversionedvalidation "k8s.io/apimachinery/pkg/apis/meta/v1/validation"
|
||||||
"k8s.io/apimachinery/pkg/labels"
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
@@ -50,7 +51,7 @@ import (
|
|||||||
// fields by default.
|
// fields by default.
|
||||||
var RepairMalformedUpdates bool = genericvalidation.RepairMalformedUpdates
|
var RepairMalformedUpdates bool = genericvalidation.RepairMalformedUpdates
|
||||||
|
|
||||||
const isNegativeErrorMsg string = genericvalidation.IsNegativeErrorMsg
|
const isNegativeErrorMsg string = apimachineryvalidation.IsNegativeErrorMsg
|
||||||
const isInvalidQuotaResource string = `must be a standard resource for quota`
|
const isInvalidQuotaResource string = `must be a standard resource for quota`
|
||||||
const fieldImmutableErrorMsg string = genericvalidation.FieldImmutableErrorMsg
|
const fieldImmutableErrorMsg string = genericvalidation.FieldImmutableErrorMsg
|
||||||
const isNotIntegerErrorMsg string = `must be an integer`
|
const isNotIntegerErrorMsg string = `must be an integer`
|
||||||
@@ -175,7 +176,7 @@ func ValidateOwnerReferences(ownerReferences []metav1.OwnerReference, fldPath *f
|
|||||||
// if the name will have a value appended to it. If the name is not valid,
|
// if the name will have a value appended to it. If the name is not valid,
|
||||||
// this returns a list of descriptions of individual characteristics of the
|
// this returns a list of descriptions of individual characteristics of the
|
||||||
// value that were not valid. Otherwise this returns an empty list or nil.
|
// value that were not valid. Otherwise this returns an empty list or nil.
|
||||||
type ValidateNameFunc genericvalidation.ValidateNameFunc
|
type ValidateNameFunc apimachineryvalidation.ValidateNameFunc
|
||||||
|
|
||||||
// maskTrailingDash replaces the final character of a string with a subdomain safe
|
// maskTrailingDash replaces the final character of a string with a subdomain safe
|
||||||
// value if is a dash.
|
// value if is a dash.
|
||||||
@@ -210,7 +211,7 @@ var ValidateNodeName = NameIsDNSSubdomain
|
|||||||
// ValidateNamespaceName can be used to check whether the given namespace name is valid.
|
// ValidateNamespaceName can be used to check whether the given namespace name is valid.
|
||||||
// Prefix indicates this name will be used as part of generation, in which case
|
// Prefix indicates this name will be used as part of generation, in which case
|
||||||
// trailing dashes are allowed.
|
// trailing dashes are allowed.
|
||||||
var ValidateNamespaceName = genericvalidation.ValidateNamespaceName
|
var ValidateNamespaceName = apimachineryvalidation.ValidateNamespaceName
|
||||||
|
|
||||||
// ValidateLimitRangeName can be used to check whether the given limit range name is valid.
|
// ValidateLimitRangeName can be used to check whether the given limit range name is valid.
|
||||||
// Prefix indicates this name will be used as part of generation, in which case
|
// Prefix indicates this name will be used as part of generation, in which case
|
||||||
@@ -231,7 +232,7 @@ var ValidateSecretName = NameIsDNSSubdomain
|
|||||||
// ValidateServiceAccountName can be used to check whether the given service account name is valid.
|
// ValidateServiceAccountName can be used to check whether the given service account name is valid.
|
||||||
// Prefix indicates this name will be used as part of generation, in which case
|
// Prefix indicates this name will be used as part of generation, in which case
|
||||||
// trailing dashes are allowed.
|
// trailing dashes are allowed.
|
||||||
var ValidateServiceAccountName = genericvalidation.ValidateServiceAccountName
|
var ValidateServiceAccountName = apimachineryvalidation.ValidateServiceAccountName
|
||||||
|
|
||||||
// ValidateEndpointsName can be used to check whether the given endpoints name is valid.
|
// ValidateEndpointsName can be used to check whether the given endpoints name is valid.
|
||||||
// Prefix indicates this name will be used as part of generation, in which case
|
// Prefix indicates this name will be used as part of generation, in which case
|
||||||
@@ -244,22 +245,22 @@ var ValidateClusterName = genericvalidation.ValidateClusterName
|
|||||||
// TODO update all references to these functions to point to the genericvalidation ones
|
// TODO update all references to these functions to point to the genericvalidation ones
|
||||||
// NameIsDNSSubdomain is a ValidateNameFunc for names that must be a DNS subdomain.
|
// NameIsDNSSubdomain is a ValidateNameFunc for names that must be a DNS subdomain.
|
||||||
func NameIsDNSSubdomain(name string, prefix bool) []string {
|
func NameIsDNSSubdomain(name string, prefix bool) []string {
|
||||||
return genericvalidation.NameIsDNSSubdomain(name, prefix)
|
return apimachineryvalidation.NameIsDNSSubdomain(name, prefix)
|
||||||
}
|
}
|
||||||
|
|
||||||
// NameIsDNSLabel is a ValidateNameFunc for names that must be a DNS 1123 label.
|
// NameIsDNSLabel is a ValidateNameFunc for names that must be a DNS 1123 label.
|
||||||
func NameIsDNSLabel(name string, prefix bool) []string {
|
func NameIsDNSLabel(name string, prefix bool) []string {
|
||||||
return genericvalidation.NameIsDNSLabel(name, prefix)
|
return apimachineryvalidation.NameIsDNSLabel(name, prefix)
|
||||||
}
|
}
|
||||||
|
|
||||||
// NameIsDNS1035Label is a ValidateNameFunc for names that must be a DNS 952 label.
|
// NameIsDNS1035Label is a ValidateNameFunc for names that must be a DNS 952 label.
|
||||||
func NameIsDNS1035Label(name string, prefix bool) []string {
|
func NameIsDNS1035Label(name string, prefix bool) []string {
|
||||||
return genericvalidation.NameIsDNS1035Label(name, prefix)
|
return apimachineryvalidation.NameIsDNS1035Label(name, prefix)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Validates that given value is not negative.
|
// Validates that given value is not negative.
|
||||||
func ValidateNonnegativeField(value int64, fldPath *field.Path) field.ErrorList {
|
func ValidateNonnegativeField(value int64, fldPath *field.Path) field.ErrorList {
|
||||||
return genericvalidation.ValidateNonnegativeField(value, fldPath)
|
return apimachineryvalidation.ValidateNonnegativeField(value, fldPath)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Validates that a Quantity is not negative
|
// Validates that a Quantity is not negative
|
||||||
@@ -289,7 +290,7 @@ func ValidateImmutableAnnotation(newVal string, oldVal string, annotation string
|
|||||||
// It doesn't return an error for rootscoped resources with namespace, because namespace should already be cleared before.
|
// It doesn't return an error for rootscoped resources with namespace, because namespace should already be cleared before.
|
||||||
// TODO: Remove calls to this method scattered in validations of specific resources, e.g., ValidatePodUpdate.
|
// TODO: Remove calls to this method scattered in validations of specific resources, e.g., ValidatePodUpdate.
|
||||||
func ValidateObjectMeta(meta *api.ObjectMeta, requiresNamespace bool, nameFn ValidateNameFunc, fldPath *field.Path) field.ErrorList {
|
func ValidateObjectMeta(meta *api.ObjectMeta, requiresNamespace bool, nameFn ValidateNameFunc, fldPath *field.Path) field.ErrorList {
|
||||||
return genericvalidation.ValidateObjectMeta(meta, requiresNamespace, genericvalidation.ValidateNameFunc(nameFn), fldPath)
|
return genericvalidation.ValidateObjectMeta(meta, requiresNamespace, apimachineryvalidation.ValidateNameFunc(nameFn), fldPath)
|
||||||
}
|
}
|
||||||
|
|
||||||
// ValidateObjectMetaUpdate validates an object's metadata when updated
|
// ValidateObjectMetaUpdate validates an object's metadata when updated
|
||||||
|
@@ -43,6 +43,7 @@ go_library(
|
|||||||
"//vendor:k8s.io/apimachinery/pkg/runtime/schema",
|
"//vendor:k8s.io/apimachinery/pkg/runtime/schema",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/util/sets",
|
"//vendor:k8s.io/apimachinery/pkg/util/sets",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/watch",
|
"//vendor:k8s.io/apimachinery/pkg/watch",
|
||||||
|
"//vendor:k8s.io/apiserver/pkg/authentication/serviceaccount",
|
||||||
],
|
],
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@@ -24,6 +24,7 @@ import (
|
|||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/runtime"
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
"k8s.io/apimachinery/pkg/watch"
|
"k8s.io/apimachinery/pkg/watch"
|
||||||
|
apiserverserviceaccount "k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
"k8s.io/kubernetes/pkg/client/cache"
|
"k8s.io/kubernetes/pkg/client/cache"
|
||||||
@@ -146,7 +147,7 @@ func (b SAControllerClientBuilder) Config(name string) (*restclient.Config, erro
|
|||||||
}
|
}
|
||||||
// TODO maybe verify the token is valid
|
// TODO maybe verify the token is valid
|
||||||
clientConfig.BearerToken = string(secret.Data[v1.ServiceAccountTokenKey])
|
clientConfig.BearerToken = string(secret.Data[v1.ServiceAccountTokenKey])
|
||||||
restclient.AddUserAgent(clientConfig, serviceaccount.MakeUsername(b.Namespace, name))
|
restclient.AddUserAgent(clientConfig, apiserverserviceaccount.MakeUsername(b.Namespace, name))
|
||||||
return true, nil
|
return true, nil
|
||||||
|
|
||||||
default:
|
default:
|
||||||
|
@@ -22,10 +22,10 @@ go_library(
|
|||||||
"//pkg/api:go_default_library",
|
"//pkg/api:go_default_library",
|
||||||
"//pkg/apis/authentication:go_default_library",
|
"//pkg/apis/authentication:go_default_library",
|
||||||
"//pkg/genericapiserver/api/handlers/responsewriters:go_default_library",
|
"//pkg/genericapiserver/api/handlers/responsewriters:go_default_library",
|
||||||
"//pkg/serviceaccount:go_default_library",
|
|
||||||
"//vendor:github.com/golang/glog",
|
"//vendor:github.com/golang/glog",
|
||||||
"//vendor:github.com/pborman/uuid",
|
"//vendor:github.com/pborman/uuid",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/util/net",
|
"//vendor:k8s.io/apimachinery/pkg/util/net",
|
||||||
|
"//vendor:k8s.io/apiserver/pkg/authentication/serviceaccount",
|
||||||
"//vendor:k8s.io/apiserver/pkg/authentication/user",
|
"//vendor:k8s.io/apiserver/pkg/authentication/user",
|
||||||
"//vendor:k8s.io/apiserver/pkg/authorization/authorizer",
|
"//vendor:k8s.io/apiserver/pkg/authorization/authorizer",
|
||||||
"//vendor:k8s.io/apiserver/pkg/httplog",
|
"//vendor:k8s.io/apiserver/pkg/httplog",
|
||||||
|
@@ -24,6 +24,7 @@ import (
|
|||||||
|
|
||||||
"github.com/golang/glog"
|
"github.com/golang/glog"
|
||||||
|
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
"k8s.io/apiserver/pkg/authorization/authorizer"
|
"k8s.io/apiserver/pkg/authorization/authorizer"
|
||||||
"k8s.io/apiserver/pkg/httplog"
|
"k8s.io/apiserver/pkg/httplog"
|
||||||
@@ -31,7 +32,6 @@ import (
|
|||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
authenticationapi "k8s.io/kubernetes/pkg/apis/authentication"
|
authenticationapi "k8s.io/kubernetes/pkg/apis/authentication"
|
||||||
"k8s.io/kubernetes/pkg/genericapiserver/api/handlers/responsewriters"
|
"k8s.io/kubernetes/pkg/genericapiserver/api/handlers/responsewriters"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// WithImpersonation is a filter that will inspect and check requests that attempt to change the user.Info for their requests
|
// WithImpersonation is a filter that will inspect and check requests that attempt to change the user.Info for their requests
|
||||||
|
@@ -33,10 +33,10 @@ go_library(
|
|||||||
tags = ["automanaged"],
|
tags = ["automanaged"],
|
||||||
deps = [
|
deps = [
|
||||||
"//pkg/apis/rbac:go_default_library",
|
"//pkg/apis/rbac:go_default_library",
|
||||||
"//pkg/serviceaccount:go_default_library",
|
|
||||||
"//vendor:github.com/golang/glog",
|
"//vendor:github.com/golang/glog",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/api/errors",
|
"//vendor:k8s.io/apimachinery/pkg/api/errors",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/util/errors",
|
"//vendor:k8s.io/apimachinery/pkg/util/errors",
|
||||||
|
"//vendor:k8s.io/apiserver/pkg/authentication/serviceaccount",
|
||||||
"//vendor:k8s.io/apiserver/pkg/authentication/user",
|
"//vendor:k8s.io/apiserver/pkg/authentication/user",
|
||||||
"//vendor:k8s.io/apiserver/pkg/request",
|
"//vendor:k8s.io/apiserver/pkg/request",
|
||||||
],
|
],
|
||||||
|
@@ -21,12 +21,13 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
"github.com/golang/glog"
|
"github.com/golang/glog"
|
||||||
|
|
||||||
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
||||||
utilerrors "k8s.io/apimachinery/pkg/util/errors"
|
utilerrors "k8s.io/apimachinery/pkg/util/errors"
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
genericapirequest "k8s.io/apiserver/pkg/request"
|
genericapirequest "k8s.io/apiserver/pkg/request"
|
||||||
"k8s.io/kubernetes/pkg/apis/rbac"
|
"k8s.io/kubernetes/pkg/apis/rbac"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type AuthorizationRuleResolver interface {
|
type AuthorizationRuleResolver interface {
|
||||||
|
@@ -8,13 +8,6 @@ load(
|
|||||||
"go_test",
|
"go_test",
|
||||||
)
|
)
|
||||||
|
|
||||||
go_test(
|
|
||||||
name = "go_default_test",
|
|
||||||
srcs = ["util_test.go"],
|
|
||||||
library = ":go_default_library",
|
|
||||||
tags = ["automanaged"],
|
|
||||||
)
|
|
||||||
|
|
||||||
go_library(
|
go_library(
|
||||||
name = "go_default_library",
|
name = "go_default_library",
|
||||||
srcs = [
|
srcs = [
|
||||||
@@ -25,10 +18,10 @@ go_library(
|
|||||||
deps = [
|
deps = [
|
||||||
"//pkg/api:go_default_library",
|
"//pkg/api:go_default_library",
|
||||||
"//pkg/api/v1:go_default_library",
|
"//pkg/api/v1:go_default_library",
|
||||||
"//pkg/api/validation/genericvalidation:go_default_library",
|
|
||||||
"//vendor:github.com/dgrijalva/jwt-go",
|
"//vendor:github.com/dgrijalva/jwt-go",
|
||||||
"//vendor:github.com/golang/glog",
|
"//vendor:github.com/golang/glog",
|
||||||
"//vendor:k8s.io/apiserver/pkg/authentication/authenticator",
|
"//vendor:k8s.io/apiserver/pkg/authentication/authenticator",
|
||||||
|
"//vendor:k8s.io/apiserver/pkg/authentication/serviceaccount",
|
||||||
"//vendor:k8s.io/apiserver/pkg/authentication/user",
|
"//vendor:k8s.io/apiserver/pkg/authentication/user",
|
||||||
],
|
],
|
||||||
)
|
)
|
||||||
@@ -43,6 +36,7 @@ go_test(
|
|||||||
"//pkg/client/clientset_generated/clientset/fake:go_default_library",
|
"//pkg/client/clientset_generated/clientset/fake:go_default_library",
|
||||||
"//pkg/controller/serviceaccount:go_default_library",
|
"//pkg/controller/serviceaccount:go_default_library",
|
||||||
"//pkg/serviceaccount:go_default_library",
|
"//pkg/serviceaccount:go_default_library",
|
||||||
|
"//vendor:k8s.io/apiserver/pkg/authentication/serviceaccount",
|
||||||
],
|
],
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@@ -27,6 +27,7 @@ import (
|
|||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
|
|
||||||
"k8s.io/apiserver/pkg/authentication/authenticator"
|
"k8s.io/apiserver/pkg/authentication/authenticator"
|
||||||
|
apiserverserviceaccount "k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
|
|
||||||
@@ -176,7 +177,7 @@ func (j *jwtTokenGenerator) GenerateToken(serviceAccount v1.ServiceAccount, secr
|
|||||||
claims[IssuerClaim] = Issuer
|
claims[IssuerClaim] = Issuer
|
||||||
|
|
||||||
// Username
|
// Username
|
||||||
claims[SubjectClaim] = MakeUsername(serviceAccount.Namespace, serviceAccount.Name)
|
claims[SubjectClaim] = apiserverserviceaccount.MakeUsername(serviceAccount.Namespace, serviceAccount.Name)
|
||||||
|
|
||||||
// Persist enough structured info for the authenticator to be able to look up the service account and secret
|
// Persist enough structured info for the authenticator to be able to look up the service account and secret
|
||||||
claims[NamespaceClaim] = serviceAccount.Namespace
|
claims[NamespaceClaim] = serviceAccount.Namespace
|
||||||
@@ -287,7 +288,7 @@ func (j *jwtTokenAuthenticator) AuthenticateToken(token string) (user.Info, bool
|
|||||||
return nil, false, errors.New("serviceAccountUID claim is missing")
|
return nil, false, errors.New("serviceAccountUID claim is missing")
|
||||||
}
|
}
|
||||||
|
|
||||||
subjectNamespace, subjectName, err := SplitUsername(sub)
|
subjectNamespace, subjectName, err := apiserverserviceaccount.SplitUsername(sub)
|
||||||
if err != nil || subjectNamespace != namespace || subjectName != serviceAccountName {
|
if err != nil || subjectNamespace != namespace || subjectName != serviceAccountName {
|
||||||
return nil, false, errors.New("sub claim is invalid")
|
return nil, false, errors.New("sub claim is invalid")
|
||||||
}
|
}
|
||||||
|
@@ -22,6 +22,7 @@ import (
|
|||||||
"reflect"
|
"reflect"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
apiserverserviceaccount "k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
clientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
clientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
||||||
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset/fake"
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset/fake"
|
||||||
@@ -349,8 +350,8 @@ func TestTokenGenerateAndValidate(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestMakeSplitUsername(t *testing.T) {
|
func TestMakeSplitUsername(t *testing.T) {
|
||||||
username := serviceaccount.MakeUsername("ns", "name")
|
username := apiserverserviceaccount.MakeUsername("ns", "name")
|
||||||
ns, name, err := serviceaccount.SplitUsername(username)
|
ns, name, err := apiserverserviceaccount.SplitUsername(username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Errorf("Unexpected error %v", err)
|
t.Errorf("Unexpected error %v", err)
|
||||||
}
|
}
|
||||||
@@ -360,7 +361,7 @@ func TestMakeSplitUsername(t *testing.T) {
|
|||||||
|
|
||||||
invalid := []string{"test", "system:serviceaccount", "system:serviceaccount:", "system:serviceaccount:ns", "system:serviceaccount:ns:name:extra"}
|
invalid := []string{"test", "system:serviceaccount", "system:serviceaccount:", "system:serviceaccount:ns", "system:serviceaccount:ns:name:extra"}
|
||||||
for _, n := range invalid {
|
for _, n := range invalid {
|
||||||
_, _, err := serviceaccount.SplitUsername("test")
|
_, _, err := apiserverserviceaccount.SplitUsername("test")
|
||||||
if err == nil {
|
if err == nil {
|
||||||
t.Errorf("Expected error for %s", n)
|
t.Errorf("Expected error for %s", n)
|
||||||
}
|
}
|
||||||
|
@@ -17,70 +17,18 @@ limitations under the License.
|
|||||||
package serviceaccount
|
package serviceaccount
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
apiserverserviceaccount "k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"strings"
|
|
||||||
|
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
"k8s.io/kubernetes/pkg/api/validation/genericvalidation"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
|
||||||
ServiceAccountUsernamePrefix = "system:serviceaccount:"
|
|
||||||
ServiceAccountUsernameSeparator = ":"
|
|
||||||
ServiceAccountGroupPrefix = "system:serviceaccounts:"
|
|
||||||
AllServiceAccountsGroup = "system:serviceaccounts"
|
|
||||||
)
|
|
||||||
|
|
||||||
// MakeUsername generates a username from the given namespace and ServiceAccount name.
|
|
||||||
// The resulting username can be passed to SplitUsername to extract the original namespace and ServiceAccount name.
|
|
||||||
func MakeUsername(namespace, name string) string {
|
|
||||||
return ServiceAccountUsernamePrefix + namespace + ServiceAccountUsernameSeparator + name
|
|
||||||
}
|
|
||||||
|
|
||||||
var invalidUsernameErr = fmt.Errorf("Username must be in the form %s", MakeUsername("namespace", "name"))
|
|
||||||
|
|
||||||
// SplitUsername returns the namespace and ServiceAccount name embedded in the given username,
|
|
||||||
// or an error if the username is not a valid name produced by MakeUsername
|
|
||||||
func SplitUsername(username string) (string, string, error) {
|
|
||||||
if !strings.HasPrefix(username, ServiceAccountUsernamePrefix) {
|
|
||||||
return "", "", invalidUsernameErr
|
|
||||||
}
|
|
||||||
trimmed := strings.TrimPrefix(username, ServiceAccountUsernamePrefix)
|
|
||||||
parts := strings.Split(trimmed, ServiceAccountUsernameSeparator)
|
|
||||||
if len(parts) != 2 {
|
|
||||||
return "", "", invalidUsernameErr
|
|
||||||
}
|
|
||||||
namespace, name := parts[0], parts[1]
|
|
||||||
if len(genericvalidation.ValidateNamespaceName(namespace, false)) != 0 {
|
|
||||||
return "", "", invalidUsernameErr
|
|
||||||
}
|
|
||||||
if len(genericvalidation.ValidateServiceAccountName(name, false)) != 0 {
|
|
||||||
return "", "", invalidUsernameErr
|
|
||||||
}
|
|
||||||
return namespace, name, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// MakeGroupNames generates service account group names for the given namespace and ServiceAccount name
|
|
||||||
func MakeGroupNames(namespace, name string) []string {
|
|
||||||
return []string{
|
|
||||||
AllServiceAccountsGroup,
|
|
||||||
MakeNamespaceGroupName(namespace),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// MakeNamespaceGroupName returns the name of the group all service accounts in the namespace are included in
|
|
||||||
func MakeNamespaceGroupName(namespace string) string {
|
|
||||||
return ServiceAccountGroupPrefix + namespace
|
|
||||||
}
|
|
||||||
|
|
||||||
// UserInfo returns a user.Info interface for the given namespace, service account name and UID
|
// UserInfo returns a user.Info interface for the given namespace, service account name and UID
|
||||||
func UserInfo(namespace, name, uid string) user.Info {
|
func UserInfo(namespace, name, uid string) user.Info {
|
||||||
return &user.DefaultInfo{
|
return &user.DefaultInfo{
|
||||||
Name: MakeUsername(namespace, name),
|
Name: apiserverserviceaccount.MakeUsername(namespace, name),
|
||||||
UID: uid,
|
UID: uid,
|
||||||
Groups: MakeGroupNames(namespace, name),
|
Groups: apiserverserviceaccount.MakeGroupNames(namespace, name),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
18
staging/src/k8s.io/apimachinery/pkg/api/validation/doc.go
Normal file
18
staging/src/k8s.io/apimachinery/pkg/api/validation/doc.go
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Package validation contains generic api type validation functions.
|
||||||
|
package validation // import "k8s.io/apimachinery/pkg/api/validation"
|
@@ -0,0 +1,85 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2014 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package validation
|
||||||
|
|
||||||
|
import (
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"k8s.io/apimachinery/pkg/util/validation"
|
||||||
|
"k8s.io/apimachinery/pkg/util/validation/field"
|
||||||
|
)
|
||||||
|
|
||||||
|
const IsNegativeErrorMsg string = `must be greater than or equal to 0`
|
||||||
|
|
||||||
|
// ValidateNameFunc validates that the provided name is valid for a given resource type.
|
||||||
|
// Not all resources have the same validation rules for names. Prefix is true
|
||||||
|
// if the name will have a value appended to it. If the name is not valid,
|
||||||
|
// this returns a list of descriptions of individual characteristics of the
|
||||||
|
// value that were not valid. Otherwise this returns an empty list or nil.
|
||||||
|
type ValidateNameFunc func(name string, prefix bool) []string
|
||||||
|
|
||||||
|
// NameIsDNSSubdomain is a ValidateNameFunc for names that must be a DNS subdomain.
|
||||||
|
func NameIsDNSSubdomain(name string, prefix bool) []string {
|
||||||
|
if prefix {
|
||||||
|
name = maskTrailingDash(name)
|
||||||
|
}
|
||||||
|
return validation.IsDNS1123Subdomain(name)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NameIsDNSLabel is a ValidateNameFunc for names that must be a DNS 1123 label.
|
||||||
|
func NameIsDNSLabel(name string, prefix bool) []string {
|
||||||
|
if prefix {
|
||||||
|
name = maskTrailingDash(name)
|
||||||
|
}
|
||||||
|
return validation.IsDNS1123Label(name)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NameIsDNS1035Label is a ValidateNameFunc for names that must be a DNS 952 label.
|
||||||
|
func NameIsDNS1035Label(name string, prefix bool) []string {
|
||||||
|
if prefix {
|
||||||
|
name = maskTrailingDash(name)
|
||||||
|
}
|
||||||
|
return validation.IsDNS1035Label(name)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ValidateNamespaceName can be used to check whether the given namespace name is valid.
|
||||||
|
// Prefix indicates this name will be used as part of generation, in which case
|
||||||
|
// trailing dashes are allowed.
|
||||||
|
var ValidateNamespaceName = NameIsDNSLabel
|
||||||
|
|
||||||
|
// ValidateServiceAccountName can be used to check whether the given service account name is valid.
|
||||||
|
// Prefix indicates this name will be used as part of generation, in which case
|
||||||
|
// trailing dashes are allowed.
|
||||||
|
var ValidateServiceAccountName = NameIsDNSSubdomain
|
||||||
|
|
||||||
|
// maskTrailingDash replaces the final character of a string with a subdomain safe
|
||||||
|
// value if is a dash.
|
||||||
|
func maskTrailingDash(name string) string {
|
||||||
|
if strings.HasSuffix(name, "-") {
|
||||||
|
return name[:len(name)-2] + "a"
|
||||||
|
}
|
||||||
|
return name
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validates that given value is not negative.
|
||||||
|
func ValidateNonnegativeField(value int64, fldPath *field.Path) field.ErrorList {
|
||||||
|
allErrs := field.ErrorList{}
|
||||||
|
if value < 0 {
|
||||||
|
allErrs = append(allErrs, field.Invalid(fldPath, value, IsNegativeErrorMsg))
|
||||||
|
}
|
||||||
|
return allErrs
|
||||||
|
}
|
@@ -0,0 +1,73 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2014 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package serviceaccount
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
apimachineryvalidation "k8s.io/apimachinery/pkg/api/validation"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
ServiceAccountUsernamePrefix = "system:serviceaccount:"
|
||||||
|
ServiceAccountUsernameSeparator = ":"
|
||||||
|
ServiceAccountGroupPrefix = "system:serviceaccounts:"
|
||||||
|
AllServiceAccountsGroup = "system:serviceaccounts"
|
||||||
|
)
|
||||||
|
|
||||||
|
// MakeUsername generates a username from the given namespace and ServiceAccount name.
|
||||||
|
// The resulting username can be passed to SplitUsername to extract the original namespace and ServiceAccount name.
|
||||||
|
func MakeUsername(namespace, name string) string {
|
||||||
|
return ServiceAccountUsernamePrefix + namespace + ServiceAccountUsernameSeparator + name
|
||||||
|
}
|
||||||
|
|
||||||
|
var invalidUsernameErr = fmt.Errorf("Username must be in the form %s", MakeUsername("namespace", "name"))
|
||||||
|
|
||||||
|
// SplitUsername returns the namespace and ServiceAccount name embedded in the given username,
|
||||||
|
// or an error if the username is not a valid name produced by MakeUsername
|
||||||
|
func SplitUsername(username string) (string, string, error) {
|
||||||
|
if !strings.HasPrefix(username, ServiceAccountUsernamePrefix) {
|
||||||
|
return "", "", invalidUsernameErr
|
||||||
|
}
|
||||||
|
trimmed := strings.TrimPrefix(username, ServiceAccountUsernamePrefix)
|
||||||
|
parts := strings.Split(trimmed, ServiceAccountUsernameSeparator)
|
||||||
|
if len(parts) != 2 {
|
||||||
|
return "", "", invalidUsernameErr
|
||||||
|
}
|
||||||
|
namespace, name := parts[0], parts[1]
|
||||||
|
if len(apimachineryvalidation.ValidateNamespaceName(namespace, false)) != 0 {
|
||||||
|
return "", "", invalidUsernameErr
|
||||||
|
}
|
||||||
|
if len(apimachineryvalidation.ValidateServiceAccountName(name, false)) != 0 {
|
||||||
|
return "", "", invalidUsernameErr
|
||||||
|
}
|
||||||
|
return namespace, name, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// MakeGroupNames generates service account group names for the given namespace and ServiceAccount name
|
||||||
|
func MakeGroupNames(namespace, name string) []string {
|
||||||
|
return []string{
|
||||||
|
AllServiceAccountsGroup,
|
||||||
|
MakeNamespaceGroupName(namespace),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// MakeNamespaceGroupName returns the name of the group all service accounts in the namespace are included in
|
||||||
|
func MakeNamespaceGroupName(namespace string) string {
|
||||||
|
return ServiceAccountGroupPrefix + namespace
|
||||||
|
}
|
@@ -158,7 +158,6 @@ go_library(
|
|||||||
"//pkg/quota/evaluator/core:go_default_library",
|
"//pkg/quota/evaluator/core:go_default_library",
|
||||||
"//pkg/registry/generic/registry:go_default_library",
|
"//pkg/registry/generic/registry:go_default_library",
|
||||||
"//pkg/security/apparmor:go_default_library",
|
"//pkg/security/apparmor:go_default_library",
|
||||||
"//pkg/serviceaccount:go_default_library",
|
|
||||||
"//pkg/util:go_default_library",
|
"//pkg/util:go_default_library",
|
||||||
"//pkg/util/exec:go_default_library",
|
"//pkg/util/exec:go_default_library",
|
||||||
"//pkg/util/flowcontrol:go_default_library",
|
"//pkg/util/flowcontrol:go_default_library",
|
||||||
@@ -208,6 +207,7 @@ go_library(
|
|||||||
"//vendor:k8s.io/apimachinery/pkg/util/wait",
|
"//vendor:k8s.io/apimachinery/pkg/util/wait",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/util/yaml",
|
"//vendor:k8s.io/apimachinery/pkg/util/yaml",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/watch",
|
"//vendor:k8s.io/apimachinery/pkg/watch",
|
||||||
|
"//vendor:k8s.io/apiserver/pkg/authentication/serviceaccount",
|
||||||
"//vendor:k8s.io/client-go/kubernetes",
|
"//vendor:k8s.io/client-go/kubernetes",
|
||||||
"//vendor:k8s.io/client-go/pkg/api/v1",
|
"//vendor:k8s.io/client-go/pkg/api/v1",
|
||||||
"//vendor:k8s.io/client-go/pkg/apis/extensions/v1beta1",
|
"//vendor:k8s.io/client-go/pkg/apis/extensions/v1beta1",
|
||||||
|
@@ -31,10 +31,10 @@ import (
|
|||||||
"k8s.io/apimachinery/pkg/labels"
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
"k8s.io/apimachinery/pkg/util/wait"
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
||||||
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
"k8s.io/kubernetes/test/e2e/framework"
|
"k8s.io/kubernetes/test/e2e/framework"
|
||||||
"k8s.io/kubernetes/test/e2e/generated"
|
"k8s.io/kubernetes/test/e2e/generated"
|
||||||
testutils "k8s.io/kubernetes/test/utils"
|
testutils "k8s.io/kubernetes/test/utils"
|
||||||
|
@@ -22,8 +22,8 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
|
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
"k8s.io/kubernetes/test/e2e/framework"
|
"k8s.io/kubernetes/test/e2e/framework"
|
||||||
|
|
||||||
. "github.com/onsi/ginkgo"
|
. "github.com/onsi/ginkgo"
|
||||||
|
@@ -48,6 +48,7 @@ import (
|
|||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
utilnet "k8s.io/apimachinery/pkg/util/net"
|
utilnet "k8s.io/apimachinery/pkg/util/net"
|
||||||
"k8s.io/apimachinery/pkg/util/wait"
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/kubernetes/pkg/api/annotations"
|
"k8s.io/kubernetes/pkg/api/annotations"
|
||||||
"k8s.io/kubernetes/pkg/api/resource"
|
"k8s.io/kubernetes/pkg/api/resource"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
@@ -56,7 +57,6 @@ import (
|
|||||||
"k8s.io/kubernetes/pkg/controller"
|
"k8s.io/kubernetes/pkg/controller"
|
||||||
"k8s.io/kubernetes/pkg/kubectl/cmd/util"
|
"k8s.io/kubernetes/pkg/kubectl/cmd/util"
|
||||||
genericregistry "k8s.io/kubernetes/pkg/registry/generic/registry"
|
genericregistry "k8s.io/kubernetes/pkg/registry/generic/registry"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
uexec "k8s.io/kubernetes/pkg/util/exec"
|
uexec "k8s.io/kubernetes/pkg/util/exec"
|
||||||
"k8s.io/kubernetes/pkg/util/uuid"
|
"k8s.io/kubernetes/pkg/util/uuid"
|
||||||
utilversion "k8s.io/kubernetes/pkg/util/version"
|
utilversion "k8s.io/kubernetes/pkg/util/version"
|
||||||
|
@@ -25,13 +25,13 @@ import (
|
|||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/labels"
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
||||||
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
||||||
coreclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/core/v1"
|
coreclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/core/v1"
|
||||||
"k8s.io/kubernetes/pkg/fields"
|
"k8s.io/kubernetes/pkg/fields"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
"k8s.io/kubernetes/pkg/util/system"
|
"k8s.io/kubernetes/pkg/util/system"
|
||||||
"k8s.io/kubernetes/pkg/util/uuid"
|
"k8s.io/kubernetes/pkg/util/uuid"
|
||||||
"k8s.io/kubernetes/test/e2e/framework"
|
"k8s.io/kubernetes/test/e2e/framework"
|
||||||
|
@@ -25,10 +25,10 @@ import (
|
|||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
"k8s.io/apimachinery/pkg/util/wait"
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
||||||
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
"k8s.io/kubernetes/test/e2e/framework"
|
"k8s.io/kubernetes/test/e2e/framework"
|
||||||
|
|
||||||
. "github.com/onsi/ginkgo"
|
. "github.com/onsi/ginkgo"
|
||||||
|
@@ -39,6 +39,7 @@ import (
|
|||||||
"k8s.io/apiserver/pkg/authentication/authenticator"
|
"k8s.io/apiserver/pkg/authentication/authenticator"
|
||||||
"k8s.io/apiserver/pkg/authentication/group"
|
"k8s.io/apiserver/pkg/authentication/group"
|
||||||
"k8s.io/apiserver/pkg/authentication/request/bearertoken"
|
"k8s.io/apiserver/pkg/authentication/request/bearertoken"
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
"k8s.io/apiserver/pkg/authorization/authorizer"
|
"k8s.io/apiserver/pkg/authorization/authorizer"
|
||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
@@ -49,7 +50,6 @@ import (
|
|||||||
"k8s.io/kubernetes/pkg/auth/authorizer/abac"
|
"k8s.io/kubernetes/pkg/auth/authorizer/abac"
|
||||||
"k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api/v1"
|
"k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api/v1"
|
||||||
apiserverauthorizer "k8s.io/kubernetes/pkg/genericapiserver/authorizer"
|
apiserverauthorizer "k8s.io/kubernetes/pkg/genericapiserver/authorizer"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
"k8s.io/kubernetes/plugin/pkg/admission/admit"
|
"k8s.io/kubernetes/plugin/pkg/admission/admit"
|
||||||
"k8s.io/kubernetes/plugin/pkg/auth/authenticator/token/tokentest"
|
"k8s.io/kubernetes/plugin/pkg/auth/authenticator/token/tokentest"
|
||||||
"k8s.io/kubernetes/plugin/pkg/auth/authenticator/token/webhook"
|
"k8s.io/kubernetes/plugin/pkg/auth/authenticator/token/webhook"
|
||||||
|
@@ -38,6 +38,7 @@ import (
|
|||||||
"k8s.io/apiserver/pkg/authentication/authenticator"
|
"k8s.io/apiserver/pkg/authentication/authenticator"
|
||||||
"k8s.io/apiserver/pkg/authentication/request/bearertoken"
|
"k8s.io/apiserver/pkg/authentication/request/bearertoken"
|
||||||
"k8s.io/apiserver/pkg/authentication/request/union"
|
"k8s.io/apiserver/pkg/authentication/request/union"
|
||||||
|
serviceaccountapiserver "k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
"k8s.io/apiserver/pkg/authorization/authorizer"
|
"k8s.io/apiserver/pkg/authorization/authorizer"
|
||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
@@ -385,7 +386,7 @@ func startServiceAccountTestServer(t *testing.T) (*clientset.Clientset, restclie
|
|||||||
}
|
}
|
||||||
|
|
||||||
// If the user is a service account...
|
// If the user is a service account...
|
||||||
if serviceAccountNamespace, serviceAccountName, err := serviceaccount.SplitUsername(username); err == nil {
|
if serviceAccountNamespace, serviceAccountName, err := serviceaccountapiserver.SplitUsername(username); err == nil {
|
||||||
// Limit them to their own namespace
|
// Limit them to their own namespace
|
||||||
if serviceAccountNamespace == ns {
|
if serviceAccountNamespace == ns {
|
||||||
switch serviceAccountName {
|
switch serviceAccountName {
|
||||||
|
3857
vendor/BUILD
vendored
3857
vendor/BUILD
vendored
File diff suppressed because it is too large
Load Diff
Reference in New Issue
Block a user