mirror of
https://github.com/kubernetes/client-go.git
synced 2025-06-24 14:12:18 +00:00
prevent illegal verb/name combinations in default policy rules
Kubernetes-commit: 5539a6721dd3ea52261b51f859e5504c6b6affce
This commit is contained in:
parent
e65054aaa9
commit
d3d2ebe2d3
@ -221,6 +221,22 @@ func (r *PolicyRuleBuilder) Rule() (PolicyRule, error) {
|
|||||||
// this a common bug
|
// this a common bug
|
||||||
return PolicyRule{}, fmt.Errorf("resource rule must have apiGroups: %#v", r.PolicyRule)
|
return PolicyRule{}, fmt.Errorf("resource rule must have apiGroups: %#v", r.PolicyRule)
|
||||||
}
|
}
|
||||||
|
// if resource names are set, then the verb must not be list, watch, create, or deletecollection
|
||||||
|
// since verbs are largely opaque, we don't want to accidentally prevent things like "impersonate", so
|
||||||
|
// we will backlist common mistakes, not whitelist acceptable options.
|
||||||
|
if len(r.PolicyRule.ResourceNames) != 0 {
|
||||||
|
illegalVerbs := []string{}
|
||||||
|
for _, verb := range r.PolicyRule.Verbs {
|
||||||
|
switch verb {
|
||||||
|
case "list", "watch", "create", "deletecollection":
|
||||||
|
illegalVerbs = append(illegalVerbs, verb)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(illegalVerbs) > 0 {
|
||||||
|
return PolicyRule{}, fmt.Errorf("verbs %v do not have names available: %#v", illegalVerbs, r.PolicyRule)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
default:
|
default:
|
||||||
return PolicyRule{}, fmt.Errorf("a rule must have either nonResourceURLs or resources: %#v", r.PolicyRule)
|
return PolicyRule{}, fmt.Errorf("a rule must have either nonResourceURLs or resources: %#v", r.PolicyRule)
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user