mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-28 05:57:25 +00:00
Merge pull request #67768 from sttts/sttts-unify-unspecified-authnz-apiserver-options
Automatic merge from submit-queue (batch tested with PRs 54935, 67768, 67896, 67787). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. apiserver: unify handling of unspecified options in authn/z options Use nil pointer for unspecified, not some kind of half zero-valued structs.
This commit is contained in:
commit
5afa23f2c4
4
staging/src/k8s.io/apiserver/Godeps/Godeps.json
generated
4
staging/src/k8s.io/apiserver/Godeps/Godeps.json
generated
@ -1862,10 +1862,6 @@
|
|||||||
"ImportPath": "k8s.io/client-go/kubernetes/typed/authorization/v1beta1",
|
"ImportPath": "k8s.io/client-go/kubernetes/typed/authorization/v1beta1",
|
||||||
"Rev": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
|
"Rev": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"ImportPath": "k8s.io/client-go/kubernetes/typed/core/v1",
|
|
||||||
"Rev": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"ImportPath": "k8s.io/client-go/listers/admissionregistration/v1beta1",
|
"ImportPath": "k8s.io/client-go/listers/admissionregistration/v1beta1",
|
||||||
"Rev": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
|
"Rev": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
|
||||||
|
@ -22,6 +22,7 @@ go_library(
|
|||||||
importpath = "k8s.io/apiserver/pkg/server/options",
|
importpath = "k8s.io/apiserver/pkg/server/options",
|
||||||
visibility = ["//visibility:public"],
|
visibility = ["//visibility:public"],
|
||||||
deps = [
|
deps = [
|
||||||
|
"//staging/src/k8s.io/api/core/v1:go_default_library",
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
|
"//staging/src/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/runtime:go_default_library",
|
"//staging/src/k8s.io/apimachinery/pkg/runtime:go_default_library",
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/runtime/schema:go_default_library",
|
"//staging/src/k8s.io/apimachinery/pkg/runtime/schema:go_default_library",
|
||||||
@ -65,9 +66,6 @@ go_library(
|
|||||||
"//staging/src/k8s.io/apiserver/plugin/pkg/audit/webhook:go_default_library",
|
"//staging/src/k8s.io/apiserver/plugin/pkg/audit/webhook:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/informers:go_default_library",
|
"//staging/src/k8s.io/client-go/informers:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/kubernetes:go_default_library",
|
"//staging/src/k8s.io/client-go/kubernetes:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/kubernetes/typed/authentication/v1beta1:go_default_library",
|
|
||||||
"//staging/src/k8s.io/client-go/kubernetes/typed/authorization/v1beta1:go_default_library",
|
|
||||||
"//staging/src/k8s.io/client-go/kubernetes/typed/core/v1:go_default_library",
|
|
||||||
"//staging/src/k8s.io/client-go/rest:go_default_library",
|
"//staging/src/k8s.io/client-go/rest:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/tools/clientcmd:go_default_library",
|
"//staging/src/k8s.io/client-go/tools/clientcmd:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/util/cert:go_default_library",
|
"//staging/src/k8s.io/client-go/util/cert:go_default_library",
|
||||||
|
@ -25,21 +25,24 @@ import (
|
|||||||
"github.com/golang/glog"
|
"github.com/golang/glog"
|
||||||
"github.com/spf13/pflag"
|
"github.com/spf13/pflag"
|
||||||
|
|
||||||
|
"k8s.io/api/core/v1"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apiserver/pkg/authentication/authenticatorfactory"
|
"k8s.io/apiserver/pkg/authentication/authenticatorfactory"
|
||||||
"k8s.io/apiserver/pkg/server"
|
"k8s.io/apiserver/pkg/server"
|
||||||
authenticationclient "k8s.io/client-go/kubernetes/typed/authentication/v1beta1"
|
"k8s.io/client-go/kubernetes"
|
||||||
coreclient "k8s.io/client-go/kubernetes/typed/core/v1"
|
|
||||||
"k8s.io/client-go/rest"
|
"k8s.io/client-go/rest"
|
||||||
"k8s.io/client-go/tools/clientcmd"
|
"k8s.io/client-go/tools/clientcmd"
|
||||||
openapicommon "k8s.io/kube-openapi/pkg/common"
|
openapicommon "k8s.io/kube-openapi/pkg/common"
|
||||||
)
|
)
|
||||||
|
|
||||||
type RequestHeaderAuthenticationOptions struct {
|
type RequestHeaderAuthenticationOptions struct {
|
||||||
|
// ClientCAFile is the root certificate bundle to verify client certificates on incoming requests
|
||||||
|
// before trusting usernames in headers.
|
||||||
|
ClientCAFile string
|
||||||
|
|
||||||
UsernameHeaders []string
|
UsernameHeaders []string
|
||||||
GroupHeaders []string
|
GroupHeaders []string
|
||||||
ExtraHeaderPrefixes []string
|
ExtraHeaderPrefixes []string
|
||||||
ClientCAFile string
|
|
||||||
AllowedNames []string
|
AllowedNames []string
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -158,35 +161,39 @@ func (s *DelegatingAuthenticationOptions) ApplyTo(c *server.AuthenticationInfo,
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
clientCA, err := s.getClientCA()
|
client, err := s.getClient()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to get delegated authentication kubeconfig: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg := authenticatorfactory.DelegatingAuthenticatorConfig{
|
||||||
|
Anonymous: true,
|
||||||
|
CacheTTL: s.CacheTTL,
|
||||||
|
TokenAccessReviewClient: client.AuthenticationV1beta1().TokenReviews(),
|
||||||
|
}
|
||||||
|
|
||||||
|
// look into configmaps/external-apiserver-authentication for missing authn info
|
||||||
|
if !s.SkipInClusterLookup {
|
||||||
|
err := s.lookupMissingConfigInCluster(client)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if _, ignorable := err.(ignorableError); !ignorable {
|
|
||||||
return err
|
return err
|
||||||
} else {
|
|
||||||
glog.Warning(err)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if err = c.ApplyClientCert(clientCA.ClientCA, servingInfo); err != nil {
|
|
||||||
|
// configure AuthenticationInfo config
|
||||||
|
if err = c.ApplyClientCert(s.ClientCert.ClientCA, servingInfo); err != nil {
|
||||||
|
return fmt.Errorf("unable to load client CA file: %v", err)
|
||||||
|
}
|
||||||
|
cfg.RequestHeaderConfig = s.RequestHeader.ToAuthenticationRequestHeaderConfig()
|
||||||
|
if err = c.ApplyClientCert(s.RequestHeader.ClientCAFile, servingInfo); err != nil {
|
||||||
return fmt.Errorf("unable to load client CA file: %v", err)
|
return fmt.Errorf("unable to load client CA file: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
requestHeader, err := s.getRequestHeader()
|
// create authenticator
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if err = c.ApplyClientCert(requestHeader.ClientCAFile, servingInfo); err != nil {
|
|
||||||
return fmt.Errorf("unable to load client CA file: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
cfg, err := s.ToAuthenticationConfig()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
authenticator, securityDefinitions, err := cfg.New()
|
authenticator, securityDefinitions, err := cfg.New()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
c.Authenticator = authenticator
|
c.Authenticator = authenticator
|
||||||
if openAPIConfig != nil {
|
if openAPIConfig != nil {
|
||||||
openAPIConfig.SecurityDefinitions = securityDefinitions
|
openAPIConfig.SecurityDefinitions = securityDefinitions
|
||||||
@ -196,35 +203,6 @@ func (s *DelegatingAuthenticationOptions) ApplyTo(c *server.AuthenticationInfo,
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DelegatingAuthenticationOptions) ToAuthenticationConfig() (authenticatorfactory.DelegatingAuthenticatorConfig, error) {
|
|
||||||
tokenClient, err := s.newTokenAccessReview()
|
|
||||||
if err != nil {
|
|
||||||
return authenticatorfactory.DelegatingAuthenticatorConfig{}, err
|
|
||||||
}
|
|
||||||
|
|
||||||
clientCA, err := s.getClientCA()
|
|
||||||
if err != nil {
|
|
||||||
if _, ignorable := err.(ignorableError); !ignorable {
|
|
||||||
return authenticatorfactory.DelegatingAuthenticatorConfig{}, err
|
|
||||||
} else {
|
|
||||||
glog.Warning(err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
requestHeader, err := s.getRequestHeader()
|
|
||||||
if err != nil {
|
|
||||||
return authenticatorfactory.DelegatingAuthenticatorConfig{}, err
|
|
||||||
}
|
|
||||||
|
|
||||||
ret := authenticatorfactory.DelegatingAuthenticatorConfig{
|
|
||||||
Anonymous: true,
|
|
||||||
TokenAccessReviewClient: tokenClient,
|
|
||||||
CacheTTL: s.CacheTTL,
|
|
||||||
ClientCAFile: clientCA.ClientCA,
|
|
||||||
RequestHeaderConfig: requestHeader.ToAuthenticationRequestHeaderConfig(),
|
|
||||||
}
|
|
||||||
return ret, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
const (
|
const (
|
||||||
authenticationConfigMapNamespace = metav1.NamespaceSystem
|
authenticationConfigMapNamespace = metav1.NamespaceSystem
|
||||||
// authenticationConfigMapName is the name of ConfigMap in the kube-system namespace holding the root certificate
|
// authenticationConfigMapName is the name of ConfigMap in the kube-system namespace holding the root certificate
|
||||||
@ -235,59 +213,50 @@ const (
|
|||||||
authenticationRoleName = "extension-apiserver-authentication-reader"
|
authenticationRoleName = "extension-apiserver-authentication-reader"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (s *DelegatingAuthenticationOptions) getClientCA() (*ClientCertAuthenticationOptions, error) {
|
func (s *DelegatingAuthenticationOptions) lookupMissingConfigInCluster(client kubernetes.Interface) error {
|
||||||
if len(s.ClientCert.ClientCA) > 0 || s.SkipInClusterLookup {
|
if len(s.ClientCert.ClientCA) > 0 && len(s.RequestHeader.ClientCAFile) > 0 {
|
||||||
return &s.ClientCert, nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
incluster, err := s.lookupInClusterClientCA()
|
authConfigMap, err := client.CoreV1().ConfigMaps(authenticationConfigMapNamespace).Get(authenticationConfigMapName, metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Warningf("Unable to get configmap/%s in %s. Usually fixed by "+
|
glog.Warningf("Unable to get configmap/%s in %s. Usually fixed by "+
|
||||||
"'kubectl create rolebinding -n %s ROLE_NAME --role=%s --serviceaccount=YOUR_NS:YOUR_SA'",
|
"'kubectl create rolebinding -n %s ROLE_NAME --role=%s --serviceaccount=YOUR_NS:YOUR_SA'",
|
||||||
authenticationConfigMapName, authenticationConfigMapNamespace, authenticationConfigMapNamespace, authenticationRoleName)
|
authenticationConfigMapName, authenticationConfigMapNamespace, authenticationConfigMapNamespace, authenticationRoleName)
|
||||||
return nil, err
|
return err
|
||||||
}
|
}
|
||||||
if incluster == nil {
|
|
||||||
return &s.ClientCert, ignorableError{fmt.Errorf("cluster doesn't provide client-ca-file in configmap/%s in %s, so client certificate authentication to extension api-server won't work.", authenticationConfigMapName, authenticationConfigMapNamespace)}
|
if len(s.ClientCert.ClientCA) == 0 {
|
||||||
|
opt, err := inClusterClientCA(authConfigMap)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
}
|
}
|
||||||
return incluster, nil
|
if opt == nil {
|
||||||
|
glog.Warningf("Cluster doesn't provide client-ca-file in configmap/%s in %s, so client certificate authentication to extension api-server won't work.", authenticationConfigMapName, authenticationConfigMapNamespace)
|
||||||
|
} else {
|
||||||
|
s.ClientCert = *opt
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(s.RequestHeader.ClientCAFile) == 0 {
|
||||||
|
opt, err := inClusterRequestHeader(authConfigMap)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if opt == nil {
|
||||||
|
glog.Warningf("Cluster doesn't provide requestheader-client-ca-file in configmap/%s in %s, so request-header client certificate authentication to extension api-server won't work.", authenticationConfigMapName, authenticationConfigMapNamespace)
|
||||||
|
} else {
|
||||||
|
s.RequestHeader = *opt
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DelegatingAuthenticationOptions) getRequestHeader() (*RequestHeaderAuthenticationOptions, error) {
|
func inClusterClientCA(authConfigMap *v1.ConfigMap) (*ClientCertAuthenticationOptions, error) {
|
||||||
if len(s.RequestHeader.ClientCAFile) > 0 || s.SkipInClusterLookup {
|
|
||||||
return &s.RequestHeader, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
incluster, err := s.lookupInClusterRequestHeader()
|
|
||||||
if err != nil {
|
|
||||||
glog.Warningf("Unable to get configmap/%s in %s. Usually fixed by "+
|
|
||||||
"'kubectl create rolebinding -n %s ROLE_NAME --role=%s --serviceaccount=YOUR_NS:YOUR_SA'",
|
|
||||||
authenticationConfigMapName, authenticationConfigMapNamespace, authenticationConfigMapNamespace, authenticationRoleName)
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
if incluster == nil {
|
|
||||||
return nil, fmt.Errorf("cluster doesn't provide requestheader-client-ca-file")
|
|
||||||
}
|
|
||||||
return incluster, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *DelegatingAuthenticationOptions) lookupInClusterClientCA() (*ClientCertAuthenticationOptions, error) {
|
|
||||||
clientConfig, err := s.getClientConfig()
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("failed to get delegated authentication kubeconfig: %v", err)
|
|
||||||
}
|
|
||||||
client, err := coreclient.NewForConfig(clientConfig)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
authConfigMap, err := client.ConfigMaps(authenticationConfigMapNamespace).Get(authenticationConfigMapName, metav1.GetOptions{})
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
clientCA, ok := authConfigMap.Data["client-ca-file"]
|
clientCA, ok := authConfigMap.Data["client-ca-file"]
|
||||||
if !ok {
|
if !ok {
|
||||||
|
// not having a client-ca is fine, return nil
|
||||||
return nil, nil
|
return nil, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -301,23 +270,10 @@ func (s *DelegatingAuthenticationOptions) lookupInClusterClientCA() (*ClientCert
|
|||||||
return &ClientCertAuthenticationOptions{ClientCA: f.Name()}, nil
|
return &ClientCertAuthenticationOptions{ClientCA: f.Name()}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DelegatingAuthenticationOptions) lookupInClusterRequestHeader() (*RequestHeaderAuthenticationOptions, error) {
|
func inClusterRequestHeader(authConfigMap *v1.ConfigMap) (*RequestHeaderAuthenticationOptions, error) {
|
||||||
clientConfig, err := s.getClientConfig()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
client, err := coreclient.NewForConfig(clientConfig)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
authConfigMap, err := client.ConfigMaps(authenticationConfigMapNamespace).Get(authenticationConfigMapName, metav1.GetOptions{})
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
requestHeaderCA, ok := authConfigMap.Data["requestheader-client-ca-file"]
|
requestHeaderCA, ok := authConfigMap.Data["requestheader-client-ca-file"]
|
||||||
if !ok {
|
if !ok {
|
||||||
|
// not having a requestheader-client-ca is fine, return nil
|
||||||
return nil, nil
|
return nil, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -365,7 +321,7 @@ func deserializeStrings(in string) ([]string, error) {
|
|||||||
return ret, nil
|
return ret, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DelegatingAuthenticationOptions) getClientConfig() (*rest.Config, error) {
|
func (s *DelegatingAuthenticationOptions) getClient() (kubernetes.Interface, error) {
|
||||||
var clientConfig *rest.Config
|
var clientConfig *rest.Config
|
||||||
var err error
|
var err error
|
||||||
if len(s.RemoteKubeConfigFile) > 0 {
|
if len(s.RemoteKubeConfigFile) > 0 {
|
||||||
@ -380,27 +336,12 @@ func (s *DelegatingAuthenticationOptions) getClientConfig() (*rest.Config, error
|
|||||||
clientConfig, err = rest.InClusterConfig()
|
clientConfig, err = rest.InClusterConfig()
|
||||||
}
|
}
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, fmt.Errorf("failed to get delegated authentication kubeconfig: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// set high qps/burst limits since this will effectively limit API server responsiveness
|
// set high qps/burst limits since this will effectively limit API server responsiveness
|
||||||
clientConfig.QPS = 200
|
clientConfig.QPS = 200
|
||||||
clientConfig.Burst = 400
|
clientConfig.Burst = 400
|
||||||
|
|
||||||
return clientConfig, nil
|
return kubernetes.NewForConfig(clientConfig)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DelegatingAuthenticationOptions) newTokenAccessReview() (authenticationclient.TokenReviewInterface, error) {
|
|
||||||
clientConfig, err := s.getClientConfig()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
client, err := authenticationclient.NewForConfig(clientConfig)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return client.TokenReviews(), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
type ignorableError struct{ error }
|
|
||||||
|
@ -27,7 +27,7 @@ import (
|
|||||||
"k8s.io/apiserver/pkg/authorization/path"
|
"k8s.io/apiserver/pkg/authorization/path"
|
||||||
"k8s.io/apiserver/pkg/authorization/union"
|
"k8s.io/apiserver/pkg/authorization/union"
|
||||||
"k8s.io/apiserver/pkg/server"
|
"k8s.io/apiserver/pkg/server"
|
||||||
authorizationclient "k8s.io/client-go/kubernetes/typed/authorization/v1beta1"
|
"k8s.io/client-go/kubernetes"
|
||||||
"k8s.io/client-go/rest"
|
"k8s.io/client-go/rest"
|
||||||
"k8s.io/client-go/tools/clientcmd"
|
"k8s.io/client-go/tools/clientcmd"
|
||||||
)
|
)
|
||||||
@ -95,15 +95,16 @@ func (s *DelegatingAuthorizationOptions) ApplyTo(c *server.AuthorizationInfo) er
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
a, err := s.ToAuthorization()
|
client, err := s.getClient()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
c.Authorizer = a
|
|
||||||
return nil
|
c.Authorizer, err = s.toAuthorizer(client)
|
||||||
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DelegatingAuthorizationOptions) ToAuthorization() (authorizer.Authorizer, error) {
|
func (s *DelegatingAuthorizationOptions) toAuthorizer(client kubernetes.Interface) (authorizer.Authorizer, error) {
|
||||||
var authorizers []authorizer.Authorizer
|
var authorizers []authorizer.Authorizer
|
||||||
|
|
||||||
if len(s.AlwaysAllowPaths) > 0 {
|
if len(s.AlwaysAllowPaths) > 0 {
|
||||||
@ -114,12 +115,8 @@ func (s *DelegatingAuthorizationOptions) ToAuthorization() (authorizer.Authorize
|
|||||||
authorizers = append(authorizers, a)
|
authorizers = append(authorizers, a)
|
||||||
}
|
}
|
||||||
|
|
||||||
sarClient, err := s.newSubjectAccessReview()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
cfg := authorizerfactory.DelegatingAuthorizerConfig{
|
cfg := authorizerfactory.DelegatingAuthorizerConfig{
|
||||||
SubjectAccessReviewClient: sarClient,
|
SubjectAccessReviewClient: client.AuthorizationV1beta1().SubjectAccessReviews(),
|
||||||
AllowCacheTTL: s.AllowCacheTTL,
|
AllowCacheTTL: s.AllowCacheTTL,
|
||||||
DenyCacheTTL: s.DenyCacheTTL,
|
DenyCacheTTL: s.DenyCacheTTL,
|
||||||
}
|
}
|
||||||
@ -132,7 +129,7 @@ func (s *DelegatingAuthorizationOptions) ToAuthorization() (authorizer.Authorize
|
|||||||
return union.New(authorizers...), nil
|
return union.New(authorizers...), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DelegatingAuthorizationOptions) newSubjectAccessReview() (authorizationclient.SubjectAccessReviewInterface, error) {
|
func (s *DelegatingAuthorizationOptions) getClient() (kubernetes.Interface, error) {
|
||||||
var clientConfig *rest.Config
|
var clientConfig *rest.Config
|
||||||
var err error
|
var err error
|
||||||
if len(s.RemoteKubeConfigFile) > 0 {
|
if len(s.RemoteKubeConfigFile) > 0 {
|
||||||
@ -140,7 +137,6 @@ func (s *DelegatingAuthorizationOptions) newSubjectAccessReview() (authorization
|
|||||||
loader := clientcmd.NewNonInteractiveDeferredLoadingClientConfig(loadingRules, &clientcmd.ConfigOverrides{})
|
loader := clientcmd.NewNonInteractiveDeferredLoadingClientConfig(loadingRules, &clientcmd.ConfigOverrides{})
|
||||||
|
|
||||||
clientConfig, err = loader.ClientConfig()
|
clientConfig, err = loader.ClientConfig()
|
||||||
|
|
||||||
} else {
|
} else {
|
||||||
// without the remote kubeconfig file, try to use the in-cluster config. Most addon API servers will
|
// without the remote kubeconfig file, try to use the in-cluster config. Most addon API servers will
|
||||||
// use this path
|
// use this path
|
||||||
@ -154,10 +150,5 @@ func (s *DelegatingAuthorizationOptions) newSubjectAccessReview() (authorization
|
|||||||
clientConfig.QPS = 200
|
clientConfig.QPS = 200
|
||||||
clientConfig.Burst = 400
|
clientConfig.Burst = 400
|
||||||
|
|
||||||
client, err := authorizationclient.NewForConfig(clientConfig)
|
return kubernetes.NewForConfig(clientConfig)
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return client.SubjectAccessReviews(), nil
|
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user