mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-23 19:56:01 +00:00
genericapiserver: cut off pkg/serviceaccount dependency
This commit is contained in:
parent
1c4849c403
commit
bf307d9948
@ -43,6 +43,7 @@ go_library(
|
|||||||
"//vendor:k8s.io/apimachinery/pkg/runtime/schema",
|
"//vendor:k8s.io/apimachinery/pkg/runtime/schema",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/util/sets",
|
"//vendor:k8s.io/apimachinery/pkg/util/sets",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/watch",
|
"//vendor:k8s.io/apimachinery/pkg/watch",
|
||||||
|
"//vendor:k8s.io/apiserver/pkg/authentication/serviceaccount",
|
||||||
],
|
],
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -24,6 +24,7 @@ import (
|
|||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/runtime"
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
"k8s.io/apimachinery/pkg/watch"
|
"k8s.io/apimachinery/pkg/watch"
|
||||||
|
apiserverserviceaccount "k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
"k8s.io/kubernetes/pkg/client/cache"
|
"k8s.io/kubernetes/pkg/client/cache"
|
||||||
@ -146,7 +147,7 @@ func (b SAControllerClientBuilder) Config(name string) (*restclient.Config, erro
|
|||||||
}
|
}
|
||||||
// TODO maybe verify the token is valid
|
// TODO maybe verify the token is valid
|
||||||
clientConfig.BearerToken = string(secret.Data[v1.ServiceAccountTokenKey])
|
clientConfig.BearerToken = string(secret.Data[v1.ServiceAccountTokenKey])
|
||||||
restclient.AddUserAgent(clientConfig, serviceaccount.MakeUsername(b.Namespace, name))
|
restclient.AddUserAgent(clientConfig, apiserverserviceaccount.MakeUsername(b.Namespace, name))
|
||||||
return true, nil
|
return true, nil
|
||||||
|
|
||||||
default:
|
default:
|
||||||
|
@ -22,10 +22,10 @@ go_library(
|
|||||||
"//pkg/api:go_default_library",
|
"//pkg/api:go_default_library",
|
||||||
"//pkg/apis/authentication:go_default_library",
|
"//pkg/apis/authentication:go_default_library",
|
||||||
"//pkg/genericapiserver/api/handlers/responsewriters:go_default_library",
|
"//pkg/genericapiserver/api/handlers/responsewriters:go_default_library",
|
||||||
"//pkg/serviceaccount:go_default_library",
|
|
||||||
"//vendor:github.com/golang/glog",
|
"//vendor:github.com/golang/glog",
|
||||||
"//vendor:github.com/pborman/uuid",
|
"//vendor:github.com/pborman/uuid",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/util/net",
|
"//vendor:k8s.io/apimachinery/pkg/util/net",
|
||||||
|
"//vendor:k8s.io/apiserver/pkg/authentication/serviceaccount",
|
||||||
"//vendor:k8s.io/apiserver/pkg/authentication/user",
|
"//vendor:k8s.io/apiserver/pkg/authentication/user",
|
||||||
"//vendor:k8s.io/apiserver/pkg/authorization/authorizer",
|
"//vendor:k8s.io/apiserver/pkg/authorization/authorizer",
|
||||||
"//vendor:k8s.io/apiserver/pkg/httplog",
|
"//vendor:k8s.io/apiserver/pkg/httplog",
|
||||||
|
@ -24,6 +24,7 @@ import (
|
|||||||
|
|
||||||
"github.com/golang/glog"
|
"github.com/golang/glog"
|
||||||
|
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
"k8s.io/apiserver/pkg/authorization/authorizer"
|
"k8s.io/apiserver/pkg/authorization/authorizer"
|
||||||
"k8s.io/apiserver/pkg/httplog"
|
"k8s.io/apiserver/pkg/httplog"
|
||||||
@ -31,7 +32,6 @@ import (
|
|||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
authenticationapi "k8s.io/kubernetes/pkg/apis/authentication"
|
authenticationapi "k8s.io/kubernetes/pkg/apis/authentication"
|
||||||
"k8s.io/kubernetes/pkg/genericapiserver/api/handlers/responsewriters"
|
"k8s.io/kubernetes/pkg/genericapiserver/api/handlers/responsewriters"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// WithImpersonation is a filter that will inspect and check requests that attempt to change the user.Info for their requests
|
// WithImpersonation is a filter that will inspect and check requests that attempt to change the user.Info for their requests
|
||||||
|
@ -33,10 +33,10 @@ go_library(
|
|||||||
tags = ["automanaged"],
|
tags = ["automanaged"],
|
||||||
deps = [
|
deps = [
|
||||||
"//pkg/apis/rbac:go_default_library",
|
"//pkg/apis/rbac:go_default_library",
|
||||||
"//pkg/serviceaccount:go_default_library",
|
|
||||||
"//vendor:github.com/golang/glog",
|
"//vendor:github.com/golang/glog",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/api/errors",
|
"//vendor:k8s.io/apimachinery/pkg/api/errors",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/util/errors",
|
"//vendor:k8s.io/apimachinery/pkg/util/errors",
|
||||||
|
"//vendor:k8s.io/apiserver/pkg/authentication/serviceaccount",
|
||||||
"//vendor:k8s.io/apiserver/pkg/authentication/user",
|
"//vendor:k8s.io/apiserver/pkg/authentication/user",
|
||||||
"//vendor:k8s.io/apiserver/pkg/request",
|
"//vendor:k8s.io/apiserver/pkg/request",
|
||||||
],
|
],
|
||||||
|
@ -21,12 +21,13 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
"github.com/golang/glog"
|
"github.com/golang/glog"
|
||||||
|
|
||||||
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
||||||
utilerrors "k8s.io/apimachinery/pkg/util/errors"
|
utilerrors "k8s.io/apimachinery/pkg/util/errors"
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
genericapirequest "k8s.io/apiserver/pkg/request"
|
genericapirequest "k8s.io/apiserver/pkg/request"
|
||||||
"k8s.io/kubernetes/pkg/apis/rbac"
|
"k8s.io/kubernetes/pkg/apis/rbac"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type AuthorizationRuleResolver interface {
|
type AuthorizationRuleResolver interface {
|
||||||
|
@ -8,13 +8,6 @@ load(
|
|||||||
"go_test",
|
"go_test",
|
||||||
)
|
)
|
||||||
|
|
||||||
go_test(
|
|
||||||
name = "go_default_test",
|
|
||||||
srcs = ["util_test.go"],
|
|
||||||
library = ":go_default_library",
|
|
||||||
tags = ["automanaged"],
|
|
||||||
)
|
|
||||||
|
|
||||||
go_library(
|
go_library(
|
||||||
name = "go_default_library",
|
name = "go_default_library",
|
||||||
srcs = [
|
srcs = [
|
||||||
@ -25,10 +18,10 @@ go_library(
|
|||||||
deps = [
|
deps = [
|
||||||
"//pkg/api:go_default_library",
|
"//pkg/api:go_default_library",
|
||||||
"//pkg/api/v1:go_default_library",
|
"//pkg/api/v1:go_default_library",
|
||||||
"//pkg/api/validation/genericvalidation:go_default_library",
|
|
||||||
"//vendor:github.com/dgrijalva/jwt-go",
|
"//vendor:github.com/dgrijalva/jwt-go",
|
||||||
"//vendor:github.com/golang/glog",
|
"//vendor:github.com/golang/glog",
|
||||||
"//vendor:k8s.io/apiserver/pkg/authentication/authenticator",
|
"//vendor:k8s.io/apiserver/pkg/authentication/authenticator",
|
||||||
|
"//vendor:k8s.io/apiserver/pkg/authentication/serviceaccount",
|
||||||
"//vendor:k8s.io/apiserver/pkg/authentication/user",
|
"//vendor:k8s.io/apiserver/pkg/authentication/user",
|
||||||
],
|
],
|
||||||
)
|
)
|
||||||
@ -43,6 +36,7 @@ go_test(
|
|||||||
"//pkg/client/clientset_generated/clientset/fake:go_default_library",
|
"//pkg/client/clientset_generated/clientset/fake:go_default_library",
|
||||||
"//pkg/controller/serviceaccount:go_default_library",
|
"//pkg/controller/serviceaccount:go_default_library",
|
||||||
"//pkg/serviceaccount:go_default_library",
|
"//pkg/serviceaccount:go_default_library",
|
||||||
|
"//vendor:k8s.io/apiserver/pkg/authentication/serviceaccount",
|
||||||
],
|
],
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -27,6 +27,7 @@ import (
|
|||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
|
|
||||||
"k8s.io/apiserver/pkg/authentication/authenticator"
|
"k8s.io/apiserver/pkg/authentication/authenticator"
|
||||||
|
apiserverserviceaccount "k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
|
|
||||||
@ -176,7 +177,7 @@ func (j *jwtTokenGenerator) GenerateToken(serviceAccount v1.ServiceAccount, secr
|
|||||||
claims[IssuerClaim] = Issuer
|
claims[IssuerClaim] = Issuer
|
||||||
|
|
||||||
// Username
|
// Username
|
||||||
claims[SubjectClaim] = MakeUsername(serviceAccount.Namespace, serviceAccount.Name)
|
claims[SubjectClaim] = apiserverserviceaccount.MakeUsername(serviceAccount.Namespace, serviceAccount.Name)
|
||||||
|
|
||||||
// Persist enough structured info for the authenticator to be able to look up the service account and secret
|
// Persist enough structured info for the authenticator to be able to look up the service account and secret
|
||||||
claims[NamespaceClaim] = serviceAccount.Namespace
|
claims[NamespaceClaim] = serviceAccount.Namespace
|
||||||
@ -287,7 +288,7 @@ func (j *jwtTokenAuthenticator) AuthenticateToken(token string) (user.Info, bool
|
|||||||
return nil, false, errors.New("serviceAccountUID claim is missing")
|
return nil, false, errors.New("serviceAccountUID claim is missing")
|
||||||
}
|
}
|
||||||
|
|
||||||
subjectNamespace, subjectName, err := SplitUsername(sub)
|
subjectNamespace, subjectName, err := apiserverserviceaccount.SplitUsername(sub)
|
||||||
if err != nil || subjectNamespace != namespace || subjectName != serviceAccountName {
|
if err != nil || subjectNamespace != namespace || subjectName != serviceAccountName {
|
||||||
return nil, false, errors.New("sub claim is invalid")
|
return nil, false, errors.New("sub claim is invalid")
|
||||||
}
|
}
|
||||||
|
@ -22,6 +22,7 @@ import (
|
|||||||
"reflect"
|
"reflect"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
apiserverserviceaccount "k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
clientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
clientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
||||||
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset/fake"
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset/fake"
|
||||||
@ -349,8 +350,8 @@ func TestTokenGenerateAndValidate(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestMakeSplitUsername(t *testing.T) {
|
func TestMakeSplitUsername(t *testing.T) {
|
||||||
username := serviceaccount.MakeUsername("ns", "name")
|
username := apiserverserviceaccount.MakeUsername("ns", "name")
|
||||||
ns, name, err := serviceaccount.SplitUsername(username)
|
ns, name, err := apiserverserviceaccount.SplitUsername(username)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Errorf("Unexpected error %v", err)
|
t.Errorf("Unexpected error %v", err)
|
||||||
}
|
}
|
||||||
@ -360,7 +361,7 @@ func TestMakeSplitUsername(t *testing.T) {
|
|||||||
|
|
||||||
invalid := []string{"test", "system:serviceaccount", "system:serviceaccount:", "system:serviceaccount:ns", "system:serviceaccount:ns:name:extra"}
|
invalid := []string{"test", "system:serviceaccount", "system:serviceaccount:", "system:serviceaccount:ns", "system:serviceaccount:ns:name:extra"}
|
||||||
for _, n := range invalid {
|
for _, n := range invalid {
|
||||||
_, _, err := serviceaccount.SplitUsername("test")
|
_, _, err := apiserverserviceaccount.SplitUsername("test")
|
||||||
if err == nil {
|
if err == nil {
|
||||||
t.Errorf("Expected error for %s", n)
|
t.Errorf("Expected error for %s", n)
|
||||||
}
|
}
|
||||||
|
@ -17,70 +17,18 @@ limitations under the License.
|
|||||||
package serviceaccount
|
package serviceaccount
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
apiserverserviceaccount "k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"strings"
|
|
||||||
|
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
"k8s.io/kubernetes/pkg/api/validation/genericvalidation"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
|
||||||
ServiceAccountUsernamePrefix = "system:serviceaccount:"
|
|
||||||
ServiceAccountUsernameSeparator = ":"
|
|
||||||
ServiceAccountGroupPrefix = "system:serviceaccounts:"
|
|
||||||
AllServiceAccountsGroup = "system:serviceaccounts"
|
|
||||||
)
|
|
||||||
|
|
||||||
// MakeUsername generates a username from the given namespace and ServiceAccount name.
|
|
||||||
// The resulting username can be passed to SplitUsername to extract the original namespace and ServiceAccount name.
|
|
||||||
func MakeUsername(namespace, name string) string {
|
|
||||||
return ServiceAccountUsernamePrefix + namespace + ServiceAccountUsernameSeparator + name
|
|
||||||
}
|
|
||||||
|
|
||||||
var invalidUsernameErr = fmt.Errorf("Username must be in the form %s", MakeUsername("namespace", "name"))
|
|
||||||
|
|
||||||
// SplitUsername returns the namespace and ServiceAccount name embedded in the given username,
|
|
||||||
// or an error if the username is not a valid name produced by MakeUsername
|
|
||||||
func SplitUsername(username string) (string, string, error) {
|
|
||||||
if !strings.HasPrefix(username, ServiceAccountUsernamePrefix) {
|
|
||||||
return "", "", invalidUsernameErr
|
|
||||||
}
|
|
||||||
trimmed := strings.TrimPrefix(username, ServiceAccountUsernamePrefix)
|
|
||||||
parts := strings.Split(trimmed, ServiceAccountUsernameSeparator)
|
|
||||||
if len(parts) != 2 {
|
|
||||||
return "", "", invalidUsernameErr
|
|
||||||
}
|
|
||||||
namespace, name := parts[0], parts[1]
|
|
||||||
if len(genericvalidation.ValidateNamespaceName(namespace, false)) != 0 {
|
|
||||||
return "", "", invalidUsernameErr
|
|
||||||
}
|
|
||||||
if len(genericvalidation.ValidateServiceAccountName(name, false)) != 0 {
|
|
||||||
return "", "", invalidUsernameErr
|
|
||||||
}
|
|
||||||
return namespace, name, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// MakeGroupNames generates service account group names for the given namespace and ServiceAccount name
|
|
||||||
func MakeGroupNames(namespace, name string) []string {
|
|
||||||
return []string{
|
|
||||||
AllServiceAccountsGroup,
|
|
||||||
MakeNamespaceGroupName(namespace),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// MakeNamespaceGroupName returns the name of the group all service accounts in the namespace are included in
|
|
||||||
func MakeNamespaceGroupName(namespace string) string {
|
|
||||||
return ServiceAccountGroupPrefix + namespace
|
|
||||||
}
|
|
||||||
|
|
||||||
// UserInfo returns a user.Info interface for the given namespace, service account name and UID
|
// UserInfo returns a user.Info interface for the given namespace, service account name and UID
|
||||||
func UserInfo(namespace, name, uid string) user.Info {
|
func UserInfo(namespace, name, uid string) user.Info {
|
||||||
return &user.DefaultInfo{
|
return &user.DefaultInfo{
|
||||||
Name: MakeUsername(namespace, name),
|
Name: apiserverserviceaccount.MakeUsername(namespace, name),
|
||||||
UID: uid,
|
UID: uid,
|
||||||
Groups: MakeGroupNames(namespace, name),
|
Groups: apiserverserviceaccount.MakeGroupNames(namespace, name),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -0,0 +1,73 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2014 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package serviceaccount
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"k8s.io/kubernetes/pkg/api/validation/genericvalidation"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
ServiceAccountUsernamePrefix = "system:serviceaccount:"
|
||||||
|
ServiceAccountUsernameSeparator = ":"
|
||||||
|
ServiceAccountGroupPrefix = "system:serviceaccounts:"
|
||||||
|
AllServiceAccountsGroup = "system:serviceaccounts"
|
||||||
|
)
|
||||||
|
|
||||||
|
// MakeUsername generates a username from the given namespace and ServiceAccount name.
|
||||||
|
// The resulting username can be passed to SplitUsername to extract the original namespace and ServiceAccount name.
|
||||||
|
func MakeUsername(namespace, name string) string {
|
||||||
|
return ServiceAccountUsernamePrefix + namespace + ServiceAccountUsernameSeparator + name
|
||||||
|
}
|
||||||
|
|
||||||
|
var invalidUsernameErr = fmt.Errorf("Username must be in the form %s", MakeUsername("namespace", "name"))
|
||||||
|
|
||||||
|
// SplitUsername returns the namespace and ServiceAccount name embedded in the given username,
|
||||||
|
// or an error if the username is not a valid name produced by MakeUsername
|
||||||
|
func SplitUsername(username string) (string, string, error) {
|
||||||
|
if !strings.HasPrefix(username, ServiceAccountUsernamePrefix) {
|
||||||
|
return "", "", invalidUsernameErr
|
||||||
|
}
|
||||||
|
trimmed := strings.TrimPrefix(username, ServiceAccountUsernamePrefix)
|
||||||
|
parts := strings.Split(trimmed, ServiceAccountUsernameSeparator)
|
||||||
|
if len(parts) != 2 {
|
||||||
|
return "", "", invalidUsernameErr
|
||||||
|
}
|
||||||
|
namespace, name := parts[0], parts[1]
|
||||||
|
if len(genericvalidation.ValidateNamespaceName(namespace, false)) != 0 {
|
||||||
|
return "", "", invalidUsernameErr
|
||||||
|
}
|
||||||
|
if len(genericvalidation.ValidateServiceAccountName(name, false)) != 0 {
|
||||||
|
return "", "", invalidUsernameErr
|
||||||
|
}
|
||||||
|
return namespace, name, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// MakeGroupNames generates service account group names for the given namespace and ServiceAccount name
|
||||||
|
func MakeGroupNames(namespace, name string) []string {
|
||||||
|
return []string{
|
||||||
|
AllServiceAccountsGroup,
|
||||||
|
MakeNamespaceGroupName(namespace),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// MakeNamespaceGroupName returns the name of the group all service accounts in the namespace are included in
|
||||||
|
func MakeNamespaceGroupName(namespace string) string {
|
||||||
|
return ServiceAccountGroupPrefix + namespace
|
||||||
|
}
|
@ -158,7 +158,6 @@ go_library(
|
|||||||
"//pkg/quota/evaluator/core:go_default_library",
|
"//pkg/quota/evaluator/core:go_default_library",
|
||||||
"//pkg/registry/generic/registry:go_default_library",
|
"//pkg/registry/generic/registry:go_default_library",
|
||||||
"//pkg/security/apparmor:go_default_library",
|
"//pkg/security/apparmor:go_default_library",
|
||||||
"//pkg/serviceaccount:go_default_library",
|
|
||||||
"//pkg/util:go_default_library",
|
"//pkg/util:go_default_library",
|
||||||
"//pkg/util/exec:go_default_library",
|
"//pkg/util/exec:go_default_library",
|
||||||
"//pkg/util/flowcontrol:go_default_library",
|
"//pkg/util/flowcontrol:go_default_library",
|
||||||
@ -208,6 +207,7 @@ go_library(
|
|||||||
"//vendor:k8s.io/apimachinery/pkg/util/wait",
|
"//vendor:k8s.io/apimachinery/pkg/util/wait",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/util/yaml",
|
"//vendor:k8s.io/apimachinery/pkg/util/yaml",
|
||||||
"//vendor:k8s.io/apimachinery/pkg/watch",
|
"//vendor:k8s.io/apimachinery/pkg/watch",
|
||||||
|
"//vendor:k8s.io/apiserver/pkg/authentication/serviceaccount",
|
||||||
"//vendor:k8s.io/client-go/kubernetes",
|
"//vendor:k8s.io/client-go/kubernetes",
|
||||||
"//vendor:k8s.io/client-go/pkg/api/v1",
|
"//vendor:k8s.io/client-go/pkg/api/v1",
|
||||||
"//vendor:k8s.io/client-go/pkg/apis/extensions/v1beta1",
|
"//vendor:k8s.io/client-go/pkg/apis/extensions/v1beta1",
|
||||||
|
@ -31,10 +31,10 @@ import (
|
|||||||
"k8s.io/apimachinery/pkg/labels"
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
"k8s.io/apimachinery/pkg/util/wait"
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
||||||
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
"k8s.io/kubernetes/test/e2e/framework"
|
"k8s.io/kubernetes/test/e2e/framework"
|
||||||
"k8s.io/kubernetes/test/e2e/generated"
|
"k8s.io/kubernetes/test/e2e/generated"
|
||||||
testutils "k8s.io/kubernetes/test/utils"
|
testutils "k8s.io/kubernetes/test/utils"
|
||||||
|
@ -22,8 +22,8 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
|
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
"k8s.io/kubernetes/test/e2e/framework"
|
"k8s.io/kubernetes/test/e2e/framework"
|
||||||
|
|
||||||
. "github.com/onsi/ginkgo"
|
. "github.com/onsi/ginkgo"
|
||||||
|
@ -48,6 +48,7 @@ import (
|
|||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
utilnet "k8s.io/apimachinery/pkg/util/net"
|
utilnet "k8s.io/apimachinery/pkg/util/net"
|
||||||
"k8s.io/apimachinery/pkg/util/wait"
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/kubernetes/pkg/api/annotations"
|
"k8s.io/kubernetes/pkg/api/annotations"
|
||||||
"k8s.io/kubernetes/pkg/api/resource"
|
"k8s.io/kubernetes/pkg/api/resource"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
@ -56,7 +57,6 @@ import (
|
|||||||
"k8s.io/kubernetes/pkg/controller"
|
"k8s.io/kubernetes/pkg/controller"
|
||||||
"k8s.io/kubernetes/pkg/kubectl/cmd/util"
|
"k8s.io/kubernetes/pkg/kubectl/cmd/util"
|
||||||
genericregistry "k8s.io/kubernetes/pkg/registry/generic/registry"
|
genericregistry "k8s.io/kubernetes/pkg/registry/generic/registry"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
uexec "k8s.io/kubernetes/pkg/util/exec"
|
uexec "k8s.io/kubernetes/pkg/util/exec"
|
||||||
"k8s.io/kubernetes/pkg/util/uuid"
|
"k8s.io/kubernetes/pkg/util/uuid"
|
||||||
utilversion "k8s.io/kubernetes/pkg/util/version"
|
utilversion "k8s.io/kubernetes/pkg/util/version"
|
||||||
|
@ -25,13 +25,13 @@ import (
|
|||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/labels"
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
||||||
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
||||||
coreclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/core/v1"
|
coreclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/core/v1"
|
||||||
"k8s.io/kubernetes/pkg/fields"
|
"k8s.io/kubernetes/pkg/fields"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
"k8s.io/kubernetes/pkg/util/system"
|
"k8s.io/kubernetes/pkg/util/system"
|
||||||
"k8s.io/kubernetes/pkg/util/uuid"
|
"k8s.io/kubernetes/pkg/util/uuid"
|
||||||
"k8s.io/kubernetes/test/e2e/framework"
|
"k8s.io/kubernetes/test/e2e/framework"
|
||||||
|
@ -25,10 +25,10 @@ import (
|
|||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
"k8s.io/apimachinery/pkg/util/wait"
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
||||||
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
"k8s.io/kubernetes/test/e2e/framework"
|
"k8s.io/kubernetes/test/e2e/framework"
|
||||||
|
|
||||||
. "github.com/onsi/ginkgo"
|
. "github.com/onsi/ginkgo"
|
||||||
|
@ -39,6 +39,7 @@ import (
|
|||||||
"k8s.io/apiserver/pkg/authentication/authenticator"
|
"k8s.io/apiserver/pkg/authentication/authenticator"
|
||||||
"k8s.io/apiserver/pkg/authentication/group"
|
"k8s.io/apiserver/pkg/authentication/group"
|
||||||
"k8s.io/apiserver/pkg/authentication/request/bearertoken"
|
"k8s.io/apiserver/pkg/authentication/request/bearertoken"
|
||||||
|
"k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
"k8s.io/apiserver/pkg/authorization/authorizer"
|
"k8s.io/apiserver/pkg/authorization/authorizer"
|
||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
@ -49,7 +50,6 @@ import (
|
|||||||
"k8s.io/kubernetes/pkg/auth/authorizer/abac"
|
"k8s.io/kubernetes/pkg/auth/authorizer/abac"
|
||||||
"k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api/v1"
|
"k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api/v1"
|
||||||
apiserverauthorizer "k8s.io/kubernetes/pkg/genericapiserver/authorizer"
|
apiserverauthorizer "k8s.io/kubernetes/pkg/genericapiserver/authorizer"
|
||||||
"k8s.io/kubernetes/pkg/serviceaccount"
|
|
||||||
"k8s.io/kubernetes/plugin/pkg/admission/admit"
|
"k8s.io/kubernetes/plugin/pkg/admission/admit"
|
||||||
"k8s.io/kubernetes/plugin/pkg/auth/authenticator/token/tokentest"
|
"k8s.io/kubernetes/plugin/pkg/auth/authenticator/token/tokentest"
|
||||||
"k8s.io/kubernetes/plugin/pkg/auth/authenticator/token/webhook"
|
"k8s.io/kubernetes/plugin/pkg/auth/authenticator/token/webhook"
|
||||||
|
@ -38,6 +38,7 @@ import (
|
|||||||
"k8s.io/apiserver/pkg/authentication/authenticator"
|
"k8s.io/apiserver/pkg/authentication/authenticator"
|
||||||
"k8s.io/apiserver/pkg/authentication/request/bearertoken"
|
"k8s.io/apiserver/pkg/authentication/request/bearertoken"
|
||||||
"k8s.io/apiserver/pkg/authentication/request/union"
|
"k8s.io/apiserver/pkg/authentication/request/union"
|
||||||
|
serviceaccountapiserver "k8s.io/apiserver/pkg/authentication/serviceaccount"
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
"k8s.io/apiserver/pkg/authorization/authorizer"
|
"k8s.io/apiserver/pkg/authorization/authorizer"
|
||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
@ -385,7 +386,7 @@ func startServiceAccountTestServer(t *testing.T) (*clientset.Clientset, restclie
|
|||||||
}
|
}
|
||||||
|
|
||||||
// If the user is a service account...
|
// If the user is a service account...
|
||||||
if serviceAccountNamespace, serviceAccountName, err := serviceaccount.SplitUsername(username); err == nil {
|
if serviceAccountNamespace, serviceAccountName, err := serviceaccountapiserver.SplitUsername(username); err == nil {
|
||||||
// Limit them to their own namespace
|
// Limit them to their own namespace
|
||||||
if serviceAccountNamespace == ns {
|
if serviceAccountNamespace == ns {
|
||||||
switch serviceAccountName {
|
switch serviceAccountName {
|
||||||
|
3864
vendor/BUILD
vendored
3864
vendor/BUILD
vendored
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user