mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-31 05:40:42 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			89 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			89 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2016 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package selfsubjectaccessreview
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 
 | |
| 	apierrors "k8s.io/apimachinery/pkg/api/errors"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/apimachinery/pkg/runtime"
 | |
| 	"k8s.io/apiserver/pkg/authorization/authorizer"
 | |
| 	genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
 | |
| 	"k8s.io/apiserver/pkg/registry/rest"
 | |
| 	authorizationapi "k8s.io/kubernetes/pkg/apis/authorization"
 | |
| 	authorizationvalidation "k8s.io/kubernetes/pkg/apis/authorization/validation"
 | |
| 	authorizationutil "k8s.io/kubernetes/pkg/registry/authorization/util"
 | |
| )
 | |
| 
 | |
| type REST struct {
 | |
| 	authorizer authorizer.Authorizer
 | |
| }
 | |
| 
 | |
| func NewREST(authorizer authorizer.Authorizer) *REST {
 | |
| 	return &REST{authorizer}
 | |
| }
 | |
| 
 | |
| func (r *REST) NamespaceScoped() bool {
 | |
| 	return false
 | |
| }
 | |
| 
 | |
| func (r *REST) New() runtime.Object {
 | |
| 	return &authorizationapi.SelfSubjectAccessReview{}
 | |
| }
 | |
| 
 | |
| func (r *REST) Create(ctx context.Context, obj runtime.Object, createValidation rest.ValidateObjectFunc, options *metav1.CreateOptions) (runtime.Object, error) {
 | |
| 	selfSAR, ok := obj.(*authorizationapi.SelfSubjectAccessReview)
 | |
| 	if !ok {
 | |
| 		return nil, apierrors.NewBadRequest(fmt.Sprintf("not a SelfSubjectAccessReview: %#v", obj))
 | |
| 	}
 | |
| 	if errs := authorizationvalidation.ValidateSelfSubjectAccessReview(selfSAR); len(errs) > 0 {
 | |
| 		return nil, apierrors.NewInvalid(authorizationapi.Kind(selfSAR.Kind), "", errs)
 | |
| 	}
 | |
| 	userToCheck, exists := genericapirequest.UserFrom(ctx)
 | |
| 	if !exists {
 | |
| 		return nil, apierrors.NewBadRequest("no user present on request")
 | |
| 	}
 | |
| 
 | |
| 	if createValidation != nil {
 | |
| 		if err := createValidation(ctx, obj.DeepCopyObject()); err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	var authorizationAttributes authorizer.AttributesRecord
 | |
| 	if selfSAR.Spec.ResourceAttributes != nil {
 | |
| 		authorizationAttributes = authorizationutil.ResourceAttributesFrom(userToCheck, *selfSAR.Spec.ResourceAttributes)
 | |
| 	} else {
 | |
| 		authorizationAttributes = authorizationutil.NonResourceAttributesFrom(userToCheck, *selfSAR.Spec.NonResourceAttributes)
 | |
| 	}
 | |
| 
 | |
| 	decision, reason, evaluationErr := r.authorizer.Authorize(ctx, authorizationAttributes)
 | |
| 
 | |
| 	selfSAR.Status = authorizationapi.SubjectAccessReviewStatus{
 | |
| 		Allowed: (decision == authorizer.DecisionAllow),
 | |
| 		Denied:  (decision == authorizer.DecisionDeny),
 | |
| 		Reason:  reason,
 | |
| 	}
 | |
| 	if evaluationErr != nil {
 | |
| 		selfSAR.Status.EvaluationError = evaluationErr.Error()
 | |
| 	}
 | |
| 
 | |
| 	return selfSAR, nil
 | |
| }
 |