mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-03 19:58:17 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			172 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			172 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2014 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package apiserver
 | 
						|
 | 
						|
import (
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"k8s.io/kubernetes/pkg/auth/authorizer"
 | 
						|
	"k8s.io/kubernetes/pkg/auth/authorizer/abac"
 | 
						|
	"k8s.io/kubernetes/pkg/auth/authorizer/union"
 | 
						|
	"k8s.io/kubernetes/pkg/registry/clusterrole"
 | 
						|
	"k8s.io/kubernetes/pkg/registry/clusterrolebinding"
 | 
						|
	"k8s.io/kubernetes/pkg/registry/role"
 | 
						|
	"k8s.io/kubernetes/pkg/registry/rolebinding"
 | 
						|
	"k8s.io/kubernetes/plugin/pkg/auth/authorizer/rbac"
 | 
						|
	"k8s.io/kubernetes/plugin/pkg/auth/authorizer/webhook"
 | 
						|
)
 | 
						|
 | 
						|
// Attributes implements authorizer.Attributes interface.
 | 
						|
type Attributes struct {
 | 
						|
	// TODO: add fields and methods when authorizer.Attributes is completed.
 | 
						|
}
 | 
						|
 | 
						|
// alwaysAllowAuthorizer is an implementation of authorizer.Attributes
 | 
						|
// which always says yes to an authorization request.
 | 
						|
// It is useful in tests and when using kubernetes in an open manner.
 | 
						|
type alwaysAllowAuthorizer struct{}
 | 
						|
 | 
						|
func (alwaysAllowAuthorizer) Authorize(a authorizer.Attributes) (err error) {
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func NewAlwaysAllowAuthorizer() authorizer.Authorizer {
 | 
						|
	return new(alwaysAllowAuthorizer)
 | 
						|
}
 | 
						|
 | 
						|
// alwaysDenyAuthorizer is an implementation of authorizer.Attributes
 | 
						|
// which always says no to an authorization request.
 | 
						|
// It is useful in unit tests to force an operation to be forbidden.
 | 
						|
type alwaysDenyAuthorizer struct{}
 | 
						|
 | 
						|
func (alwaysDenyAuthorizer) Authorize(a authorizer.Attributes) (err error) {
 | 
						|
	return errors.New("Everything is forbidden.")
 | 
						|
}
 | 
						|
 | 
						|
func NewAlwaysDenyAuthorizer() authorizer.Authorizer {
 | 
						|
	return new(alwaysDenyAuthorizer)
 | 
						|
}
 | 
						|
 | 
						|
const (
 | 
						|
	ModeAlwaysAllow string = "AlwaysAllow"
 | 
						|
	ModeAlwaysDeny  string = "AlwaysDeny"
 | 
						|
	ModeABAC        string = "ABAC"
 | 
						|
	ModeWebhook     string = "Webhook"
 | 
						|
	ModeRBAC        string = "RBAC"
 | 
						|
)
 | 
						|
 | 
						|
// Keep this list in sync with constant list above.
 | 
						|
var AuthorizationModeChoices = []string{ModeAlwaysAllow, ModeAlwaysDeny, ModeABAC, ModeWebhook, ModeRBAC}
 | 
						|
 | 
						|
type AuthorizationConfig struct {
 | 
						|
	// Options for ModeABAC
 | 
						|
 | 
						|
	// Path to a ABAC policy file.
 | 
						|
	PolicyFile string
 | 
						|
 | 
						|
	// Options for ModeWebhook
 | 
						|
 | 
						|
	// Kubeconfig file for Webhook authorization plugin.
 | 
						|
	WebhookConfigFile string
 | 
						|
	// TTL for caching of authorized responses from the webhook server.
 | 
						|
	WebhookCacheAuthorizedTTL time.Duration
 | 
						|
	// TTL for caching of unauthorized responses from the webhook server.
 | 
						|
	WebhookCacheUnauthorizedTTL time.Duration
 | 
						|
 | 
						|
	// Options for RBAC
 | 
						|
 | 
						|
	// User which can bootstrap role policies
 | 
						|
	RBACSuperUser string
 | 
						|
 | 
						|
	RBACClusterRoleRegistry        clusterrole.Registry
 | 
						|
	RBACClusterRoleBindingRegistry clusterrolebinding.Registry
 | 
						|
	RBACRoleRegistry               role.Registry
 | 
						|
	RBACRoleBindingRegistry        rolebinding.Registry
 | 
						|
}
 | 
						|
 | 
						|
// NewAuthorizerFromAuthorizationConfig returns the right sort of union of multiple authorizer.Authorizer objects
 | 
						|
// based on the authorizationMode or an error.  authorizationMode should be a comma separated values
 | 
						|
// of AuthorizationModeChoices.
 | 
						|
func NewAuthorizerFromAuthorizationConfig(authorizationModes []string, config AuthorizationConfig) (authorizer.Authorizer, error) {
 | 
						|
 | 
						|
	if len(authorizationModes) == 0 {
 | 
						|
		return nil, errors.New("Atleast one authorization mode should be passed")
 | 
						|
	}
 | 
						|
 | 
						|
	var authorizers []authorizer.Authorizer
 | 
						|
	authorizerMap := make(map[string]bool)
 | 
						|
 | 
						|
	for _, authorizationMode := range authorizationModes {
 | 
						|
		if authorizerMap[authorizationMode] {
 | 
						|
			return nil, fmt.Errorf("Authorization mode %s specified more than once", authorizationMode)
 | 
						|
		}
 | 
						|
		// Keep cases in sync with constant list above.
 | 
						|
		switch authorizationMode {
 | 
						|
		case ModeAlwaysAllow:
 | 
						|
			authorizers = append(authorizers, NewAlwaysAllowAuthorizer())
 | 
						|
		case ModeAlwaysDeny:
 | 
						|
			authorizers = append(authorizers, NewAlwaysDenyAuthorizer())
 | 
						|
		case ModeABAC:
 | 
						|
			if config.PolicyFile == "" {
 | 
						|
				return nil, errors.New("ABAC's authorization policy file not passed")
 | 
						|
			}
 | 
						|
			abacAuthorizer, err := abac.NewFromFile(config.PolicyFile)
 | 
						|
			if err != nil {
 | 
						|
				return nil, err
 | 
						|
			}
 | 
						|
			authorizers = append(authorizers, abacAuthorizer)
 | 
						|
		case ModeWebhook:
 | 
						|
			if config.WebhookConfigFile == "" {
 | 
						|
				return nil, errors.New("Webhook's configuration file not passed")
 | 
						|
			}
 | 
						|
			webhookAuthorizer, err := webhook.New(config.WebhookConfigFile,
 | 
						|
				config.WebhookCacheAuthorizedTTL,
 | 
						|
				config.WebhookCacheUnauthorizedTTL)
 | 
						|
			if err != nil {
 | 
						|
				return nil, err
 | 
						|
			}
 | 
						|
			authorizers = append(authorizers, webhookAuthorizer)
 | 
						|
		case ModeRBAC:
 | 
						|
			rbacAuthorizer := rbac.New(
 | 
						|
				config.RBACRoleRegistry,
 | 
						|
				config.RBACRoleBindingRegistry,
 | 
						|
				config.RBACClusterRoleRegistry,
 | 
						|
				config.RBACClusterRoleBindingRegistry,
 | 
						|
				config.RBACSuperUser,
 | 
						|
			)
 | 
						|
			authorizers = append(authorizers, rbacAuthorizer)
 | 
						|
		default:
 | 
						|
			return nil, fmt.Errorf("Unknown authorization mode %s specified", authorizationMode)
 | 
						|
		}
 | 
						|
		authorizerMap[authorizationMode] = true
 | 
						|
	}
 | 
						|
 | 
						|
	if !authorizerMap[ModeABAC] && config.PolicyFile != "" {
 | 
						|
		return nil, errors.New("Cannot specify --authorization-policy-file without mode ABAC")
 | 
						|
	}
 | 
						|
	if !authorizerMap[ModeWebhook] && config.WebhookConfigFile != "" {
 | 
						|
		return nil, errors.New("Cannot specify --authorization-webhook-config-file without mode Webhook")
 | 
						|
	}
 | 
						|
	if !authorizerMap[ModeRBAC] && config.RBACSuperUser != "" {
 | 
						|
		return nil, errors.New("Cannot specify --authorization-rbac-super-user without mode RBAC")
 | 
						|
	}
 | 
						|
 | 
						|
	return union.New(authorizers...), nil
 | 
						|
}
 |