mirror of
https://github.com/ceph/ceph-csi.git
synced 2025-06-13 02:33:34 +00:00
build: move e2e dependencies into e2e/go.mod
Several packages are only used while running the e2e suite. These packages are less important to update, as the they can not influence the final executable that is part of the Ceph-CSI container-image. By moving these dependencies out of the main Ceph-CSI go.mod, it is easier to identify if a reported CVE affects Ceph-CSI, or only the testing (like most of the Kubernetes CVEs). Signed-off-by: Niels de Vos <ndevos@ibm.com>
This commit is contained in:
committed by
mergify[bot]
parent
15da101b1b
commit
bec6090996
146
e2e/vendor/k8s.io/pod-security-admission/api/attributes.go
generated
vendored
Normal file
146
e2e/vendor/k8s.io/pod-security-admission/api/attributes.go
generated
vendored
Normal file
@ -0,0 +1,146 @@
|
||||
/*
|
||||
Copyright 2021 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package api
|
||||
|
||||
import (
|
||||
admissionv1 "k8s.io/api/admission/v1"
|
||||
"k8s.io/apimachinery/pkg/runtime"
|
||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||
)
|
||||
|
||||
// Attributes exposes the admission request parameters consumed by the PodSecurity admission controller.
|
||||
type Attributes interface {
|
||||
// GetName is the name of the object associated with the request.
|
||||
GetName() string
|
||||
// GetNamespace is the namespace associated with the request (if any)
|
||||
GetNamespace() string
|
||||
// GetResource is the name of the resource being requested. This is not the kind. For example: pods
|
||||
GetResource() schema.GroupVersionResource
|
||||
// GetKind is the name of the kind being requested. For example: Pod
|
||||
GetKind() schema.GroupVersionKind
|
||||
// GetSubresource is the name of the subresource being requested. This is a different resource, scoped to the parent resource, but it may have a different kind.
|
||||
// For instance, /pods has the resource "pods" and the kind "Pod", while /pods/foo/status has the resource "pods", the sub resource "status", and the kind "Pod"
|
||||
// (because status operates on pods). The binding resource for a pod though may be /pods/foo/binding, which has resource "pods", subresource "binding", and kind "Binding".
|
||||
GetSubresource() string
|
||||
// GetOperation is the operation being performed
|
||||
GetOperation() admissionv1.Operation
|
||||
|
||||
// GetObject returns the typed Object from incoming request.
|
||||
// For objects in the core API group, the result must use the v1 API.
|
||||
GetObject() (runtime.Object, error)
|
||||
// GetOldObject returns the typed existing object. Only populated for UPDATE requests.
|
||||
// For objects in the core API group, the result must use the v1 API.
|
||||
GetOldObject() (runtime.Object, error)
|
||||
// GetUserName is the requesting user's authenticated name.
|
||||
GetUserName() string
|
||||
}
|
||||
|
||||
// AttributesRecord is a simple struct implementing the Attributes interface.
|
||||
type AttributesRecord struct {
|
||||
Name string
|
||||
Namespace string
|
||||
Kind schema.GroupVersionKind
|
||||
Resource schema.GroupVersionResource
|
||||
Subresource string
|
||||
Operation admissionv1.Operation
|
||||
Object runtime.Object
|
||||
OldObject runtime.Object
|
||||
Username string
|
||||
}
|
||||
|
||||
func (a *AttributesRecord) GetName() string {
|
||||
return a.Name
|
||||
}
|
||||
func (a *AttributesRecord) GetNamespace() string {
|
||||
return a.Namespace
|
||||
}
|
||||
func (a *AttributesRecord) GetKind() schema.GroupVersionKind {
|
||||
return a.Kind
|
||||
}
|
||||
func (a *AttributesRecord) GetResource() schema.GroupVersionResource {
|
||||
return a.Resource
|
||||
}
|
||||
func (a *AttributesRecord) GetSubresource() string {
|
||||
return a.Subresource
|
||||
}
|
||||
func (a *AttributesRecord) GetOperation() admissionv1.Operation {
|
||||
return a.Operation
|
||||
}
|
||||
func (a *AttributesRecord) GetUserName() string {
|
||||
return a.Username
|
||||
}
|
||||
func (a *AttributesRecord) GetObject() (runtime.Object, error) {
|
||||
return a.Object, nil
|
||||
}
|
||||
func (a *AttributesRecord) GetOldObject() (runtime.Object, error) {
|
||||
return a.OldObject, nil
|
||||
}
|
||||
|
||||
var _ Attributes = &AttributesRecord{}
|
||||
|
||||
// RequestAttributes adapts an admission.Request to the Attributes interface.
|
||||
func RequestAttributes(request *admissionv1.AdmissionRequest, decoder runtime.Decoder) Attributes {
|
||||
return &attributes{
|
||||
r: request,
|
||||
decoder: decoder,
|
||||
}
|
||||
}
|
||||
|
||||
// attributes is an interface used by AdmissionController to get information about a request
|
||||
// that is used to make an admission decision.
|
||||
type attributes struct {
|
||||
r *admissionv1.AdmissionRequest
|
||||
decoder runtime.Decoder
|
||||
}
|
||||
|
||||
func (a *attributes) GetName() string {
|
||||
return a.r.Name
|
||||
}
|
||||
func (a *attributes) GetNamespace() string {
|
||||
return a.r.Namespace
|
||||
}
|
||||
func (a *attributes) GetKind() schema.GroupVersionKind {
|
||||
return schema.GroupVersionKind(a.r.Kind)
|
||||
}
|
||||
func (a *attributes) GetResource() schema.GroupVersionResource {
|
||||
return schema.GroupVersionResource(a.r.Resource)
|
||||
}
|
||||
func (a *attributes) GetSubresource() string {
|
||||
return a.r.RequestSubResource
|
||||
}
|
||||
func (a *attributes) GetOperation() admissionv1.Operation {
|
||||
return a.r.Operation
|
||||
}
|
||||
func (a *attributes) GetUserName() string {
|
||||
return a.r.UserInfo.Username
|
||||
}
|
||||
func (a *attributes) GetObject() (runtime.Object, error) {
|
||||
return a.decode(a.r.Object)
|
||||
}
|
||||
func (a *attributes) GetOldObject() (runtime.Object, error) {
|
||||
return a.decode(a.r.OldObject)
|
||||
}
|
||||
func (a *attributes) decode(in runtime.RawExtension) (runtime.Object, error) {
|
||||
if in.Raw == nil {
|
||||
return nil, nil
|
||||
}
|
||||
gvk := schema.GroupVersionKind(a.r.Kind)
|
||||
out, _, err := a.decoder.Decode(in.Raw, &gvk, nil)
|
||||
return out, err
|
||||
}
|
||||
|
||||
var _ Attributes = &attributes{}
|
50
e2e/vendor/k8s.io/pod-security-admission/api/constants.go
generated
vendored
Normal file
50
e2e/vendor/k8s.io/pod-security-admission/api/constants.go
generated
vendored
Normal file
@ -0,0 +1,50 @@
|
||||
/*
|
||||
Copyright 2021 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package api
|
||||
|
||||
type Level string
|
||||
|
||||
const (
|
||||
LevelPrivileged Level = "privileged"
|
||||
LevelBaseline Level = "baseline"
|
||||
LevelRestricted Level = "restricted"
|
||||
)
|
||||
|
||||
var validLevels = []string{
|
||||
string(LevelPrivileged),
|
||||
string(LevelBaseline),
|
||||
string(LevelRestricted),
|
||||
}
|
||||
|
||||
const VersionLatest = "latest"
|
||||
|
||||
const AuditAnnotationPrefix = labelPrefix
|
||||
|
||||
const (
|
||||
labelPrefix = "pod-security.kubernetes.io/"
|
||||
|
||||
EnforceLevelLabel = labelPrefix + "enforce"
|
||||
EnforceVersionLabel = labelPrefix + "enforce-version"
|
||||
AuditLevelLabel = labelPrefix + "audit"
|
||||
AuditVersionLabel = labelPrefix + "audit-version"
|
||||
WarnLevelLabel = labelPrefix + "warn"
|
||||
WarnVersionLabel = labelPrefix + "warn-version"
|
||||
|
||||
ExemptionReasonAnnotationKey = "exempt"
|
||||
AuditViolationsAnnotationKey = "audit-violations"
|
||||
EnforcedPolicyAnnotationKey = "enforce-policy"
|
||||
)
|
18
e2e/vendor/k8s.io/pod-security-admission/api/doc.go
generated
vendored
Normal file
18
e2e/vendor/k8s.io/pod-security-admission/api/doc.go
generated
vendored
Normal file
@ -0,0 +1,18 @@
|
||||
/*
|
||||
Copyright 2021 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
// Package api contains constants and helpers for PodSecurity admission label keys and values
|
||||
package api // import "k8s.io/pod-security-admission/api"
|
269
e2e/vendor/k8s.io/pod-security-admission/api/helpers.go
generated
vendored
Normal file
269
e2e/vendor/k8s.io/pod-security-admission/api/helpers.go
generated
vendored
Normal file
@ -0,0 +1,269 @@
|
||||
/*
|
||||
Copyright 2021 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package api
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"regexp"
|
||||
"strconv"
|
||||
"strings"
|
||||
"unicode"
|
||||
|
||||
"k8s.io/apimachinery/pkg/util/validation/field"
|
||||
"k8s.io/component-base/version"
|
||||
)
|
||||
|
||||
type Version struct {
|
||||
major int
|
||||
minor int
|
||||
latest bool
|
||||
}
|
||||
|
||||
func (v Version) String() string {
|
||||
if v.latest {
|
||||
return "latest"
|
||||
}
|
||||
return fmt.Sprintf("v%d.%d", v.major, v.minor)
|
||||
}
|
||||
|
||||
// Older returns true if this version v is older than the other.
|
||||
func (v *Version) Older(other Version) bool {
|
||||
if v.latest { // Latest is always consider newer, even than future versions.
|
||||
return false
|
||||
}
|
||||
if other.latest {
|
||||
return true
|
||||
}
|
||||
if v.major != other.major {
|
||||
return v.major < other.major
|
||||
}
|
||||
return v.minor < other.minor
|
||||
}
|
||||
|
||||
func (v *Version) Major() int {
|
||||
return v.major
|
||||
}
|
||||
func (v *Version) Minor() int {
|
||||
return v.minor
|
||||
}
|
||||
func (v *Version) Latest() bool {
|
||||
return v.latest
|
||||
}
|
||||
|
||||
func MajorMinorVersion(major, minor int) Version {
|
||||
return Version{major: major, minor: minor}
|
||||
}
|
||||
|
||||
// GetAPIVersion get the version of apiServer and return the version major and minor
|
||||
func GetAPIVersion() Version {
|
||||
var err error
|
||||
v := Version{}
|
||||
apiVersion := version.Get()
|
||||
major, err := strconv.Atoi(apiVersion.Major)
|
||||
if err != nil {
|
||||
return v
|
||||
}
|
||||
// split the "normal" + and - for semver stuff to get the leading minor number
|
||||
minorString := strings.FieldsFunc(apiVersion.Minor, func(r rune) bool {
|
||||
return !unicode.IsDigit(r)
|
||||
})[0]
|
||||
minor, err := strconv.Atoi(minorString)
|
||||
if err != nil {
|
||||
return v
|
||||
}
|
||||
v = MajorMinorVersion(major, minor)
|
||||
return v
|
||||
}
|
||||
|
||||
func LatestVersion() Version {
|
||||
return Version{latest: true}
|
||||
}
|
||||
|
||||
// ParseLevel returns the level that should be evaluated.
|
||||
// level must be "privileged", "baseline", or "restricted".
|
||||
// if level does not match one of those strings, "restricted" and an error is returned.
|
||||
func ParseLevel(level string) (Level, error) {
|
||||
switch Level(level) {
|
||||
case LevelPrivileged, LevelBaseline, LevelRestricted:
|
||||
return Level(level), nil
|
||||
default:
|
||||
return LevelRestricted, fmt.Errorf(`must be one of %s`, strings.Join(validLevels, ", "))
|
||||
}
|
||||
}
|
||||
|
||||
// Valid checks whether the level l is a valid level.
|
||||
func (l *Level) Valid() bool {
|
||||
switch *l {
|
||||
case LevelPrivileged, LevelBaseline, LevelRestricted:
|
||||
return true
|
||||
default:
|
||||
return false
|
||||
}
|
||||
}
|
||||
|
||||
var versionRegexp = regexp.MustCompile(`^v1\.([0-9]|[1-9][0-9]*)$`)
|
||||
|
||||
// ParseVersion returns the policy version that should be evaluated.
|
||||
// version must be "latest" or "v1.x".
|
||||
// If version does not match one of those patterns, the latest version and an error is returned.
|
||||
func ParseVersion(version string) (Version, error) {
|
||||
if version == "latest" {
|
||||
return Version{latest: true}, nil
|
||||
}
|
||||
match := versionRegexp.FindStringSubmatch(version)
|
||||
if len(match) != 2 {
|
||||
return Version{latest: true}, fmt.Errorf(`must be "latest" or "v1.x"`)
|
||||
}
|
||||
versionNumber, err := strconv.Atoi(match[1])
|
||||
if err != nil || versionNumber < 0 {
|
||||
return Version{latest: true}, fmt.Errorf(`must be "latest" or "v1.x"`)
|
||||
}
|
||||
return Version{major: 1, minor: versionNumber}, nil
|
||||
}
|
||||
|
||||
type LevelVersion struct {
|
||||
Level
|
||||
Version
|
||||
}
|
||||
|
||||
func (lv LevelVersion) String() string {
|
||||
return fmt.Sprintf("%s:%s", lv.Level, lv.Version)
|
||||
}
|
||||
|
||||
// Equivalent determines whether two LevelVersions are functionally equivalent. LevelVersions are
|
||||
// considered equivalent if both are privileged, or both levels & versions are equal.
|
||||
func (lv *LevelVersion) Equivalent(other *LevelVersion) bool {
|
||||
return (lv.Level == LevelPrivileged && other.Level == LevelPrivileged) ||
|
||||
(lv.Level == other.Level && lv.Version == other.Version)
|
||||
}
|
||||
|
||||
type Policy struct {
|
||||
Enforce LevelVersion
|
||||
Audit LevelVersion
|
||||
Warn LevelVersion
|
||||
}
|
||||
|
||||
func (p *Policy) String() string {
|
||||
return fmt.Sprintf("enforce=%#v, audit=%#v, warn=%#v", p.Enforce, p.Audit, p.Warn)
|
||||
}
|
||||
|
||||
// Equivalent determines whether two policies are functionally equivalent. Policies are considered
|
||||
// equivalent if all 3 modes are considered equivalent.
|
||||
func (p *Policy) Equivalent(other *Policy) bool {
|
||||
return p.Enforce.Equivalent(&other.Enforce) && p.Audit.Equivalent(&other.Audit) && p.Warn.Equivalent(&other.Warn)
|
||||
}
|
||||
|
||||
// FullyPrivileged returns true if all 3 policy modes are privileged.
|
||||
func (p *Policy) FullyPrivileged() bool {
|
||||
return p.Enforce.Level == LevelPrivileged &&
|
||||
p.Audit.Level == LevelPrivileged &&
|
||||
p.Warn.Level == LevelPrivileged
|
||||
}
|
||||
|
||||
// PolicyToEvaluate resolves the PodSecurity namespace labels to the policy for that namespace,
|
||||
// falling back to the provided defaults when a label is unspecified. A valid policy is always
|
||||
// returned, even when an error is returned. If labels cannot be parsed correctly, the values of
|
||||
// "restricted" and "latest" are used for level and version respectively.
|
||||
func PolicyToEvaluate(labels map[string]string, defaults Policy) (Policy, field.ErrorList) {
|
||||
var (
|
||||
err error
|
||||
errs field.ErrorList
|
||||
|
||||
p = defaults
|
||||
|
||||
hasEnforceLevel bool
|
||||
hasWarnLevel, hasWarnVersion bool
|
||||
)
|
||||
if len(labels) == 0 {
|
||||
return p, nil
|
||||
}
|
||||
if level, ok := labels[EnforceLevelLabel]; ok {
|
||||
p.Enforce.Level, err = ParseLevel(level)
|
||||
hasEnforceLevel = (err == nil) // Don't default warn in case of error
|
||||
errs = appendErr(errs, err, EnforceLevelLabel, level)
|
||||
}
|
||||
if version, ok := labels[EnforceVersionLabel]; ok {
|
||||
p.Enforce.Version, err = ParseVersion(version)
|
||||
errs = appendErr(errs, err, EnforceVersionLabel, version)
|
||||
}
|
||||
if level, ok := labels[AuditLevelLabel]; ok {
|
||||
p.Audit.Level, err = ParseLevel(level)
|
||||
errs = appendErr(errs, err, AuditLevelLabel, level)
|
||||
if err != nil {
|
||||
p.Audit.Level = LevelPrivileged // Fail open for audit.
|
||||
}
|
||||
}
|
||||
if version, ok := labels[AuditVersionLabel]; ok {
|
||||
p.Audit.Version, err = ParseVersion(version)
|
||||
errs = appendErr(errs, err, AuditVersionLabel, version)
|
||||
}
|
||||
if level, ok := labels[WarnLevelLabel]; ok {
|
||||
hasWarnLevel = true
|
||||
p.Warn.Level, err = ParseLevel(level)
|
||||
errs = appendErr(errs, err, WarnLevelLabel, level)
|
||||
if err != nil {
|
||||
p.Warn.Level = LevelPrivileged // Fail open for warn.
|
||||
}
|
||||
}
|
||||
if version, ok := labels[WarnVersionLabel]; ok {
|
||||
hasWarnVersion = true
|
||||
p.Warn.Version, err = ParseVersion(version)
|
||||
errs = appendErr(errs, err, WarnVersionLabel, version)
|
||||
}
|
||||
|
||||
// Default warn to the enforce level when explicitly set to a more restrictive level.
|
||||
if !hasWarnLevel && hasEnforceLevel && CompareLevels(p.Enforce.Level, p.Warn.Level) > 0 {
|
||||
p.Warn.Level = p.Enforce.Level
|
||||
if !hasWarnVersion {
|
||||
p.Warn.Version = p.Enforce.Version
|
||||
}
|
||||
}
|
||||
|
||||
return p, errs
|
||||
}
|
||||
|
||||
// CompareLevels returns an integer comparing two levels by strictness. The result will be 0 if
|
||||
// a==b, -1 if a is less strict than b, and +1 if a is more strict than b.
|
||||
func CompareLevels(a, b Level) int {
|
||||
if a == b {
|
||||
return 0
|
||||
}
|
||||
switch a {
|
||||
case LevelPrivileged:
|
||||
return -1
|
||||
case LevelRestricted:
|
||||
return 1
|
||||
default:
|
||||
if b == LevelPrivileged {
|
||||
return 1
|
||||
} else if b == LevelRestricted {
|
||||
return -1
|
||||
}
|
||||
}
|
||||
// This should only happen if both a & b are invalid levels.
|
||||
return 0
|
||||
}
|
||||
|
||||
var labelsPath = field.NewPath("metadata", "labels")
|
||||
|
||||
// appendErr is a helper function to collect label-specific errors.
|
||||
func appendErr(errs field.ErrorList, err error, label, value string) field.ErrorList {
|
||||
if err != nil {
|
||||
return append(errs, field.Invalid(labelsPath.Key(label), value, err.Error()))
|
||||
}
|
||||
return errs
|
||||
}
|
Reference in New Issue
Block a user