mirror of
https://github.com/ceph/ceph-csi.git
synced 2025-03-09 17:09:29 +00:00
Several packages are only used while running the e2e suite. These packages are less important to update, as the they can not influence the final executable that is part of the Ceph-CSI container-image. By moving these dependencies out of the main Ceph-CSI go.mod, it is easier to identify if a reported CVE affects Ceph-CSI, or only the testing (like most of the Kubernetes CVEs). Signed-off-by: Niels de Vos <ndevos@ibm.com>
212 lines
6.2 KiB
Go
212 lines
6.2 KiB
Go
/*
|
|
Copyright 2014 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package admission
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
"sync"
|
|
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
"k8s.io/apimachinery/pkg/util/validation"
|
|
auditinternal "k8s.io/apiserver/pkg/apis/audit"
|
|
"k8s.io/apiserver/pkg/authentication/user"
|
|
)
|
|
|
|
type attributesRecord struct {
|
|
kind schema.GroupVersionKind
|
|
namespace string
|
|
name string
|
|
resource schema.GroupVersionResource
|
|
subresource string
|
|
operation Operation
|
|
options runtime.Object
|
|
dryRun bool
|
|
object runtime.Object
|
|
oldObject runtime.Object
|
|
userInfo user.Info
|
|
|
|
// other elements are always accessed in single goroutine.
|
|
// But ValidatingAdmissionWebhook add annotations concurrently.
|
|
annotations map[string]annotation
|
|
annotationsLock sync.RWMutex
|
|
|
|
reinvocationContext ReinvocationContext
|
|
}
|
|
|
|
type annotation struct {
|
|
level auditinternal.Level
|
|
value string
|
|
}
|
|
|
|
func NewAttributesRecord(object runtime.Object, oldObject runtime.Object, kind schema.GroupVersionKind, namespace, name string, resource schema.GroupVersionResource, subresource string, operation Operation, operationOptions runtime.Object, dryRun bool, userInfo user.Info) Attributes {
|
|
return &attributesRecord{
|
|
kind: kind,
|
|
namespace: namespace,
|
|
name: name,
|
|
resource: resource,
|
|
subresource: subresource,
|
|
operation: operation,
|
|
options: operationOptions,
|
|
dryRun: dryRun,
|
|
object: object,
|
|
oldObject: oldObject,
|
|
userInfo: userInfo,
|
|
reinvocationContext: &reinvocationContext{},
|
|
}
|
|
}
|
|
|
|
func (record *attributesRecord) GetKind() schema.GroupVersionKind {
|
|
return record.kind
|
|
}
|
|
|
|
func (record *attributesRecord) GetNamespace() string {
|
|
return record.namespace
|
|
}
|
|
|
|
func (record *attributesRecord) GetName() string {
|
|
return record.name
|
|
}
|
|
|
|
func (record *attributesRecord) GetResource() schema.GroupVersionResource {
|
|
return record.resource
|
|
}
|
|
|
|
func (record *attributesRecord) GetSubresource() string {
|
|
return record.subresource
|
|
}
|
|
|
|
func (record *attributesRecord) GetOperation() Operation {
|
|
return record.operation
|
|
}
|
|
|
|
func (record *attributesRecord) GetOperationOptions() runtime.Object {
|
|
return record.options
|
|
}
|
|
|
|
func (record *attributesRecord) IsDryRun() bool {
|
|
return record.dryRun
|
|
}
|
|
|
|
func (record *attributesRecord) GetObject() runtime.Object {
|
|
return record.object
|
|
}
|
|
|
|
func (record *attributesRecord) GetOldObject() runtime.Object {
|
|
return record.oldObject
|
|
}
|
|
|
|
func (record *attributesRecord) GetUserInfo() user.Info {
|
|
return record.userInfo
|
|
}
|
|
|
|
// getAnnotations implements privateAnnotationsGetter.It's a private method used
|
|
// by WithAudit decorator.
|
|
func (record *attributesRecord) getAnnotations(maxLevel auditinternal.Level) map[string]string {
|
|
record.annotationsLock.RLock()
|
|
defer record.annotationsLock.RUnlock()
|
|
|
|
if record.annotations == nil {
|
|
return nil
|
|
}
|
|
cp := make(map[string]string, len(record.annotations))
|
|
for key, value := range record.annotations {
|
|
if value.level.Less(maxLevel) || value.level == maxLevel {
|
|
cp[key] = value.value
|
|
}
|
|
}
|
|
return cp
|
|
}
|
|
|
|
// AddAnnotation adds an annotation to attributesRecord with Metadata audit level
|
|
func (record *attributesRecord) AddAnnotation(key, value string) error {
|
|
return record.AddAnnotationWithLevel(key, value, auditinternal.LevelMetadata)
|
|
}
|
|
|
|
func (record *attributesRecord) AddAnnotationWithLevel(key, value string, level auditinternal.Level) error {
|
|
if err := checkKeyFormat(key); err != nil {
|
|
return err
|
|
}
|
|
if level.Less(auditinternal.LevelMetadata) {
|
|
return fmt.Errorf("admission annotations are not allowed to be set at audit level lower than Metadata, key: %q, level: %s", key, level)
|
|
}
|
|
record.annotationsLock.Lock()
|
|
defer record.annotationsLock.Unlock()
|
|
|
|
if record.annotations == nil {
|
|
record.annotations = make(map[string]annotation)
|
|
}
|
|
annotation := annotation{level: level, value: value}
|
|
if v, ok := record.annotations[key]; ok && v != annotation {
|
|
return fmt.Errorf("admission annotations are not allowd to be overwritten, key:%q, old value: %v, new value: %v", key, record.annotations[key], annotation)
|
|
}
|
|
record.annotations[key] = annotation
|
|
return nil
|
|
}
|
|
|
|
func (record *attributesRecord) GetReinvocationContext() ReinvocationContext {
|
|
return record.reinvocationContext
|
|
}
|
|
|
|
type reinvocationContext struct {
|
|
// isReinvoke is true when admission plugins are being reinvoked
|
|
isReinvoke bool
|
|
// reinvokeRequested is true when an admission plugin requested a re-invocation of the chain
|
|
reinvokeRequested bool
|
|
// values stores reinvoke context values per plugin.
|
|
values map[string]interface{}
|
|
}
|
|
|
|
func (rc *reinvocationContext) IsReinvoke() bool {
|
|
return rc.isReinvoke
|
|
}
|
|
|
|
func (rc *reinvocationContext) SetIsReinvoke() {
|
|
rc.isReinvoke = true
|
|
}
|
|
|
|
func (rc *reinvocationContext) ShouldReinvoke() bool {
|
|
return rc.reinvokeRequested
|
|
}
|
|
|
|
func (rc *reinvocationContext) SetShouldReinvoke() {
|
|
rc.reinvokeRequested = true
|
|
}
|
|
|
|
func (rc *reinvocationContext) SetValue(plugin string, v interface{}) {
|
|
if rc.values == nil {
|
|
rc.values = map[string]interface{}{}
|
|
}
|
|
rc.values[plugin] = v
|
|
}
|
|
|
|
func (rc *reinvocationContext) Value(plugin string) interface{} {
|
|
return rc.values[plugin]
|
|
}
|
|
|
|
func checkKeyFormat(key string) error {
|
|
parts := strings.Split(key, "/")
|
|
if len(parts) != 2 {
|
|
return fmt.Errorf("annotation key has invalid format, the right format is a DNS subdomain prefix and '/' and key name. (e.g. 'podsecuritypolicy.admission.k8s.io/admit-policy')")
|
|
}
|
|
if msgs := validation.IsQualifiedName(key); len(msgs) != 0 {
|
|
return fmt.Errorf("annotation key has invalid format %s. A qualified name like 'podsecuritypolicy.admission.k8s.io/admit-policy' is required.", strings.Join(msgs, ","))
|
|
}
|
|
return nil
|
|
}
|