Skip to content

Commit bee82d4

Browse files
author
OpenShift Bot
committed
Merge pull request #5760 from deads2k/5737
Merged by openshift-bot
2 parents a001f36 + 16d6c23 commit bee82d4

File tree

2 files changed

+51
-5
lines changed

2 files changed

+51
-5
lines changed

pkg/cmd/server/origin/master_config.go

+6-5
Original file line numberDiff line numberDiff line change
@@ -187,16 +187,18 @@ func BuildMasterConfig(options configapi.MasterConfig) (*MasterConfig, error) {
187187

188188
plug, plugStart := newControllerPlug(options, client)
189189

190+
authorizer := newAuthorizer(policyClient, options.ProjectConfig.ProjectRequestMessage)
191+
190192
config := &MasterConfig{
191193
Options: options,
192194

193195
Authenticator: newAuthenticator(options, etcdHelper, serviceAccountTokenGetter, apiClientCAs, groupCache),
194-
Authorizer: newAuthorizer(policyClient, options.ProjectConfig.ProjectRequestMessage),
196+
Authorizer: authorizer,
195197
AuthorizationAttributeBuilder: newAuthorizationAttributeBuilder(requestContextMapper),
196198

197199
PolicyCache: policyCache,
198200
GroupCache: groupCache,
199-
ProjectAuthorizationCache: newProjectAuthorizationCache(privilegedLoopbackOpenShiftClient, privilegedLoopbackKubeClient, policyClient),
201+
ProjectAuthorizationCache: newProjectAuthorizationCache(authorizer, privilegedLoopbackKubeClient, policyClient),
200202

201203
RequestContextMapper: requestContextMapper,
202204

@@ -320,10 +322,9 @@ func newAuthenticator(config configapi.MasterConfig, etcdHelper storage.Interfac
320322
return ret
321323
}
322324

323-
func newProjectAuthorizationCache(openshiftClient *osclient.Client, kubeClient *kclient.Client,
324-
policyClient policyclient.ReadOnlyPolicyClient) *projectauth.AuthorizationCache {
325+
func newProjectAuthorizationCache(authorizer authorizer.Authorizer, kubeClient *kclient.Client, policyClient policyclient.ReadOnlyPolicyClient) *projectauth.AuthorizationCache {
325326
return projectauth.NewAuthorizationCache(
326-
projectauth.NewReviewer(openshiftClient),
327+
projectauth.NewAuthorizerReviewer(authorizer),
327328
kubeClient.Namespaces(),
328329
policyClient,
329330
)

pkg/project/auth/reviewer.go

+45
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,10 @@
11
package auth
22

33
import (
4+
kapi "k8s.io/kubernetes/pkg/api"
5+
46
authorizationapi "github.com/openshift/origin/pkg/authorization/api"
7+
"github.com/openshift/origin/pkg/authorization/authorizer"
58
"github.com/openshift/origin/pkg/client"
69
)
710

@@ -11,6 +14,20 @@ type Review interface {
1114
Groups() []string
1215
}
1316

17+
type defaultReview struct {
18+
users []string
19+
groups []string
20+
}
21+
22+
func (r *defaultReview) Users() []string {
23+
return r.users
24+
}
25+
26+
// Groups returns the groups that can access a resource
27+
func (r *defaultReview) Groups() []string {
28+
return r.groups
29+
}
30+
1431
type review struct {
1532
response *authorizationapi.ResourceAccessReviewResponse
1633
}
@@ -62,3 +79,31 @@ func (r *reviewer) Review(name string) (Review, error) {
6279
}
6380
return review, nil
6481
}
82+
83+
type authorizerReviewer struct {
84+
policyChecker authorizer.Authorizer
85+
}
86+
87+
func NewAuthorizerReviewer(policyChecker authorizer.Authorizer) Reviewer {
88+
return &authorizerReviewer{policyChecker: policyChecker}
89+
}
90+
91+
func (r *authorizerReviewer) Review(namespaceName string) (Review, error) {
92+
attributes := authorizer.DefaultAuthorizationAttributes{
93+
Verb: "get",
94+
Resource: "namespaces",
95+
ResourceName: namespaceName,
96+
}
97+
98+
ctx := kapi.WithNamespace(kapi.NewContext(), namespaceName)
99+
users, groups, err := r.policyChecker.GetAllowedSubjects(ctx, attributes)
100+
if err != nil {
101+
return nil, err
102+
}
103+
104+
review := &defaultReview{
105+
users: users.List(),
106+
groups: groups.List(),
107+
}
108+
return review, nil
109+
}

0 commit comments

Comments
 (0)