Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Correctly handle legacy ungroupified PSP review resources #19542

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 9 additions & 3 deletions pkg/api/legacygroupification/groupification.go
Original file line number Diff line number Diff line change
Expand Up @@ -106,7 +106,10 @@ func OAPIToGroupified(uncast runtime.Object, gvk *schema.GroupVersionKind) {
case *route.Route, *routev1.Route, *route.RouteList, *routev1.RouteList:
gvk.Group = route.GroupName

case *security.SecurityContextConstraints, *securityv1.SecurityContextConstraints, *security.SecurityContextConstraintsList, *securityv1.SecurityContextConstraintsList:
case *security.SecurityContextConstraints, *securityv1.SecurityContextConstraints, *security.SecurityContextConstraintsList, *securityv1.SecurityContextConstraintsList,
*security.PodSecurityPolicySubjectReview, *securityv1.PodSecurityPolicySubjectReview,
*security.PodSecurityPolicySelfSubjectReview, *securityv1.PodSecurityPolicySelfSubjectReview,
*security.PodSecurityPolicyReview, *securityv1.PodSecurityPolicyReview:
gvk.Group = security.GroupName

case *template.Template, *templatev1.Template, *template.TemplateList, *templatev1.TemplateList:
Expand Down Expand Up @@ -150,8 +153,11 @@ var oapiKindsToGroup = map[string]string{
"ProjectRequest": "project.openshift.io",
"ClusterResourceQuota": "quota.openshift.io", "ClusterResourceQuotaList": "quota.openshift.io",
"Route": "route.openshift.io", "RouteList": "route.openshift.io",
"SecurityContextConstraint": "security.openshift.io", "SecurityContextConstraintList": "security.openshift.io",
"Template": "template.openshift.io", "TemplateList": "template.openshift.io",
"SecurityContextConstraints": "security.openshift.io", "SecurityContextConstraintsList": "security.openshift.io",
"PodSecurityPolicySubjectReview": "security.openshift.io",
"PodSecurityPolicySelfSubjectReview": "security.openshift.io",
"PodSecurityPolicyReview": "security.openshift.io",
"Template": "template.openshift.io", "TemplateList": "template.openshift.io",
"Group": "user.openshift.io", "GroupList": "user.openshift.io",
"Identity": "user.openshift.io", "IdentityList": "user.openshift.io",
"UserIdentityMapping": "user.openshift.io",
Expand Down
2 changes: 2 additions & 0 deletions test/cmd/policy.sh
Original file line number Diff line number Diff line change
Expand Up @@ -207,6 +207,8 @@ os::cmd::expect_success_and_text 'oc policy scc-subject-review -f ${OS_ROOT}/tes
# Since SCCs are now authorized via RBAC, and system:admin can perform all RBAC actions == system:admin can access all SCCs now
# Thus the following command now results in the use of the hostnetwork SCC which is the most restrictive SCC that still allows the pod to run
os::cmd::expect_success_and_text 'oc policy scc-subject-review -f ${OS_ROOT}/test/testdata/nginx_pod.yaml -o=jsonpath={.status.AllowedBy.name}' 'hostnetwork'
# Make sure that the legacy ungroupified objects continue to work by directly doing a create
os::cmd::expect_success_and_text 'oc create -f ${OS_ROOT}/test/testdata/legacy_ungroupified_psp_review.yaml -o=jsonpath={.status.allowedBy.name}' 'restricted'
os::cmd::expect_success "oc login -u bob -p bobpassword"
os::cmd::expect_success_and_text 'oc whoami' 'bob'
os::cmd::expect_success 'oc new-project policy-second'
Expand Down
30 changes: 30 additions & 0 deletions test/testdata/legacy_ungroupified_psp_review.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
kind: PodSecurityPolicySubjectReview
apiVersion: v1 # Must have the empty string group
spec:
template:
spec:
containers:
- name: hello-openshift
image: hello-openshift
ports:
- containerPort: 8080
protocol: TCP
resources: {}
volumeMounts:
- name: tmp
mountPath: "/tmp"
terminationMessagePath: "/dev/termination-log"
terminationMessagePolicy: FallbackToLogsOnError
imagePullPolicy: IfNotPresent
securityContext:
capabilities: {}
privileged: false
volumes:
- name: tmp
emptyDir: {}
restartPolicy: Always
dnsPolicy: ClusterFirst
serviceAccountName: default
user: user1
groups:
- system:authenticated

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.