Documentation ¶
Index ¶
- Constants
- Variables
- func NewAuthorizer(delegate kauthorizer.Authorizer, ...) authorizer.Authorizer
- func ParseClusterRoleScope(scope string) (string, string, bool, error)
- func ScopesToRules(scopes []string, namespace string, ...) ([]authorizationapi.PolicyRule, error)
- func ScopesToVisibleNamespaces(scopes []string, clusterPolicyGetter client.ClusterPolicyLister) (sets.String, error)
- func ValidateClusterRoleScopeRestrictions(scope string, restriction oauthapi.ClusterRoleScopeRestriction) error
- func ValidateLiteralScopeRestrictions(scope string, literals []string) error
- func ValidateScopeRestrictions(client *oauthapi.OAuthClient, scopes ...string) error
- type ScopeEvaluator
Constants ¶
View Source
const ( UserIndicator = "user:" ClusterRoleIndicator = "role:" )
View Source
const ( UserInfo = UserIndicator + "info" UserAccessCheck = UserIndicator + "check-access" // UserListScopedProjects gives explicit permission to see the projects that this token can see. UserListScopedProjects = UserIndicator + "list-scoped-projects" // UserListAllProjects gives explicit permission to see the projects a user can see. This is often used to prime secondary ACL systems // unrelated to openshift and to display projects for selection in a secondary UI. UserListAllProjects = UserIndicator + "list-projects" // UserFull includes all permissions of the user UserFull = UserIndicator + "full" )
Variables ¶
View Source
var ScopeEvaluators = []ScopeEvaluator{
userEvaluator{},
clusterRoleEvaluator{},
}
ScopeEvaluators map prefixes to a function that handles that prefix
Functions ¶
func NewAuthorizer ¶
func NewAuthorizer(delegate kauthorizer.Authorizer, clusterPolicyGetter client.ClusterPolicyLister, forbiddenMessageMaker defaultauthorizer.ForbiddenMessageMaker) authorizer.Authorizer
func ScopesToRules ¶
func ScopesToRules(scopes []string, namespace string, clusterPolicyGetter client.ClusterPolicyLister) ([]authorizationapi.PolicyRule, error)
ScopesToRules takes the scopes and return the rules back. We ALWAYS add the discovery rules and it is possible to get some rules and and an error since errors aren't fatal to evaluation
func ScopesToVisibleNamespaces ¶
func ScopesToVisibleNamespaces(scopes []string, clusterPolicyGetter client.ClusterPolicyLister) (sets.String, error)
ScopesToVisibleNamespaces returns a list of namespaces that the provided scopes have "get" access to. This exists only to support efficiently list/watch of projects (ACLed namespaces)
func ValidateClusterRoleScopeRestrictions ¶
func ValidateClusterRoleScopeRestrictions(scope string, restriction oauthapi.ClusterRoleScopeRestriction) error
func ValidateScopeRestrictions ¶
func ValidateScopeRestrictions(client *oauthapi.OAuthClient, scopes ...string) error
Types ¶
type ScopeEvaluator ¶
type ScopeEvaluator interface { // Handles returns true if this evaluator can evaluate this scope Handles(scope string) bool // Validate returns an error if the scope is malformed Validate(scope string) error // Describe returns a description, warning (typically used to warn about escalation dangers), or an error if the scope is malformed Describe(scope string) (description string, warning string, err error) // ResolveRules returns the policy rules that this scope allows ResolveRules(scope, namespace string, clusterPolicyGetter client.ClusterPolicyLister) ([]authorizationapi.PolicyRule, error) ResolveGettableNamespaces(scope string, clusterPolicyGetter client.ClusterPolicyLister) ([]string, error) }
ScopeEvaluator takes a scope and returns the rules that express it
Click to show internal directories.
Click to hide internal directories.