-
Notifications
You must be signed in to change notification settings - Fork 40k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #24902 from cjcullen/webhookAuthn
Automatic merge from submit-queue Webhook Token Authenticator Add a webhook token authenticator plugin to allow a remote service to make authentication decisions.
- Loading branch information
Showing
27 changed files
with
4,304 additions
and
93 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,91 @@ | ||
// +build !ignore_autogenerated | ||
|
||
/* | ||
Copyright 2016 The Kubernetes Authors All rights reserved. | ||
Licensed under the Apache License, Version 2.0 (the "License"); | ||
you may not use this file except in compliance with the License. | ||
You may obtain a copy of the License at | ||
http://www.apache.org/licenses/LICENSE-2.0 | ||
Unless required by applicable law or agreed to in writing, software | ||
distributed under the License is distributed on an "AS IS" BASIS, | ||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
See the License for the specific language governing permissions and | ||
limitations under the License. | ||
*/ | ||
|
||
// This file was autogenerated by deepcopy-gen. Do not edit it manually! | ||
|
||
package authentication | ||
|
||
import ( | ||
api "k8s.io/kubernetes/pkg/api" | ||
unversioned "k8s.io/kubernetes/pkg/api/unversioned" | ||
conversion "k8s.io/kubernetes/pkg/conversion" | ||
) | ||
|
||
func init() { | ||
if err := api.Scheme.AddGeneratedDeepCopyFuncs( | ||
DeepCopy_authenticationk8sio_TokenReview, | ||
DeepCopy_authenticationk8sio_TokenReviewSpec, | ||
DeepCopy_authenticationk8sio_TokenReviewStatus, | ||
DeepCopy_authenticationk8sio_UserInfo, | ||
); err != nil { | ||
// if one of the deep copy functions is malformed, detect it immediately. | ||
panic(err) | ||
} | ||
} | ||
|
||
func DeepCopy_authenticationk8sio_TokenReview(in TokenReview, out *TokenReview, c *conversion.Cloner) error { | ||
if err := unversioned.DeepCopy_unversioned_TypeMeta(in.TypeMeta, &out.TypeMeta, c); err != nil { | ||
return err | ||
} | ||
if err := DeepCopy_authenticationk8sio_TokenReviewSpec(in.Spec, &out.Spec, c); err != nil { | ||
return err | ||
} | ||
if err := DeepCopy_authenticationk8sio_TokenReviewStatus(in.Status, &out.Status, c); err != nil { | ||
return err | ||
} | ||
return nil | ||
} | ||
|
||
func DeepCopy_authenticationk8sio_TokenReviewSpec(in TokenReviewSpec, out *TokenReviewSpec, c *conversion.Cloner) error { | ||
out.Token = in.Token | ||
return nil | ||
} | ||
|
||
func DeepCopy_authenticationk8sio_TokenReviewStatus(in TokenReviewStatus, out *TokenReviewStatus, c *conversion.Cloner) error { | ||
out.Authenticated = in.Authenticated | ||
if err := DeepCopy_authenticationk8sio_UserInfo(in.User, &out.User, c); err != nil { | ||
return err | ||
} | ||
return nil | ||
} | ||
|
||
func DeepCopy_authenticationk8sio_UserInfo(in UserInfo, out *UserInfo, c *conversion.Cloner) error { | ||
out.Username = in.Username | ||
out.UID = in.UID | ||
if in.Groups != nil { | ||
in, out := in.Groups, &out.Groups | ||
*out = make([]string, len(in)) | ||
copy(*out, in) | ||
} else { | ||
out.Groups = nil | ||
} | ||
if in.Extra != nil { | ||
in, out := in.Extra, &out.Extra | ||
*out = make(map[string][]string) | ||
for key, val := range in { | ||
if newVal, err := c.DeepCopy(val); err != nil { | ||
return err | ||
} else { | ||
(*out)[key] = newVal.([]string) | ||
} | ||
} | ||
} else { | ||
out.Extra = nil | ||
} | ||
return nil | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,123 @@ | ||
/* | ||
Copyright 2016 The Kubernetes Authors All rights reserved. | ||
Licensed under the Apache License, Version 2.0 (the "License"); | ||
you may not use this file except in compliance with the License. | ||
You may obtain a copy of the License at | ||
http://www.apache.org/licenses/LICENSE-2.0 | ||
Unless required by applicable law or agreed to in writing, software | ||
distributed under the License is distributed on an "AS IS" BASIS, | ||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
See the License for the specific language governing permissions and | ||
limitations under the License. | ||
*/ | ||
|
||
// Package install installs the experimental API group, making it available as | ||
// an option to all of the API encoding/decoding machinery. | ||
package install | ||
|
||
import ( | ||
"fmt" | ||
|
||
"github.com/golang/glog" | ||
|
||
"k8s.io/kubernetes/pkg/api" | ||
"k8s.io/kubernetes/pkg/api/meta" | ||
"k8s.io/kubernetes/pkg/api/unversioned" | ||
"k8s.io/kubernetes/pkg/apimachinery" | ||
"k8s.io/kubernetes/pkg/apimachinery/registered" | ||
"k8s.io/kubernetes/pkg/apis/authentication.k8s.io" | ||
"k8s.io/kubernetes/pkg/apis/authentication.k8s.io/v1beta1" | ||
"k8s.io/kubernetes/pkg/runtime" | ||
"k8s.io/kubernetes/pkg/util/sets" | ||
) | ||
|
||
const importPrefix = "k8s.io/kubernetes/pkg/apis/authentication.k8s.io" | ||
|
||
var accessor = meta.NewAccessor() | ||
|
||
// availableVersions lists all known external versions for this group from most preferred to least preferred | ||
var availableVersions = []unversioned.GroupVersion{v1beta1.SchemeGroupVersion} | ||
|
||
func init() { | ||
registered.RegisterVersions(availableVersions) | ||
externalVersions := []unversioned.GroupVersion{} | ||
for _, v := range availableVersions { | ||
if registered.IsAllowedVersion(v) { | ||
externalVersions = append(externalVersions, v) | ||
} | ||
} | ||
if len(externalVersions) == 0 { | ||
glog.V(4).Infof("No version is registered for group %v", authentication.GroupName) | ||
return | ||
} | ||
|
||
if err := registered.EnableVersions(externalVersions...); err != nil { | ||
glog.V(4).Infof("%v", err) | ||
return | ||
} | ||
if err := enableVersions(externalVersions); err != nil { | ||
glog.V(4).Infof("%v", err) | ||
return | ||
} | ||
} | ||
|
||
// TODO: enableVersions should be centralized rather than spread in each API | ||
// group. | ||
// We can combine registered.RegisterVersions, registered.EnableVersions and | ||
// registered.RegisterGroup once we have moved enableVersions there. | ||
func enableVersions(externalVersions []unversioned.GroupVersion) error { | ||
addVersionsToScheme(externalVersions...) | ||
preferredExternalVersion := externalVersions[0] | ||
|
||
groupMeta := apimachinery.GroupMeta{ | ||
GroupVersion: preferredExternalVersion, | ||
GroupVersions: externalVersions, | ||
RESTMapper: newRESTMapper(externalVersions), | ||
SelfLinker: runtime.SelfLinker(accessor), | ||
InterfacesFor: interfacesFor, | ||
} | ||
|
||
if err := registered.RegisterGroup(groupMeta); err != nil { | ||
return err | ||
} | ||
api.RegisterRESTMapper(groupMeta.RESTMapper) | ||
return nil | ||
} | ||
|
||
func addVersionsToScheme(externalVersions ...unversioned.GroupVersion) { | ||
// add the internal version to Scheme | ||
authentication.AddToScheme(api.Scheme) | ||
// add the enabled external versions to Scheme | ||
for _, v := range externalVersions { | ||
if !registered.IsEnabledVersion(v) { | ||
glog.Errorf("Version %s is not enabled, so it will not be added to the Scheme.", v) | ||
continue | ||
} | ||
switch v { | ||
case v1beta1.SchemeGroupVersion: | ||
v1beta1.AddToScheme(api.Scheme) | ||
} | ||
} | ||
} | ||
|
||
func newRESTMapper(externalVersions []unversioned.GroupVersion) meta.RESTMapper { | ||
rootScoped := sets.NewString("TokenReview") | ||
ignoredKinds := sets.NewString() | ||
return api.NewDefaultRESTMapper(externalVersions, interfacesFor, importPrefix, ignoredKinds, rootScoped) | ||
} | ||
|
||
func interfacesFor(version unversioned.GroupVersion) (*meta.VersionInterfaces, error) { | ||
switch version { | ||
case v1beta1.SchemeGroupVersion: | ||
return &meta.VersionInterfaces{ | ||
ObjectConvertor: api.Scheme, | ||
MetadataAccessor: accessor, | ||
}, nil | ||
default: | ||
g, _ := registered.Group(authentication.GroupName) | ||
return nil, fmt.Errorf("unsupported storage version: %s (valid: %v)", version, g.GroupVersions) | ||
} | ||
} |
Oops, something went wrong.