forked from openshift/origin
-
Notifications
You must be signed in to change notification settings - Fork 1
/
mustrunas.go
58 lines (48 loc) · 2.18 KB
/
mustrunas.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
package user
import (
"fmt"
"k8s.io/apimachinery/pkg/util/validation/field"
"k8s.io/kubernetes/pkg/api"
securityapi "github.com/openshift/origin/pkg/security/apis/security"
)
// mustRunAs implements the RunAsUserSecurityContextConstraintsStrategy interface
type mustRunAs struct {
opts *securityapi.RunAsUserStrategyOptions
}
var _ RunAsUserSecurityContextConstraintsStrategy = &mustRunAs{}
// NewMustRunAs provides a strategy that requires the container to run as a specific UID.
func NewMustRunAs(options *securityapi.RunAsUserStrategyOptions) (RunAsUserSecurityContextConstraintsStrategy, error) {
if options == nil {
return nil, fmt.Errorf("MustRunAs requires run as user options")
}
if options.UID == nil {
return nil, fmt.Errorf("MustRunAs requires a UID")
}
return &mustRunAs{
opts: options,
}, nil
}
// Generate creates the uid based on policy rules. MustRunAs returns the UID it is initialized with.
func (s *mustRunAs) Generate(pod *api.Pod, container *api.Container) (*int64, error) {
return s.opts.UID, nil
}
// Validate ensures that the specified values fall within the range of the strategy.
func (s *mustRunAs) Validate(pod *api.Pod, container *api.Container) field.ErrorList {
allErrs := field.ErrorList{}
securityContextPath := field.NewPath("securityContext")
if container.SecurityContext == nil {
detail := fmt.Sprintf("unable to validate nil security context for container %s", container.Name)
allErrs = append(allErrs, field.Invalid(securityContextPath, container.SecurityContext, detail))
return allErrs
}
if container.SecurityContext.RunAsUser == nil {
detail := fmt.Sprintf("unable to validate nil runAsUser for container %s", container.Name)
allErrs = append(allErrs, field.Invalid(securityContextPath.Child("runAsUser"), container.SecurityContext.RunAsUser, detail))
return allErrs
}
if *s.opts.UID != *container.SecurityContext.RunAsUser {
detail := fmt.Sprintf("UID on container %s does not match required UID. Found %d, wanted %d", container.Name, *container.SecurityContext.RunAsUser, *s.opts.UID)
allErrs = append(allErrs, field.Invalid(securityContextPath.Child("runAsUser"), *container.SecurityContext.RunAsUser, detail))
}
return allErrs
}