forked from rancher/rancher
-
Notifications
You must be signed in to change notification settings - Fork 0
/
template.go
139 lines (112 loc) · 4.86 KB
/
template.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
package podsecuritypolicy
import (
"context"
"fmt"
"k8s.io/apimachinery/pkg/runtime"
v1beta12 "github.com/rancher/types/apis/extensions/v1beta1"
"github.com/rancher/types/apis/management.cattle.io/v3"
v12 "github.com/rancher/types/apis/rbac.authorization.k8s.io/v1"
"github.com/rancher/types/config"
"github.com/sirupsen/logrus"
"k8s.io/api/extensions/v1beta1"
rbac "k8s.io/api/rbac/v1"
"k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/tools/cache"
)
const policyByPSPTParentAnnotationIndex = "podsecuritypolicy.rbac.user.cattle.io/parent-annotation"
const clusterRoleByPSPTNameIndex = "podsecuritypolicy.rbac.user.cattle.io/pspt-name"
// RegisterTemplate propagates updates to pod security policy templates to their associated pod security policies.
// Ignores pod security policy templates not assigned to a cluster or project.
func RegisterTemplate(ctx context.Context, context *config.UserContext) {
logrus.Infof("registering podsecuritypolicy template handler for cluster %v", context.ClusterName)
policyInformer := context.Extensions.PodSecurityPolicies("").Controller().Informer()
policyIndexers := map[string]cache.IndexFunc{
policyByPSPTParentAnnotationIndex: policyByPSPTParentAnnotation,
}
policyInformer.AddIndexers(policyIndexers)
clusterRoleInformer := context.RBAC.ClusterRoles("").Controller().Informer()
clusterRoleIndexer := map[string]cache.IndexFunc{
clusterRoleByPSPTNameIndex: clusterRoleByPSPTName,
}
clusterRoleInformer.AddIndexers(clusterRoleIndexer)
lfc := &Lifecycle{
policies: context.Extensions.PodSecurityPolicies(""),
policyLister: context.Extensions.PodSecurityPolicies("").Controller().Lister(),
clusterRoles: context.RBAC.ClusterRoles(""),
clusterRoleLister: context.RBAC.ClusterRoles("").Controller().Lister(),
policyIndexer: policyInformer.GetIndexer(),
clusterRoleIndexer: clusterRoleInformer.GetIndexer(),
}
pspti := context.Management.Management.PodSecurityPolicyTemplates("")
psptSync := v3.NewPodSecurityPolicyTemplateLifecycleAdapter("cluster-pspt-sync_"+context.ClusterName, true, pspti, lfc)
context.Management.Management.PodSecurityPolicyTemplates("").AddHandler(ctx, "pspt-sync", psptSync)
}
type Lifecycle struct {
policies v1beta12.PodSecurityPolicyInterface
policyLister v1beta12.PodSecurityPolicyLister
clusterRoles v12.ClusterRoleInterface
clusterRoleLister v12.ClusterRoleLister
policyIndexer cache.Indexer
clusterRoleIndexer cache.Indexer
}
func (l *Lifecycle) Create(obj *v3.PodSecurityPolicyTemplate) (runtime.Object, error) {
return nil, nil
}
func (l *Lifecycle) Updated(obj *v3.PodSecurityPolicyTemplate) (runtime.Object, error) {
policies, err := l.policyIndexer.ByIndex(policyByPSPTParentAnnotationIndex, obj.Name)
if err != nil {
return nil, fmt.Errorf("error getting policies: %v", err)
}
for _, rawPolicy := range policies {
policy := rawPolicy.(*v1beta1.PodSecurityPolicy)
if policy.Annotations[podSecurityPolicyTemplateVersionAnnotation] != obj.ResourceVersion {
newPolicy := policy.DeepCopy()
newPolicy.Spec = obj.Spec
newPolicy.Annotations[podSecurityPolicyTemplateVersionAnnotation] = obj.ResourceVersion
_, err = l.policies.Update(newPolicy)
if err != nil {
return nil, fmt.Errorf("error updating psp: %v", err)
}
}
}
return obj, nil
}
func (l *Lifecycle) Remove(obj *v3.PodSecurityPolicyTemplate) (runtime.Object, error) {
policies, err := l.policyIndexer.ByIndex(policyByPSPTParentAnnotationIndex, obj.Name)
if err != nil {
return nil, fmt.Errorf("error getting policies: %v", err)
}
for _, rawPolicy := range policies {
policy := rawPolicy.(*v1beta1.PodSecurityPolicy)
err = l.policies.Delete(policy.Name, &v1.DeleteOptions{})
if err != nil {
return nil, fmt.Errorf("error deleting policy: %v", err)
}
}
clusterRoles, err := l.clusterRoleIndexer.ByIndex(clusterRoleByPSPTNameIndex, obj.Name)
if err != nil {
return nil, fmt.Errorf("error getting cluster roles: %v", err)
}
for _, rawClusterRole := range clusterRoles {
clusterRole := rawClusterRole.(*rbac.ClusterRole)
err = l.clusterRoles.DeleteNamespaced(clusterRole.Namespace, clusterRole.Name, &v1.DeleteOptions{})
if err != nil {
return nil, fmt.Errorf("error deleting cluster role: %v", err)
}
}
return obj, nil
}
func policyByPSPTParentAnnotation(obj interface{}) ([]string, error) {
policy, ok := obj.(*v1beta1.PodSecurityPolicy)
if !ok || policy.Annotations[podSecurityPolicyTemplateParentAnnotation] == "" {
return []string{}, nil
}
return []string{policy.Annotations[podSecurityPolicyTemplateParentAnnotation]}, nil
}
func clusterRoleByPSPTName(obj interface{}) ([]string, error) {
clusterRole, ok := obj.(*rbac.ClusterRole)
if !ok || clusterRole.Annotations[podSecurityPolicyTemplateParentAnnotation] == "" {
return []string{}, nil
}
return []string{clusterRole.Annotations[podSecurityPolicyTemplateParentAnnotation]}, nil
}