forked from openshift/origin
-
Notifications
You must be signed in to change notification settings - Fork 0
/
registry.go
78 lines (65 loc) · 3.13 KB
/
registry.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
package rolebinding
import (
kapi "k8s.io/kubernetes/pkg/api"
"k8s.io/kubernetes/pkg/api/rest"
authorizationapi "github.com/openshift/origin/pkg/authorization/api"
)
// Registry is an interface for things that know how to store RoleBindings.
type Registry interface {
// ListRoleBindings obtains list of policyRoleBindings that match a selector.
ListRoleBindings(ctx kapi.Context, options *kapi.ListOptions) (*authorizationapi.RoleBindingList, error)
// GetRoleBinding retrieves a specific policyRoleBinding.
GetRoleBinding(ctx kapi.Context, id string) (*authorizationapi.RoleBinding, error)
// CreateRoleBinding creates a new policyRoleBinding.
CreateRoleBinding(ctx kapi.Context, policyRoleBinding *authorizationapi.RoleBinding) (*authorizationapi.RoleBinding, error)
// UpdateRoleBinding updates a policyRoleBinding.
UpdateRoleBinding(ctx kapi.Context, policyRoleBinding *authorizationapi.RoleBinding) (*authorizationapi.RoleBinding, bool, error)
// DeleteRoleBinding deletes a policyRoleBinding.
DeleteRoleBinding(ctx kapi.Context, id string) error
}
// Storage is an interface for a standard REST Storage backend
type Storage interface {
rest.Getter
rest.Lister
rest.CreaterUpdater
rest.GracefulDeleter
// CreateRoleBindingWithEscalation creates a new policyRoleBinding. Skipping the escalation check should only be done during bootstrapping procedures where no users are currently bound.
CreateRoleBindingWithEscalation(ctx kapi.Context, policyRoleBinding *authorizationapi.RoleBinding) (*authorizationapi.RoleBinding, error)
// UpdateRoleBindingWithEscalation updates a policyRoleBinding. Skipping the escalation check should only be done during bootstrapping procedures where no users are currently bound.
UpdateRoleBindingWithEscalation(ctx kapi.Context, policyRoleBinding *authorizationapi.RoleBinding) (*authorizationapi.RoleBinding, bool, error)
}
// storage puts strong typing around storage calls
type storage struct {
Storage
}
// NewRegistry returns a new Registry interface for the given Storage. Any mismatched
// types will panic.
func NewRegistry(s Storage) Registry {
return &storage{s}
}
func (s *storage) ListRoleBindings(ctx kapi.Context, options *kapi.ListOptions) (*authorizationapi.RoleBindingList, error) {
obj, err := s.List(ctx, options)
if err != nil {
return nil, err
}
return obj.(*authorizationapi.RoleBindingList), nil
}
func (s *storage) CreateRoleBinding(ctx kapi.Context, node *authorizationapi.RoleBinding) (*authorizationapi.RoleBinding, error) {
obj, err := s.Create(ctx, node)
return obj.(*authorizationapi.RoleBinding), err
}
func (s *storage) UpdateRoleBinding(ctx kapi.Context, node *authorizationapi.RoleBinding) (*authorizationapi.RoleBinding, bool, error) {
obj, created, err := s.Update(ctx, node)
return obj.(*authorizationapi.RoleBinding), created, err
}
func (s *storage) GetRoleBinding(ctx kapi.Context, name string) (*authorizationapi.RoleBinding, error) {
obj, err := s.Get(ctx, name)
if err != nil {
return nil, err
}
return obj.(*authorizationapi.RoleBinding), nil
}
func (s *storage) DeleteRoleBinding(ctx kapi.Context, name string) error {
_, err := s.Delete(ctx, name, nil)
return err
}