forked from openshift/origin
-
Notifications
You must be signed in to change notification settings - Fork 0
/
registry.go
85 lines (71 loc) · 3.18 KB
/
registry.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
package clusterrole
import (
kapi "k8s.io/kubernetes/pkg/api"
"k8s.io/kubernetes/pkg/api/rest"
authorizationapi "github.com/openshift/origin/pkg/authorization/api"
)
// Registry is an interface for things that know how to store ClusterRoles.
type Registry interface {
// ListClusterRoles obtains list of policyClusterRoles that match a selector.
ListClusterRoles(ctx kapi.Context, options *kapi.ListOptions) (*authorizationapi.ClusterRoleList, error)
// GetClusterRole retrieves a specific policyClusterRole.
GetClusterRole(ctx kapi.Context, id string) (*authorizationapi.ClusterRole, error)
// CreateClusterRole creates a new policyClusterRole.
CreateClusterRole(ctx kapi.Context, policyClusterRole *authorizationapi.ClusterRole) (*authorizationapi.ClusterRole, error)
// UpdateClusterRole updates a policyClusterRole.
UpdateClusterRole(ctx kapi.Context, policyClusterRole *authorizationapi.ClusterRole) (*authorizationapi.ClusterRole, bool, error)
// DeleteClusterRole deletes a policyClusterRole.
DeleteClusterRole(ctx kapi.Context, id string) error
}
// Storage is an interface for a standard REST Storage backend
type Storage interface {
rest.Getter
rest.Lister
rest.CreaterUpdater
rest.GracefulDeleter
// CreateRoleWithEscalation creates a new policyRole. Skipping the escalation check should only be done during bootstrapping procedures where no users are currently bound.
CreateRoleWithEscalation(ctx kapi.Context, policyRole *authorizationapi.Role) (*authorizationapi.Role, error)
// UpdateRoleWithEscalation updates a policyRole. Skipping the escalation check should only be done during bootstrapping procedures where no users are currently bound.
UpdateRoleWithEscalation(ctx kapi.Context, policyRole *authorizationapi.Role) (*authorizationapi.Role, bool, error)
}
// storage puts strong typing around storage calls
type storage struct {
Storage
}
// NewRegistry returns a new Registry interface for the given Storage. Any mismatched
// types will panic.
func NewRegistry(s Storage) Registry {
return &storage{s}
}
func (s *storage) ListClusterRoles(ctx kapi.Context, options *kapi.ListOptions) (*authorizationapi.ClusterRoleList, error) {
obj, err := s.List(ctx, options)
if err != nil {
return nil, err
}
return obj.(*authorizationapi.ClusterRoleList), nil
}
func (s *storage) CreateClusterRole(ctx kapi.Context, node *authorizationapi.ClusterRole) (*authorizationapi.ClusterRole, error) {
obj, err := s.Create(ctx, node)
if err != nil {
return nil, err
}
return obj.(*authorizationapi.ClusterRole), err
}
func (s *storage) UpdateClusterRole(ctx kapi.Context, node *authorizationapi.ClusterRole) (*authorizationapi.ClusterRole, bool, error) {
obj, created, err := s.Update(ctx, node.Name, rest.DefaultUpdatedObjectInfo(node, kapi.Scheme))
if err != nil {
return nil, created, err
}
return obj.(*authorizationapi.ClusterRole), created, err
}
func (s *storage) GetClusterRole(ctx kapi.Context, name string) (*authorizationapi.ClusterRole, error) {
obj, err := s.Get(ctx, name)
if err != nil {
return nil, err
}
return obj.(*authorizationapi.ClusterRole), nil
}
func (s *storage) DeleteClusterRole(ctx kapi.Context, name string) error {
_, err := s.Delete(ctx, name, nil)
return err
}