forked from openshift/origin
-
Notifications
You must be signed in to change notification settings - Fork 0
/
registry.go
78 lines (65 loc) · 2.83 KB
/
registry.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
package role
import (
kapi "k8s.io/kubernetes/pkg/api"
"k8s.io/kubernetes/pkg/api/rest"
authorizationapi "github.com/openshift/origin/pkg/authorization/api"
)
// Registry is an interface for things that know how to store Roles.
type Registry interface {
// ListRoles obtains list of policyRoles that match a selector.
ListRoles(ctx kapi.Context, options *kapi.ListOptions) (*authorizationapi.RoleList, error)
// GetRole retrieves a specific policyRole.
GetRole(ctx kapi.Context, id string) (*authorizationapi.Role, error)
// CreateRole creates a new policyRole.
CreateRole(ctx kapi.Context, policyRole *authorizationapi.Role) (*authorizationapi.Role, error)
// UpdateRole updates a policyRole.
UpdateRole(ctx kapi.Context, policyRole *authorizationapi.Role) (*authorizationapi.Role, bool, error)
// DeleteRole deletes a policyRole.
DeleteRole(ctx kapi.Context, id string) error
}
// Storage is an interface for a standard REST Storage backend
type Storage interface {
rest.Getter
rest.Lister
rest.CreaterUpdater
rest.GracefulDeleter
// CreateRoleWithEscalation creates a new policyRole. Skipping the escalation check should only be done during bootstrapping procedures where no users are currently bound.
CreateRoleWithEscalation(ctx kapi.Context, policyRole *authorizationapi.Role) (*authorizationapi.Role, error)
// UpdateRoleWithEscalation updates a policyRole. Skipping the escalation check should only be done during bootstrapping procedures where no users are currently bound.
UpdateRoleWithEscalation(ctx kapi.Context, policyRole *authorizationapi.Role) (*authorizationapi.Role, bool, error)
}
// storage puts strong typing around storage calls
type storage struct {
Storage
}
// NewRegistry returns a new Registry interface for the given Storage. Any mismatched
// types will panic.
func NewRegistry(s Storage) Registry {
return &storage{s}
}
func (s *storage) ListRoles(ctx kapi.Context, options *kapi.ListOptions) (*authorizationapi.RoleList, error) {
obj, err := s.List(ctx, options)
if err != nil {
return nil, err
}
return obj.(*authorizationapi.RoleList), nil
}
func (s *storage) CreateRole(ctx kapi.Context, role *authorizationapi.Role) (*authorizationapi.Role, error) {
obj, err := s.Create(ctx, role)
return obj.(*authorizationapi.Role), err
}
func (s *storage) UpdateRole(ctx kapi.Context, role *authorizationapi.Role) (*authorizationapi.Role, bool, error) {
obj, created, err := s.Update(ctx, role.Name, rest.DefaultUpdatedObjectInfo(role, kapi.Scheme))
return obj.(*authorizationapi.Role), created, err
}
func (s *storage) GetRole(ctx kapi.Context, name string) (*authorizationapi.Role, error) {
obj, err := s.Get(ctx, name)
if err != nil {
return nil, err
}
return obj.(*authorizationapi.Role), nil
}
func (s *storage) DeleteRole(ctx kapi.Context, name string) error {
_, err := s.Delete(ctx, name, nil)
return err
}