mirror of https://github.com/k3s-io/k3s
plumb apiAudience to TokenReview registry
parent
162699ca30
commit
ed17876e52
|
@ -335,7 +335,7 @@ func (c completedConfig) New(delegationTarget genericapiserver.DelegationTarget)
|
||||||
// handlers that we have.
|
// handlers that we have.
|
||||||
restStorageProviders := []RESTStorageProvider{
|
restStorageProviders := []RESTStorageProvider{
|
||||||
auditregistrationrest.RESTStorageProvider{},
|
auditregistrationrest.RESTStorageProvider{},
|
||||||
authenticationrest.RESTStorageProvider{Authenticator: c.GenericConfig.Authentication.Authenticator},
|
authenticationrest.RESTStorageProvider{Authenticator: c.GenericConfig.Authentication.Authenticator, APIAudiences: c.GenericConfig.Authentication.APIAudiences},
|
||||||
authorizationrest.RESTStorageProvider{Authorizer: c.GenericConfig.Authorization.Authorizer, RuleResolver: c.GenericConfig.RuleResolver},
|
authorizationrest.RESTStorageProvider{Authorizer: c.GenericConfig.Authorization.Authorizer, RuleResolver: c.GenericConfig.RuleResolver},
|
||||||
autoscalingrest.RESTStorageProvider{},
|
autoscalingrest.RESTStorageProvider{},
|
||||||
batchrest.RESTStorageProvider{},
|
batchrest.RESTStorageProvider{},
|
||||||
|
|
|
@ -31,6 +31,7 @@ import (
|
||||||
|
|
||||||
type RESTStorageProvider struct {
|
type RESTStorageProvider struct {
|
||||||
Authenticator authenticator.Request
|
Authenticator authenticator.Request
|
||||||
|
APIAudiences authenticator.Audiences
|
||||||
}
|
}
|
||||||
|
|
||||||
func (p RESTStorageProvider) NewRESTStorage(apiResourceConfigSource serverstorage.APIResourceConfigSource, restOptionsGetter generic.RESTOptionsGetter) (genericapiserver.APIGroupInfo, bool) {
|
func (p RESTStorageProvider) NewRESTStorage(apiResourceConfigSource serverstorage.APIResourceConfigSource, restOptionsGetter generic.RESTOptionsGetter) (genericapiserver.APIGroupInfo, bool) {
|
||||||
|
@ -56,7 +57,7 @@ func (p RESTStorageProvider) NewRESTStorage(apiResourceConfigSource serverstorag
|
||||||
func (p RESTStorageProvider) v1beta1Storage(apiResourceConfigSource serverstorage.APIResourceConfigSource, restOptionsGetter generic.RESTOptionsGetter) map[string]rest.Storage {
|
func (p RESTStorageProvider) v1beta1Storage(apiResourceConfigSource serverstorage.APIResourceConfigSource, restOptionsGetter generic.RESTOptionsGetter) map[string]rest.Storage {
|
||||||
storage := map[string]rest.Storage{}
|
storage := map[string]rest.Storage{}
|
||||||
// tokenreviews
|
// tokenreviews
|
||||||
tokenReviewStorage := tokenreview.NewREST(p.Authenticator)
|
tokenReviewStorage := tokenreview.NewREST(p.Authenticator, p.APIAudiences)
|
||||||
storage["tokenreviews"] = tokenReviewStorage
|
storage["tokenreviews"] = tokenReviewStorage
|
||||||
|
|
||||||
return storage
|
return storage
|
||||||
|
@ -65,7 +66,7 @@ func (p RESTStorageProvider) v1beta1Storage(apiResourceConfigSource serverstorag
|
||||||
func (p RESTStorageProvider) v1Storage(apiResourceConfigSource serverstorage.APIResourceConfigSource, restOptionsGetter generic.RESTOptionsGetter) map[string]rest.Storage {
|
func (p RESTStorageProvider) v1Storage(apiResourceConfigSource serverstorage.APIResourceConfigSource, restOptionsGetter generic.RESTOptionsGetter) map[string]rest.Storage {
|
||||||
storage := map[string]rest.Storage{}
|
storage := map[string]rest.Storage{}
|
||||||
// tokenreviews
|
// tokenreviews
|
||||||
tokenReviewStorage := tokenreview.NewREST(p.Authenticator)
|
tokenReviewStorage := tokenreview.NewREST(p.Authenticator, p.APIAudiences)
|
||||||
storage["tokenreviews"] = tokenReviewStorage
|
storage["tokenreviews"] = tokenReviewStorage
|
||||||
|
|
||||||
return storage
|
return storage
|
||||||
|
|
|
@ -17,6 +17,7 @@ go_library(
|
||||||
"//staging/src/k8s.io/apiserver/pkg/authentication/authenticator:go_default_library",
|
"//staging/src/k8s.io/apiserver/pkg/authentication/authenticator:go_default_library",
|
||||||
"//staging/src/k8s.io/apiserver/pkg/endpoints/request:go_default_library",
|
"//staging/src/k8s.io/apiserver/pkg/endpoints/request:go_default_library",
|
||||||
"//staging/src/k8s.io/apiserver/pkg/registry/rest:go_default_library",
|
"//staging/src/k8s.io/apiserver/pkg/registry/rest:go_default_library",
|
||||||
|
"//vendor/k8s.io/klog:go_default_library",
|
||||||
],
|
],
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
|
@ -18,6 +18,7 @@ package tokenreview
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
|
||||||
|
@ -27,15 +28,22 @@ import (
|
||||||
"k8s.io/apiserver/pkg/authentication/authenticator"
|
"k8s.io/apiserver/pkg/authentication/authenticator"
|
||||||
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
||||||
"k8s.io/apiserver/pkg/registry/rest"
|
"k8s.io/apiserver/pkg/registry/rest"
|
||||||
|
"k8s.io/klog"
|
||||||
"k8s.io/kubernetes/pkg/apis/authentication"
|
"k8s.io/kubernetes/pkg/apis/authentication"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
var badAuthenticatorAuds = apierrors.NewInternalError(errors.New("error validating audiences"))
|
||||||
|
|
||||||
type REST struct {
|
type REST struct {
|
||||||
tokenAuthenticator authenticator.Request
|
tokenAuthenticator authenticator.Request
|
||||||
|
apiAudiences []string
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewREST(tokenAuthenticator authenticator.Request) *REST {
|
func NewREST(tokenAuthenticator authenticator.Request, apiAudiences []string) *REST {
|
||||||
return &REST{tokenAuthenticator: tokenAuthenticator}
|
return &REST{
|
||||||
|
tokenAuthenticator: tokenAuthenticator,
|
||||||
|
apiAudiences: apiAudiences,
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *REST) NamespaceScoped() bool {
|
func (r *REST) NamespaceScoped() bool {
|
||||||
|
@ -68,14 +76,24 @@ func (r *REST) Create(ctx context.Context, obj runtime.Object, createValidation
|
||||||
fakeReq := &http.Request{Header: http.Header{}}
|
fakeReq := &http.Request{Header: http.Header{}}
|
||||||
fakeReq.Header.Add("Authorization", "Bearer "+tokenReview.Spec.Token)
|
fakeReq.Header.Add("Authorization", "Bearer "+tokenReview.Spec.Token)
|
||||||
|
|
||||||
|
auds := tokenReview.Spec.Audiences
|
||||||
|
if len(auds) == 0 {
|
||||||
|
auds = r.apiAudiences
|
||||||
|
}
|
||||||
|
if len(auds) > 0 {
|
||||||
|
fakeReq = fakeReq.WithContext(authenticator.WithAudiences(fakeReq.Context(), auds))
|
||||||
|
}
|
||||||
|
|
||||||
resp, ok, err := r.tokenAuthenticator.AuthenticateRequest(fakeReq)
|
resp, ok, err := r.tokenAuthenticator.AuthenticateRequest(fakeReq)
|
||||||
tokenReview.Status.Authenticated = ok
|
tokenReview.Status.Authenticated = ok
|
||||||
if err != nil {
|
if err != nil {
|
||||||
tokenReview.Status.Error = err.Error()
|
tokenReview.Status.Error = err.Error()
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO(mikedanese): verify the response audience matches one of apiAuds if
|
if len(auds) > 0 && resp != nil && len(authenticator.Audiences(auds).Intersect(resp.Audiences)) == 0 {
|
||||||
// non-empty
|
klog.Errorf("error validating audience. want=%q got=%q", auds, resp.Audiences)
|
||||||
|
return nil, badAuthenticatorAuds
|
||||||
|
}
|
||||||
|
|
||||||
if resp != nil && resp.User != nil {
|
if resp != nil && resp.User != nil {
|
||||||
tokenReview.Status.User = authentication.UserInfo{
|
tokenReview.Status.User = authentication.UserInfo{
|
||||||
|
@ -87,6 +105,7 @@ func (r *REST) Create(ctx context.Context, obj runtime.Object, createValidation
|
||||||
for k, v := range resp.User.GetExtra() {
|
for k, v := range resp.User.GetExtra() {
|
||||||
tokenReview.Status.User.Extra[k] = authentication.ExtraValue(v)
|
tokenReview.Status.User.Extra[k] = authentication.ExtraValue(v)
|
||||||
}
|
}
|
||||||
|
tokenReview.Status.Audiences = resp.Audiences
|
||||||
}
|
}
|
||||||
|
|
||||||
return tokenReview, nil
|
return tokenReview, nil
|
||||||
|
|
Loading…
Reference in New Issue