mirror of
https://github.com/projectcapsule/capsule.git
synced 2026-03-06 03:30:53 +00:00
* fix(controller): decode old object for delete requests Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * chore: modernize golang Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * chore: modernize golang Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * chore: modernize golang Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * fix(config): remove usergroups default Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * fix(config): remove usergroups default Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * sec(ghsa-2ww6-hf35-mfjm): intercept namespace subresource Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * feat(api): add rulestatus api Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * chore: conflicts Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * chore: conflicts Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * chore: conflicts Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * chore: conflicts Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * chore: conflicts Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * chore: conflicts Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * chore: conflicts Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * chore: conflicts Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * chore: conflicts Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * chore: conflicts Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * chore: conflicts Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * feat(api): add rulestatus api Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * feat(api): add rulestatus api Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * feat(api): add rulestatus api Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * feat(api): add rulestatus api Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * feat(api): add rulestatus api Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> * feat(api): add rulestatus api Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> --------- Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com>
184 lines
5.1 KiB
Go
184 lines
5.1 KiB
Go
// Copyright 2020-2026 Project Capsule Authors
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package configuration
|
|
|
|
import (
|
|
"context"
|
|
"regexp"
|
|
|
|
"github.com/pkg/errors"
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
"sigs.k8s.io/controller-runtime/pkg/client"
|
|
|
|
capsulev1beta2 "github.com/projectcapsule/capsule/api/v1beta2"
|
|
capsuleapi "github.com/projectcapsule/capsule/pkg/api"
|
|
)
|
|
|
|
// capsuleConfiguration is the Capsule Configuration retrieval mode
|
|
// using a closure that provides the desired configuration.
|
|
type capsuleConfiguration struct {
|
|
retrievalFn func() *capsulev1beta2.CapsuleConfiguration
|
|
}
|
|
|
|
func DefaultCapsuleConfiguration() capsulev1beta2.CapsuleConfigurationSpec {
|
|
return capsulev1beta2.CapsuleConfigurationSpec{
|
|
Users: []capsuleapi.UserSpec{
|
|
{
|
|
Name: "projectcapsule.dev",
|
|
Kind: capsuleapi.GroupOwner,
|
|
},
|
|
},
|
|
ForceTenantPrefix: false,
|
|
ProtectedNamespaceRegexpString: "",
|
|
}
|
|
}
|
|
|
|
func NewCapsuleConfiguration(ctx context.Context, c client.Client, name string) Configuration {
|
|
return &capsuleConfiguration{retrievalFn: func() *capsulev1beta2.CapsuleConfiguration {
|
|
cfg := &capsulev1beta2.CapsuleConfiguration{}
|
|
key := types.NamespacedName{Name: name}
|
|
|
|
if err := c.Get(ctx, key, cfg); err == nil {
|
|
return cfg
|
|
} else if !apierrors.IsNotFound(err) {
|
|
panic(errors.Wrap(err, "cannot retrieve Capsule configuration with name "+name))
|
|
}
|
|
|
|
cfg = &capsulev1beta2.CapsuleConfiguration{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: name,
|
|
},
|
|
Spec: DefaultCapsuleConfiguration(),
|
|
}
|
|
|
|
if err := c.Create(ctx, cfg); err != nil {
|
|
if apierrors.IsAlreadyExists(err) {
|
|
if err := c.Get(ctx, key, cfg); err != nil {
|
|
panic(errors.Wrap(err, "configuration created concurrently but cannot be retrieved"))
|
|
}
|
|
|
|
return cfg
|
|
}
|
|
|
|
panic(errors.Wrap(err, "cannot create Capsule configuration with name "+name))
|
|
}
|
|
|
|
return cfg
|
|
}}
|
|
}
|
|
|
|
func (c *capsuleConfiguration) ProtectedNamespaceRegexp() (*regexp.Regexp, error) {
|
|
expr := c.retrievalFn().Spec.ProtectedNamespaceRegexpString
|
|
if len(expr) == 0 {
|
|
return nil, nil //nolint:nilnil
|
|
}
|
|
|
|
r, err := regexp.Compile(expr)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "Cannot compile the protected namespace regexp")
|
|
}
|
|
|
|
return r, nil
|
|
}
|
|
|
|
func (c *capsuleConfiguration) ForceTenantPrefix() bool {
|
|
return c.retrievalFn().Spec.ForceTenantPrefix
|
|
}
|
|
|
|
func (c *capsuleConfiguration) TLSSecretName() (name string) {
|
|
return c.retrievalFn().Spec.CapsuleResources.TLSSecretName
|
|
}
|
|
|
|
func (c *capsuleConfiguration) EnableTLSConfiguration() bool {
|
|
return c.retrievalFn().Spec.EnableTLSReconciler
|
|
}
|
|
|
|
func (c *capsuleConfiguration) AllowServiceAccountPromotion() bool {
|
|
return c.retrievalFn().Spec.AllowServiceAccountPromotion
|
|
}
|
|
|
|
func (c *capsuleConfiguration) MutatingWebhookConfigurationName() (name string) {
|
|
return c.retrievalFn().Spec.CapsuleResources.MutatingWebhookConfigurationName
|
|
}
|
|
|
|
func (c *capsuleConfiguration) TenantCRDName() string {
|
|
return TenantCRDName
|
|
}
|
|
|
|
func (c *capsuleConfiguration) ValidatingWebhookConfigurationName() (name string) {
|
|
return c.retrievalFn().Spec.CapsuleResources.ValidatingWebhookConfigurationName
|
|
}
|
|
|
|
//nolint:staticcheck
|
|
func (c *capsuleConfiguration) UserGroups() []string {
|
|
return append(c.retrievalFn().Spec.UserGroups, c.retrievalFn().Spec.Users.GetByKinds([]capsuleapi.OwnerKind{capsuleapi.GroupOwner})...)
|
|
}
|
|
|
|
//nolint:staticcheck
|
|
func (c *capsuleConfiguration) UserNames() []string {
|
|
return append(c.retrievalFn().Spec.UserNames, c.retrievalFn().Spec.Users.GetByKinds([]capsuleapi.OwnerKind{capsuleapi.UserOwner, capsuleapi.ServiceAccountOwner})...)
|
|
}
|
|
|
|
func (c *capsuleConfiguration) Users() capsuleapi.UserListSpec {
|
|
out := capsuleapi.UserListSpec{}
|
|
|
|
for _, user := range c.UserNames() {
|
|
out.Upsert(capsuleapi.UserSpec{
|
|
Kind: capsuleapi.UserOwner,
|
|
Name: user,
|
|
})
|
|
}
|
|
|
|
for _, group := range c.UserGroups() {
|
|
out.Upsert(capsuleapi.UserSpec{
|
|
Kind: capsuleapi.GroupOwner,
|
|
Name: group,
|
|
})
|
|
}
|
|
|
|
return out
|
|
}
|
|
|
|
func (c *capsuleConfiguration) GetUsersByStatus() capsuleapi.UserListSpec {
|
|
return c.retrievalFn().Status.Users
|
|
}
|
|
|
|
func (c *capsuleConfiguration) IgnoreUserWithGroups() []string {
|
|
return c.retrievalFn().Spec.IgnoreUserWithGroups
|
|
}
|
|
|
|
func (c *capsuleConfiguration) ForbiddenUserNodeLabels() *capsuleapi.ForbiddenListSpec {
|
|
if c.retrievalFn().Spec.NodeMetadata == nil {
|
|
return nil
|
|
}
|
|
|
|
return &c.retrievalFn().Spec.NodeMetadata.ForbiddenLabels
|
|
}
|
|
|
|
func (c *capsuleConfiguration) ForbiddenUserNodeAnnotations() *capsuleapi.ForbiddenListSpec {
|
|
if c.retrievalFn().Spec.NodeMetadata == nil {
|
|
return nil
|
|
}
|
|
|
|
return &c.retrievalFn().Spec.NodeMetadata.ForbiddenAnnotations
|
|
}
|
|
|
|
func (c *capsuleConfiguration) Administrators() capsuleapi.UserListSpec {
|
|
return c.retrievalFn().Spec.Administrators
|
|
}
|
|
|
|
func (c *capsuleConfiguration) Admission() capsulev1beta2.DynamicAdmission {
|
|
return c.retrievalFn().Spec.Admission
|
|
}
|
|
|
|
func (c *capsuleConfiguration) RBAC() *capsulev1beta2.RBACConfiguration {
|
|
return c.retrievalFn().Spec.RBAC
|
|
}
|
|
|
|
func (c *capsuleConfiguration) CacheInvalidation() metav1.Duration {
|
|
return c.retrievalFn().Spec.CacheInvalidation
|
|
}
|