// ensureNamespaceServiceAccountRoleBindings initializes roles for service accounts in the namespace func (c *MasterConfig) ensureNamespaceServiceAccountRoleBindings(namespace *kapi.Namespace) { const ServiceAccountRolesInitializedAnnotation = "openshift.io/sa.initialized-roles" // Short-circuit if we're already initialized if namespace.Annotations[ServiceAccountRolesInitializedAnnotation] == "true" { return } hasErrors := false for _, binding := range bootstrappolicy.GetBootstrapServiceAccountProjectRoleBindings(namespace.Name) { addRole := &policy.RoleModificationOptions{ RoleName: binding.RoleRef.Name, RoleNamespace: binding.RoleRef.Namespace, RoleBindingAccessor: policy.NewLocalRoleBindingAccessor(namespace.Name, c.ServiceAccountRoleBindingClient()), Subjects: binding.Subjects, } if err := addRole.AddRole(); err != nil { glog.Errorf("Could not add service accounts to the %v role in the %q namespace: %v\n", binding.RoleRef.Name, namespace.Name, err) hasErrors = true } } // If we had errors, don't register initialization so we can try again if hasErrors { return } if namespace.Annotations == nil { namespace.Annotations = map[string]string{} } namespace.Annotations[ServiceAccountRolesInitializedAnnotation] = "true" if _, err := c.KubeClient().Namespaces().Update(namespace); err != nil { glog.Errorf("Error recording adding service account roles to %q namespace: %v", namespace.Name, err) } }
// ensureDefaultNamespaceServiceAccountRoles initializes roles for service accounts in the default namespace func (c *MasterConfig) ensureDefaultNamespaceServiceAccountRoles() { const ServiceAccountRolesInitializedAnnotation = "openshift.io/sa.initialized-roles" // Wait for the default namespace var defaultNamespace *kapi.Namespace for i := 0; i < 30; i++ { ns, err := c.KubeClient().Namespaces().Get(kapi.NamespaceDefault) if err == nil { defaultNamespace = ns break } if kapierror.IsNotFound(err) { time.Sleep(time.Second) continue } glog.Errorf("Error adding service account roles to default namespace: %v", err) return } if defaultNamespace == nil { glog.Errorf("Default namespace not found, could not initialize default service account roles") return } // Short-circuit if we're already initialized if defaultNamespace.Annotations[ServiceAccountRolesInitializedAnnotation] == "true" { return } hasErrors := false for _, binding := range bootstrappolicy.GetBootstrapServiceAccountProjectRoleBindings(kapi.NamespaceDefault) { addRole := &policy.RoleModificationOptions{ RoleName: binding.RoleRef.Name, RoleNamespace: binding.RoleRef.Namespace, RoleBindingAccessor: policy.NewLocalRoleBindingAccessor(kapi.NamespaceDefault, c.ServiceAccountRoleBindingClient()), Users: binding.Users.List(), Groups: binding.Groups.List(), } if err := addRole.AddRole(); err != nil { glog.Errorf("Could not add service accounts to the %v role in the %v namespace: %v\n", binding.RoleRef.Name, kapi.NamespaceDefault, err) hasErrors = true } } // If we had errors, don't register initialization so we can try again if !hasErrors { if defaultNamespace.Annotations == nil { defaultNamespace.Annotations = map[string]string{} } defaultNamespace.Annotations[ServiceAccountRolesInitializedAnnotation] = "true" if _, err := c.KubeClient().Namespaces().Update(defaultNamespace); err != nil { glog.Errorf("Error recording adding service account roles to default namespace: %v", err) } } }
// Next processes a changed namespace and tries to allocate a uid range for it. If it is // successful, an mcs label corresponding to the relative position of the range is also // set. func (c *Allocation) Next(ns *kapi.Namespace) error { tx := &tx{} defer tx.Rollback() if _, ok := ns.Annotations[security.UIDRangeAnnotation]; ok { return nil } if ns.Annotations == nil { ns.Annotations = make(map[string]string) } // do uid allocation block, err := c.uid.AllocateNext() if err != nil { return err } tx.Add(func() error { return c.uid.Release(block) }) ns.Annotations[security.UIDRangeAnnotation] = block.String() ns.Annotations[security.SupplementalGroupsAnnotation] = block.String() if _, ok := ns.Annotations[security.MCSAnnotation]; !ok { if label := c.mcs(block); label != nil { ns.Annotations[security.MCSAnnotation] = label.String() } } // TODO: could use a client.GuaranteedUpdate/Merge function for i := 0; i < retryCount; i++ { _, err := c.client.Update(ns) if err == nil { // commit and exit tx.Commit() return nil } if errors.IsNotFound(err) { return nil } if !errors.IsConflict(err) { return err } newNs, err := c.client.Get(ns.Name) if errors.IsNotFound(err) { return nil } if err != nil { return err } if changedAndSetAnnotations(ns, newNs) { return nil } // try again if newNs.Annotations == nil { newNs.Annotations = make(map[string]string) } newNs.Annotations[security.UIDRangeAnnotation] = ns.Annotations[security.UIDRangeAnnotation] newNs.Annotations[security.SupplementalGroupsAnnotation] = ns.Annotations[security.SupplementalGroupsAnnotation] newNs.Annotations[security.MCSAnnotation] = ns.Annotations[security.MCSAnnotation] ns = newNs } return fmt.Errorf("unable to allocate security info on %q after %d retries", ns.Name, retryCount) }