git subrepo clone (merge) https://github.com/kubernetes-incubator/metrics-server.git metrics-server
subrepo:
subdir: "metrics-server"
merged: "92d8412"
upstream:
origin: "https://github.com/kubernetes-incubator/metrics-server.git"
branch: "master"
commit: "92d8412"
git-subrepo:
version: "0.4.0"
origin: "???"
commit: "???"
diff --git a/metrics-server/vendor/k8s.io/apiserver/pkg/audit/policy/checker.go b/metrics-server/vendor/k8s.io/apiserver/pkg/audit/policy/checker.go
new file mode 100644
index 0000000..41c6b1a
--- /dev/null
+++ b/metrics-server/vendor/k8s.io/apiserver/pkg/audit/policy/checker.go
@@ -0,0 +1,219 @@
+/*
+Copyright 2017 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package policy
+
+import (
+ "strings"
+
+ "k8s.io/apiserver/pkg/apis/audit"
+ "k8s.io/apiserver/pkg/authorization/authorizer"
+)
+
+const (
+ // DefaultAuditLevel is the default level to audit at, if no policy rules are matched.
+ DefaultAuditLevel = audit.LevelNone
+)
+
+// Checker exposes methods for checking the policy rules.
+type Checker interface {
+ // Check the audit level for a request with the given authorizer attributes.
+ LevelAndStages(authorizer.Attributes) (audit.Level, []audit.Stage)
+}
+
+// NewChecker creates a new policy checker.
+func NewChecker(policy *audit.Policy) Checker {
+ for i, rule := range policy.Rules {
+ policy.Rules[i].OmitStages = unionStages(policy.OmitStages, rule.OmitStages)
+ }
+ return &policyChecker{*policy}
+}
+
+func unionStages(stageLists ...[]audit.Stage) []audit.Stage {
+ m := make(map[audit.Stage]bool)
+ for _, sl := range stageLists {
+ for _, s := range sl {
+ m[s] = true
+ }
+ }
+ result := make([]audit.Stage, 0, len(m))
+ for key := range m {
+ result = append(result, key)
+ }
+ return result
+}
+
+// FakeChecker creates a checker that returns a constant level for all requests (for testing).
+func FakeChecker(level audit.Level, stage []audit.Stage) Checker {
+ return &fakeChecker{level, stage}
+}
+
+type policyChecker struct {
+ audit.Policy
+}
+
+func (p *policyChecker) LevelAndStages(attrs authorizer.Attributes) (audit.Level, []audit.Stage) {
+ for _, rule := range p.Rules {
+ if ruleMatches(&rule, attrs) {
+ return rule.Level, rule.OmitStages
+ }
+ }
+ return DefaultAuditLevel, p.OmitStages
+}
+
+// Check whether the rule matches the request attrs.
+func ruleMatches(r *audit.PolicyRule, attrs authorizer.Attributes) bool {
+ user := attrs.GetUser()
+ if len(r.Users) > 0 {
+ if user == nil || !hasString(r.Users, user.GetName()) {
+ return false
+ }
+ }
+ if len(r.UserGroups) > 0 {
+ if user == nil {
+ return false
+ }
+ matched := false
+ for _, group := range user.GetGroups() {
+ if hasString(r.UserGroups, group) {
+ matched = true
+ break
+ }
+ }
+ if !matched {
+ return false
+ }
+ }
+ if len(r.Verbs) > 0 {
+ if !hasString(r.Verbs, attrs.GetVerb()) {
+ return false
+ }
+ }
+
+ if len(r.Namespaces) > 0 || len(r.Resources) > 0 {
+ return ruleMatchesResource(r, attrs)
+ }
+
+ if len(r.NonResourceURLs) > 0 {
+ return ruleMatchesNonResource(r, attrs)
+ }
+
+ return true
+}
+
+// Check whether the rule's non-resource URLs match the request attrs.
+func ruleMatchesNonResource(r *audit.PolicyRule, attrs authorizer.Attributes) bool {
+ if attrs.IsResourceRequest() {
+ return false
+ }
+
+ path := attrs.GetPath()
+ for _, spec := range r.NonResourceURLs {
+ if pathMatches(path, spec) {
+ return true
+ }
+ }
+
+ return false
+}
+
+// Check whether the path matches the path specification.
+func pathMatches(path, spec string) bool {
+ // Allow wildcard match
+ if spec == "*" {
+ return true
+ }
+ // Allow exact match
+ if spec == path {
+ return true
+ }
+ // Allow a trailing * subpath match
+ if strings.HasSuffix(spec, "*") && strings.HasPrefix(path, strings.TrimRight(spec, "*")) {
+ return true
+ }
+ return false
+}
+
+// Check whether the rule's resource fields match the request attrs.
+func ruleMatchesResource(r *audit.PolicyRule, attrs authorizer.Attributes) bool {
+ if !attrs.IsResourceRequest() {
+ return false
+ }
+
+ if len(r.Namespaces) > 0 {
+ if !hasString(r.Namespaces, attrs.GetNamespace()) { // Non-namespaced resources use the empty string.
+ return false
+ }
+ }
+ if len(r.Resources) == 0 {
+ return true
+ }
+
+ apiGroup := attrs.GetAPIGroup()
+ resource := attrs.GetResource()
+ subresource := attrs.GetSubresource()
+ combinedResource := resource
+ // If subresource, the resource in the policy must match "(resource)/(subresource)"
+ if subresource != "" {
+ combinedResource = resource + "/" + subresource
+ }
+
+ name := attrs.GetName()
+
+ for _, gr := range r.Resources {
+ if gr.Group == apiGroup {
+ if len(gr.Resources) == 0 {
+ return true
+ }
+ for _, res := range gr.Resources {
+ if len(gr.ResourceNames) == 0 || hasString(gr.ResourceNames, name) {
+ // match "*"
+ if res == combinedResource || res == "*" {
+ return true
+ }
+ // match "*/subresource"
+ if len(subresource) > 0 && strings.HasPrefix(res, "*/") && subresource == strings.TrimLeft(res, "*/") {
+ return true
+ }
+ // match "resource/*"
+ if strings.HasSuffix(res, "/*") && resource == strings.TrimRight(res, "/*") {
+ return true
+ }
+ }
+ }
+ }
+ }
+ return false
+}
+
+// Utility function to check whether a string slice contains a string.
+func hasString(slice []string, value string) bool {
+ for _, s := range slice {
+ if s == value {
+ return true
+ }
+ }
+ return false
+}
+
+type fakeChecker struct {
+ level audit.Level
+ stage []audit.Stage
+}
+
+func (f *fakeChecker) LevelAndStages(_ authorizer.Attributes) (audit.Level, []audit.Stage) {
+ return f.level, f.stage
+}
diff --git a/metrics-server/vendor/k8s.io/apiserver/pkg/audit/policy/reader.go b/metrics-server/vendor/k8s.io/apiserver/pkg/audit/policy/reader.go
new file mode 100644
index 0000000..1d02e1a
--- /dev/null
+++ b/metrics-server/vendor/k8s.io/apiserver/pkg/audit/policy/reader.go
@@ -0,0 +1,79 @@
+/*
+Copyright 2017 The Kubernetes Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/
+
+package policy
+
+import (
+ "fmt"
+ "io/ioutil"
+
+ "k8s.io/apimachinery/pkg/runtime/schema"
+ auditinternal "k8s.io/apiserver/pkg/apis/audit"
+ auditv1alpha1 "k8s.io/apiserver/pkg/apis/audit/v1alpha1"
+ auditv1beta1 "k8s.io/apiserver/pkg/apis/audit/v1beta1"
+ "k8s.io/apiserver/pkg/apis/audit/validation"
+ "k8s.io/apiserver/pkg/audit"
+
+ "github.com/golang/glog"
+)
+
+var (
+ apiGroupVersions = []schema.GroupVersion{
+ auditv1beta1.SchemeGroupVersion,
+ auditv1alpha1.SchemeGroupVersion,
+ }
+ apiGroupVersionSet = map[schema.GroupVersion]bool{}
+)
+
+func init() {
+ for _, gv := range apiGroupVersions {
+ apiGroupVersionSet[gv] = true
+ }
+}
+
+func LoadPolicyFromFile(filePath string) (*auditinternal.Policy, error) {
+ if filePath == "" {
+ return nil, fmt.Errorf("file path not specified")
+ }
+ policyDef, err := ioutil.ReadFile(filePath)
+ if err != nil {
+ return nil, fmt.Errorf("failed to read file path %q: %+v", filePath, err)
+ }
+
+ policy := &auditinternal.Policy{}
+ decoder := audit.Codecs.UniversalDecoder(apiGroupVersions...)
+
+ _, gvk, err := decoder.Decode(policyDef, nil, policy)
+ if err != nil {
+ return nil, fmt.Errorf("failed decoding file %q: %v", filePath, err)
+ }
+
+ // Ensure the policy file contained an apiVersion and kind.
+ if !apiGroupVersionSet[schema.GroupVersion{Group: gvk.Group, Version: gvk.Version}] {
+ return nil, fmt.Errorf("unknown group version field %v in policy file %s", gvk, filePath)
+ }
+
+ if err := validation.ValidatePolicy(policy); err != nil {
+ return nil, err.ToAggregate()
+ }
+
+ policyCnt := len(policy.Rules)
+ if policyCnt == 0 {
+ return nil, fmt.Errorf("loaded illegal policy with 0 rules from file %s", filePath)
+ }
+ glog.V(4).Infof("Loaded %d audit policy rules from file %s", policyCnt, filePath)
+ return policy, nil
+}