5151func ValidateUserForFleetCRD (req admission.Request , whiteListedUsers []string , group string ) admission.Response {
5252 namespacedName := types.NamespacedName {Name : req .Name , Namespace : req .Namespace }
5353 userInfo := req .UserInfo
54- if checkCRDGroup (group ) && ! IsAdminGroupUserOrWhiteListedUser (whiteListedUsers , userInfo ) {
54+ if checkCRDGroup (group ) && ! isAdminGroupUserOrWhiteListedUser (whiteListedUsers , userInfo ) {
5555 klog .V (2 ).InfoS (deniedModifyResource , "user" , userInfo .Username , "groups" , userInfo .Groups , "operation" , req .Operation , "GVK" , req .RequestKind , "subResource" , req .SubResource , "namespacedName" , namespacedName )
5656 return admission .Denied (fmt .Sprintf (ResourceDeniedFormat , userInfo .Username , utils .GenerateGroupString (userInfo .Groups ), req .Operation , req .RequestKind , req .SubResource , namespacedName ))
5757 }
@@ -63,7 +63,7 @@ func ValidateUserForFleetCRD(req admission.Request, whiteListedUsers []string, g
6363func ValidateUserForResource (req admission.Request , whiteListedUsers []string ) admission.Response {
6464 namespacedName := types.NamespacedName {Name : req .Name , Namespace : req .Namespace }
6565 userInfo := req .UserInfo
66- if IsAdminGroupUserOrWhiteListedUser (whiteListedUsers , userInfo ) || isUserAuthenticatedServiceAccount (userInfo ) || isUserKubeScheduler (userInfo ) || isUserKubeControllerManager (userInfo ) || isUserInGroup (userInfo , nodeGroup ) || isAKSSupportUser (userInfo ) {
66+ if isAdminGroupUserOrWhiteListedUser (whiteListedUsers , userInfo ) || isUserAuthenticatedServiceAccount (userInfo ) || isUserKubeScheduler (userInfo ) || isUserKubeControllerManager (userInfo ) || isUserInGroup (userInfo , nodeGroup ) || isAKSSupportUser (userInfo ) {
6767 klog .V (3 ).InfoS (allowedModifyResource , "user" , userInfo .Username , "groups" , userInfo .Groups , "operation" , req .Operation , "GVK" , req .RequestKind , "subResource" , req .SubResource , "namespacedName" , namespacedName )
6868 return admission .Allowed (fmt .Sprintf (ResourceAllowedFormat , userInfo .Username , utils .GenerateGroupString (userInfo .Groups ), req .Operation , req .RequestKind , req .SubResource , namespacedName ))
6969 }
@@ -144,10 +144,10 @@ func ValidatedUpstreamMemberClusterUpdate(currentMC, oldMC clusterv1beta1.Member
144144 return admission .Allowed (fmt .Sprintf (ResourceAllowedFormat , userInfo .Username , utils .GenerateGroupString (userInfo .Groups ), req .Operation , req .RequestKind , req .SubResource , namespacedName ))
145145}
146146
147- // IsAdminGroupUserOrWhiteListedUser returns true is user belongs to white listed users or user belongs to system:masters/kubeadm:cluster-admins group.
147+ // isAdminGroupUserOrWhiteListedUser returns true is user belongs to white listed users or user belongs to system:masters/kubeadm:cluster-admins group.
148148// In clusters using kubeadm, kubernetes-admin belongs to kubeadm:cluster-admins group and kubernetes-super-admin user belongs to system:masters group.
149149// https://kubernetes.io/docs/reference/setup-tools/kubeadm/implementation-details/#generate-kubeconfig-files-for-control-plane-components
150- func IsAdminGroupUserOrWhiteListedUser (whiteListedUsers []string , userInfo authenticationv1.UserInfo ) bool {
150+ func isAdminGroupUserOrWhiteListedUser (whiteListedUsers []string , userInfo authenticationv1.UserInfo ) bool {
151151 return slices .Contains (whiteListedUsers , userInfo .Username ) || slices .Contains (userInfo .Groups , mastersGroup ) || slices .Contains (userInfo .Groups , kubeadmClusterAdminsGroup )
152152}
153153
0 commit comments