| /* |
| Copyright 2018 The Kubernetes Authors. |
| |
| Licensed under the Apache License, Version 2.0 (the "License"); |
| you may not use this file except in compliance with the License. |
| You may obtain a copy of the License at |
| |
| http://www.apache.org/licenses/LICENSE-2.0 |
| |
| Unless required by applicable law or agreed to in writing, software |
| distributed under the License is distributed on an "AS IS" BASIS, |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| See the License for the specific language governing permissions and |
| limitations under the License. |
| */ |
| |
| package printers |
| |
| import ( |
| "strings" |
| ) |
| |
| var ( |
| InternalObjectPrinterErr = "a versioned object must be passed to a printer" |
| |
| // disallowedPackagePrefixes contains regular expression templates |
| // for object package paths that are not allowed by printers. |
| disallowedPackagePrefixes = []string{ |
| "k8s.io/kubernetes/pkg/apis/", |
| } |
| ) |
| |
| var InternalObjectPreventer = &illegalPackageSourceChecker{disallowedPackagePrefixes} |
| |
| func IsInternalObjectError(err error) bool { |
| if err == nil { |
| return false |
| } |
| |
| return err.Error() == InternalObjectPrinterErr |
| } |
| |
| // illegalPackageSourceChecker compares a given |
| // object's package path, and determines if the |
| // object originates from a disallowed source. |
| type illegalPackageSourceChecker struct { |
| // disallowedPrefixes is a slice of disallowed package path |
| // prefixes for a given runtime.Object that we are printing. |
| disallowedPrefixes []string |
| } |
| |
| func (c *illegalPackageSourceChecker) IsForbidden(pkgPath string) bool { |
| for _, forbiddenPrefix := range c.disallowedPrefixes { |
| if strings.HasPrefix(pkgPath, forbiddenPrefix) || strings.Contains(pkgPath, "/vendor/"+forbiddenPrefix) { |
| return true |
| } |
| } |
| |
| return false |
| } |