178 lines
4.9 KiB
Go
178 lines
4.9 KiB
Go
package util
|
|
|
|
import (
|
|
"context"
|
|
|
|
rbacv1 "k8s.io/api/rbac/v1"
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
|
kubeclient "k8s.io/client-go/kubernetes"
|
|
)
|
|
|
|
// IsClusterRoleExist tells if specific ClusterRole already exists.
|
|
func IsClusterRoleExist(client kubeclient.Interface, name string) (bool, error) {
|
|
_, err := client.RbacV1().ClusterRoles().Get(context.TODO(), name, metav1.GetOptions{})
|
|
if err != nil {
|
|
if apierrors.IsNotFound(err) {
|
|
return false, nil
|
|
}
|
|
|
|
return false, err
|
|
}
|
|
|
|
return true, nil
|
|
}
|
|
|
|
// CreateClusterRole just try to create the ClusterRole.
|
|
func CreateClusterRole(client kubeclient.Interface, clusterRoleObj *rbacv1.ClusterRole) (*rbacv1.ClusterRole, error) {
|
|
createdObj, err := client.RbacV1().ClusterRoles().Create(context.TODO(), clusterRoleObj, metav1.CreateOptions{})
|
|
if err != nil {
|
|
if apierrors.IsAlreadyExists(err) {
|
|
return clusterRoleObj, nil
|
|
}
|
|
|
|
return nil, err
|
|
}
|
|
|
|
return createdObj, nil
|
|
}
|
|
|
|
// DeleteClusterRole just try to delete the ClusterRole.
|
|
func DeleteClusterRole(client kubeclient.Interface, name string) error {
|
|
err := client.RbacV1().ClusterRoles().Delete(context.TODO(), name, metav1.DeleteOptions{})
|
|
if err != nil && !apierrors.IsNotFound(err) {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// IsClusterRoleBindingExist tells if specific ClusterRole already exists.
|
|
func IsClusterRoleBindingExist(client kubeclient.Interface, name string) (bool, error) {
|
|
_, err := client.RbacV1().ClusterRoleBindings().Get(context.TODO(), name, metav1.GetOptions{})
|
|
if err != nil {
|
|
if apierrors.IsNotFound(err) {
|
|
return false, nil
|
|
}
|
|
|
|
return false, err
|
|
}
|
|
|
|
return true, nil
|
|
}
|
|
|
|
// CreateClusterRoleBinding just try to create the ClusterRoleBinding.
|
|
func CreateClusterRoleBinding(client kubeclient.Interface, clusterRoleBindingObj *rbacv1.ClusterRoleBinding) (*rbacv1.ClusterRoleBinding, error) {
|
|
createdObj, err := client.RbacV1().ClusterRoleBindings().Create(context.TODO(), clusterRoleBindingObj, metav1.CreateOptions{})
|
|
if err != nil {
|
|
if apierrors.IsAlreadyExists(err) {
|
|
return clusterRoleBindingObj, nil
|
|
}
|
|
|
|
return nil, err
|
|
}
|
|
|
|
return createdObj, nil
|
|
}
|
|
|
|
// DeleteClusterRoleBinding just try to delete the ClusterRoleBinding.
|
|
func DeleteClusterRoleBinding(client kubeclient.Interface, name string) error {
|
|
err := client.RbacV1().ClusterRoleBindings().Delete(context.TODO(), name, metav1.DeleteOptions{})
|
|
if err != nil && !apierrors.IsNotFound(err) {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// PolicyRuleAPIGroupMatches determines if the given policy rule is applied for requested group.
|
|
func PolicyRuleAPIGroupMatches(rule *rbacv1.PolicyRule, requestedGroup string) bool {
|
|
for _, ruleGroup := range rule.APIGroups {
|
|
if ruleGroup == rbacv1.APIGroupAll {
|
|
return true
|
|
}
|
|
if ruleGroup == requestedGroup {
|
|
return true
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// PolicyRuleResourceMatches determines if the given policy rule is applied for requested resource.
|
|
func PolicyRuleResourceMatches(rule *rbacv1.PolicyRule, requestedResource string) bool {
|
|
for _, ruleResource := range rule.Resources {
|
|
if ruleResource == rbacv1.ResourceAll {
|
|
return true
|
|
}
|
|
|
|
if ruleResource == requestedResource {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// PolicyRuleResourceNameMatches determines if the given policy rule is applied for named resource.
|
|
func PolicyRuleResourceNameMatches(rule *rbacv1.PolicyRule, requestedName string) bool {
|
|
if len(rule.ResourceNames) == 0 {
|
|
return true
|
|
}
|
|
|
|
for _, resourceName := range rule.ResourceNames {
|
|
if resourceName == requestedName {
|
|
return true
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// GenerateImpersonationRules generate PolicyRules from given subjects for impersonation.
|
|
func GenerateImpersonationRules(subjects []rbacv1.Subject) []rbacv1.PolicyRule {
|
|
if len(subjects) == 0 {
|
|
return nil
|
|
}
|
|
|
|
users, serviceAccounts, groups := sets.NewString(), sets.NewString(), sets.NewString()
|
|
for _, subject := range subjects {
|
|
switch subject.Kind {
|
|
case rbacv1.UserKind:
|
|
users.Insert(subject.Name)
|
|
case rbacv1.ServiceAccountKind:
|
|
serviceAccounts.Insert(subject.Name)
|
|
case rbacv1.GroupKind:
|
|
groups.Insert(subject.Name)
|
|
}
|
|
}
|
|
|
|
var rules []rbacv1.PolicyRule
|
|
if users.Len() != 0 {
|
|
rules = append(rules, rbacv1.PolicyRule{
|
|
Verbs: []string{"impersonate"},
|
|
APIGroups: []string{""},
|
|
Resources: []string{"users"},
|
|
ResourceNames: sets.StringKeySet(users).List(),
|
|
})
|
|
}
|
|
|
|
if serviceAccounts.Len() != 0 {
|
|
rules = append(rules, rbacv1.PolicyRule{
|
|
Verbs: []string{"impersonate"},
|
|
APIGroups: []string{""},
|
|
Resources: []string{"serviceaccounts"},
|
|
ResourceNames: sets.StringKeySet(serviceAccounts).List(),
|
|
})
|
|
}
|
|
|
|
if groups.Len() != 0 {
|
|
rules = append(rules, rbacv1.PolicyRule{
|
|
Verbs: []string{"impersonate"},
|
|
APIGroups: []string{""},
|
|
Resources: []string{"groups"},
|
|
ResourceNames: sets.StringKeySet(groups).List(),
|
|
})
|
|
}
|
|
|
|
return rules
|
|
}
|