mirror of https://github.com/kubernetes/kops.git
372 lines
11 KiB
Go
372 lines
11 KiB
Go
/*
|
|
Copyright 2019 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package awstasks
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/url"
|
|
"reflect"
|
|
|
|
"github.com/aws/aws-sdk-go-v2/aws"
|
|
"github.com/aws/aws-sdk-go-v2/service/iam"
|
|
iamtypes "github.com/aws/aws-sdk-go-v2/service/iam/types"
|
|
"k8s.io/klog/v2"
|
|
"k8s.io/kops/pkg/diff"
|
|
"k8s.io/kops/upup/pkg/fi"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/awsup"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/terraform"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/terraformWriter"
|
|
)
|
|
|
|
// CloudTagServiceAccountName is a tag that defines the service account's name
|
|
const CloudTagServiceAccountName = "service-account.kops.k8s.io/name"
|
|
|
|
// CloudTagServiceAccountNamespace is a tag that defines the service account's namespace
|
|
const CloudTagServiceAccountNamespace = "service-account.kops.k8s.io/namespace"
|
|
|
|
// +kops:fitask
|
|
type IAMRole struct {
|
|
ID *string
|
|
Lifecycle fi.Lifecycle
|
|
|
|
Name *string
|
|
RolePolicyDocument fi.Resource // "inline" IAM policy
|
|
PermissionsBoundary *string
|
|
|
|
Tags map[string]string
|
|
|
|
// ExportWithId will expose the name & ARN for reuse as part of a larger system. Only supported by terraform currently.
|
|
ExportWithID *string
|
|
}
|
|
|
|
var _ fi.CompareWithID = &IAMRole{}
|
|
|
|
func (e *IAMRole) CompareWithID() *string {
|
|
return e.ID
|
|
}
|
|
|
|
func (e *IAMRole) Find(c *fi.CloudupContext) (*IAMRole, error) {
|
|
ctx := c.Context()
|
|
cloud := awsup.GetCloud(c)
|
|
|
|
request := &iam.GetRoleInput{RoleName: e.Name}
|
|
|
|
response, err := cloud.IAM().GetRole(ctx, request)
|
|
if awsup.IsIAMNoSuchEntityException(err) {
|
|
return nil, nil
|
|
}
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error getting role: %v", err)
|
|
}
|
|
|
|
r := response.Role
|
|
actual := &IAMRole{}
|
|
actual.ID = r.RoleId
|
|
actual.Name = r.RoleName
|
|
if r.PermissionsBoundary != nil {
|
|
actual.PermissionsBoundary = r.PermissionsBoundary.PermissionsBoundaryArn
|
|
}
|
|
if r.AssumeRolePolicyDocument != nil {
|
|
// The AssumeRolePolicyDocument is URI encoded (?)
|
|
actualPolicy := *r.AssumeRolePolicyDocument
|
|
actualPolicy, err = url.QueryUnescape(actualPolicy)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error parsing AssumeRolePolicyDocument for IAMRole %s: %v", *e.Name, err)
|
|
}
|
|
|
|
// The RolePolicyDocument is reformatted by AWS
|
|
// We parse both as JSON; if the json forms are equal we pretend the actual value is the expected value
|
|
if e.RolePolicyDocument != nil {
|
|
expectedPolicy, err := fi.ResourceAsString(e.RolePolicyDocument)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error reading expected RolePolicyDocument for IAMRole %q: %v", aws.ToString(e.Name), err)
|
|
}
|
|
expectedJson := make(map[string]interface{})
|
|
err = json.Unmarshal([]byte(expectedPolicy), &expectedJson)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error parsing expected RolePolicyDocument for IAMRole %q: %v", aws.ToString(e.Name), err)
|
|
}
|
|
actualJson := make(map[string]interface{})
|
|
err = json.Unmarshal([]byte(actualPolicy), &actualJson)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error parsing actual RolePolicyDocument for IAMRole %q: %v", aws.ToString(e.Name), err)
|
|
}
|
|
|
|
if reflect.DeepEqual(actualJson, expectedJson) {
|
|
klog.V(2).Infof("actual RolePolicyDocument was json-equal to expected; returning expected value")
|
|
actualPolicy = expectedPolicy
|
|
}
|
|
}
|
|
|
|
actual.RolePolicyDocument = fi.NewStringResource(actualPolicy)
|
|
}
|
|
actual.Tags = mapIAMTagsToMap(r.Tags)
|
|
|
|
klog.V(2).Infof("found matching IAMRole %q", aws.ToString(actual.ID))
|
|
e.ID = actual.ID
|
|
|
|
// Avoid spurious changes
|
|
actual.ExportWithID = e.ExportWithID
|
|
actual.Lifecycle = e.Lifecycle
|
|
|
|
return actual, nil
|
|
}
|
|
|
|
func (e *IAMRole) Run(c *fi.CloudupContext) error {
|
|
return fi.CloudupDefaultDeltaRunMethod(e, c)
|
|
}
|
|
|
|
func (s *IAMRole) ShouldCreate(a, e, changes *IAMRole) (bool, error) {
|
|
if len(*e.Name) > 64 {
|
|
return false, fmt.Errorf("role name length must be equal to 64 or less: %q", *e.Name)
|
|
}
|
|
return true, nil
|
|
}
|
|
|
|
func (s *IAMRole) CheckChanges(a, e, changes *IAMRole) error {
|
|
if a != nil {
|
|
if e.Name == nil {
|
|
return fi.RequiredField("Name")
|
|
}
|
|
} else {
|
|
if changes.Name == nil {
|
|
return fi.CannotChangeField("Name")
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (_ *IAMRole) RenderAWS(t *awsup.AWSAPITarget, a, e, changes *IAMRole) error {
|
|
ctx := context.TODO()
|
|
if e.RolePolicyDocument == nil {
|
|
klog.V(2).Infof("Deleting IAM role %q", fi.ValueOf(a.Name))
|
|
|
|
var attachedPolicies []iamtypes.AttachedPolicy
|
|
var policyNames []string
|
|
|
|
// List Inline policies
|
|
{
|
|
request := &iam.ListRolePoliciesInput{
|
|
RoleName: a.Name,
|
|
}
|
|
paginator := iam.NewListRolePoliciesPaginator(t.Cloud.IAM(), request)
|
|
for paginator.HasMorePages() {
|
|
page, err := paginator.NextPage(ctx)
|
|
if err != nil {
|
|
if awsup.IsIAMNoSuchEntityException(err) {
|
|
klog.V(2).Infof("Got NoSuchEntity describing IAM RolePolicy; will treat as already-deleted")
|
|
return nil
|
|
}
|
|
return fmt.Errorf("error listing IAM role policies: %v", err)
|
|
}
|
|
policyNames = append(policyNames, page.PolicyNames...)
|
|
}
|
|
}
|
|
|
|
// List Attached Policies
|
|
{
|
|
request := &iam.ListAttachedRolePoliciesInput{
|
|
RoleName: a.Name,
|
|
}
|
|
paginator := iam.NewListAttachedRolePoliciesPaginator(t.Cloud.IAM(), request)
|
|
for paginator.HasMorePages() {
|
|
page, err := paginator.NextPage(ctx)
|
|
if err != nil {
|
|
if awsup.IsIAMNoSuchEntityException(err) {
|
|
klog.V(2).Infof("Got NoSuchEntity describing IAM RolePolicy; will treat as already-deleted")
|
|
return nil
|
|
}
|
|
return fmt.Errorf("error listing IAM role policies for %v", err)
|
|
}
|
|
attachedPolicies = append(attachedPolicies, page.AttachedPolicies...)
|
|
}
|
|
}
|
|
|
|
// Delete inline policies
|
|
for _, policyName := range policyNames {
|
|
klog.V(2).Infof("Deleting IAM role policy %q", policyName)
|
|
request := &iam.DeleteRolePolicyInput{
|
|
RoleName: a.Name,
|
|
PolicyName: aws.String(policyName),
|
|
}
|
|
_, err := t.Cloud.IAM().DeleteRolePolicy(ctx, request)
|
|
if err != nil {
|
|
return fmt.Errorf("error deleting IAM role policy %q: %v", policyName, err)
|
|
}
|
|
}
|
|
|
|
// Detach Managed Policies
|
|
for _, policy := range attachedPolicies {
|
|
klog.V(2).Infof("Detaching IAM role policy %v", policy)
|
|
request := &iam.DetachRolePolicyInput{
|
|
RoleName: a.Name,
|
|
PolicyArn: policy.PolicyArn,
|
|
}
|
|
_, err := t.Cloud.IAM().DetachRolePolicy(ctx, request)
|
|
if err != nil {
|
|
return fmt.Errorf("error detaching IAM role policy %q: %v", *policy.PolicyArn, err)
|
|
}
|
|
}
|
|
|
|
request := &iam.DeleteRoleInput{
|
|
RoleName: a.Name,
|
|
}
|
|
if _, err := t.Cloud.IAM().DeleteRole(ctx, request); err != nil {
|
|
return fmt.Errorf("error deleting IAM role: %v", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
policy, err := fi.ResourceAsString(e.RolePolicyDocument)
|
|
if err != nil {
|
|
return fmt.Errorf("error rendering RolePolicyDocument: %v", err)
|
|
}
|
|
|
|
if a == nil {
|
|
klog.V(2).Infof("Creating IAMRole with Name:%q", *e.Name)
|
|
|
|
request := &iam.CreateRoleInput{}
|
|
request.AssumeRolePolicyDocument = aws.String(policy)
|
|
request.RoleName = e.Name
|
|
request.Tags = mapToIAMTags(e.Tags)
|
|
|
|
if e.PermissionsBoundary != nil {
|
|
request.PermissionsBoundary = e.PermissionsBoundary
|
|
}
|
|
|
|
response, err := t.Cloud.IAM().CreateRole(ctx, request)
|
|
if err != nil {
|
|
klog.V(2).Infof("IAMRole policy: %s", policy)
|
|
return fmt.Errorf("error creating IAMRole: %v", err)
|
|
}
|
|
|
|
e.ID = response.Role.RoleId
|
|
} else {
|
|
if changes.RolePolicyDocument != nil {
|
|
klog.V(2).Infof("Updating IAMRole AssumeRolePolicy %q", *e.Name)
|
|
|
|
var err error
|
|
|
|
actualPolicy := ""
|
|
if a.RolePolicyDocument != nil {
|
|
actualPolicy, err = fi.ResourceAsString(a.RolePolicyDocument)
|
|
if err != nil {
|
|
return fmt.Errorf("error reading actual policy document: %v", err)
|
|
}
|
|
}
|
|
|
|
if actualPolicy == policy {
|
|
klog.Warning("Policies were actually the same")
|
|
} else {
|
|
d := diff.FormatDiff(actualPolicy, policy)
|
|
klog.V(2).Infof("diff: %s", d)
|
|
}
|
|
|
|
request := &iam.UpdateAssumeRolePolicyInput{}
|
|
request.PolicyDocument = aws.String(policy)
|
|
request.RoleName = e.Name
|
|
|
|
_, err = t.Cloud.IAM().UpdateAssumeRolePolicy(ctx, request)
|
|
if err != nil {
|
|
return fmt.Errorf("error updating IAMRole: %v", err)
|
|
}
|
|
}
|
|
if changes.PermissionsBoundary != nil {
|
|
klog.V(2).Infof("Updating IAMRole PermissionsBoundary %q", *e.Name)
|
|
|
|
request := &iam.PutRolePermissionsBoundaryInput{}
|
|
request.RoleName = e.Name
|
|
request.PermissionsBoundary = e.PermissionsBoundary
|
|
|
|
if _, err := t.Cloud.IAM().PutRolePermissionsBoundary(ctx, request); err != nil {
|
|
return fmt.Errorf("error updating IAMRole: %v", err)
|
|
}
|
|
} else if a.PermissionsBoundary != nil && e.PermissionsBoundary == nil {
|
|
request := &iam.DeleteRolePermissionsBoundaryInput{}
|
|
request.RoleName = e.Name
|
|
|
|
if _, err := t.Cloud.IAM().DeleteRolePermissionsBoundary(ctx, request); err != nil {
|
|
return fmt.Errorf("error updating IAMRole: %v", err)
|
|
}
|
|
}
|
|
if changes.Tags != nil {
|
|
if len(a.Tags) > 0 {
|
|
existingTagKeys := make([]string, 0)
|
|
for k := range a.Tags {
|
|
existingTagKeys = append(existingTagKeys, k)
|
|
}
|
|
untagRequest := &iam.UntagRoleInput{
|
|
RoleName: e.Name,
|
|
TagKeys: existingTagKeys,
|
|
}
|
|
_, err = t.Cloud.IAM().UntagRole(ctx, untagRequest)
|
|
if err != nil {
|
|
return fmt.Errorf("error untagging IAMRole: %v", err)
|
|
}
|
|
}
|
|
if len(e.Tags) > 0 {
|
|
tagRequest := &iam.TagRoleInput{
|
|
RoleName: e.Name,
|
|
Tags: mapToIAMTags(e.Tags),
|
|
}
|
|
_, err = t.Cloud.IAM().TagRole(ctx, tagRequest)
|
|
if err != nil {
|
|
return fmt.Errorf("error tagging IAMRole: %v", err)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
type terraformIAMRole struct {
|
|
Name *string `cty:"name"`
|
|
AssumeRolePolicy *terraformWriter.Literal `cty:"assume_role_policy"`
|
|
PermissionsBoundary *string `cty:"permissions_boundary"`
|
|
Tags map[string]string `cty:"tags"`
|
|
}
|
|
|
|
func (_ *IAMRole) RenderTerraform(t *terraform.TerraformTarget, a, e, changes *IAMRole) error {
|
|
policy, err := t.AddFileResource("aws_iam_role", *e.Name, "policy", e.RolePolicyDocument, false)
|
|
if err != nil {
|
|
return fmt.Errorf("error rendering RolePolicyDocument: %v", err)
|
|
}
|
|
|
|
tf := &terraformIAMRole{
|
|
Name: e.Name,
|
|
AssumeRolePolicy: policy,
|
|
Tags: e.Tags,
|
|
}
|
|
|
|
if e.PermissionsBoundary != nil {
|
|
tf.PermissionsBoundary = e.PermissionsBoundary
|
|
}
|
|
|
|
if fi.ValueOf(e.ExportWithID) != "" {
|
|
t.AddOutputVariable(*e.ExportWithID+"_role_arn", terraformWriter.LiteralProperty("aws_iam_role", *e.Name, "arn"))
|
|
t.AddOutputVariable(*e.ExportWithID+"_role_name", e.TerraformLink())
|
|
}
|
|
|
|
return t.RenderResource("aws_iam_role", *e.Name, tf)
|
|
}
|
|
|
|
func (e *IAMRole) TerraformLink() *terraformWriter.Literal {
|
|
return terraformWriter.LiteralProperty("aws_iam_role", *e.Name, "name")
|
|
}
|