mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-11-03 23:40:03 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			180 lines
		
	
	
		
			5.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			180 lines
		
	
	
		
			5.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2017 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package create
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"io"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"github.com/spf13/cobra"
 | 
						|
 | 
						|
	rbacv1 "k8s.io/api/rbac/v1"
 | 
						|
	"k8s.io/kubernetes/pkg/kubectl/cmd/templates"
 | 
						|
	cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
 | 
						|
	"k8s.io/kubernetes/pkg/kubectl/util/i18n"
 | 
						|
)
 | 
						|
 | 
						|
var (
 | 
						|
	clusterRoleLong = templates.LongDesc(i18n.T(`
 | 
						|
		Create a ClusterRole.`))
 | 
						|
 | 
						|
	clusterRoleExample = templates.Examples(i18n.T(`
 | 
						|
		# Create a ClusterRole named "pod-reader" that allows user to perform "get", "watch" and "list" on pods
 | 
						|
		kubectl create clusterrole pod-reader --verb=get,list,watch --resource=pods
 | 
						|
 | 
						|
		# Create a ClusterRole named "pod-reader" with ResourceName specified
 | 
						|
		kubectl create clusterrole pod-reader --verb=get --resource=pods --resource-name=readablepod --resource-name=anotherpod
 | 
						|
 | 
						|
		# Create a ClusterRole named "foo" with API Group specified
 | 
						|
		kubectl create clusterrole foo --verb=get,list,watch --resource=rs.extensions
 | 
						|
 | 
						|
		# Create a ClusterRole named "foo" with SubResource specified
 | 
						|
		kubectl create clusterrole foo --verb=get,list,watch --resource=pods,pods/status
 | 
						|
 | 
						|
		# Create a ClusterRole name "foo" with NonResourceURL specified
 | 
						|
		kubectl create clusterrole "foo" --verb=get --non-resource-url=/logs/*`))
 | 
						|
 | 
						|
	// Valid nonResource verb list for validation.
 | 
						|
	validNonResourceVerbs = []string{"*", "get", "post", "put", "delete", "patch", "head", "options"}
 | 
						|
)
 | 
						|
 | 
						|
type CreateClusterRoleOptions struct {
 | 
						|
	*CreateRoleOptions
 | 
						|
	NonResourceURLs []string
 | 
						|
}
 | 
						|
 | 
						|
// ClusterRole is a command to ease creating ClusterRoles.
 | 
						|
func NewCmdCreateClusterRole(f cmdutil.Factory, cmdOut io.Writer) *cobra.Command {
 | 
						|
	c := &CreateClusterRoleOptions{
 | 
						|
		CreateRoleOptions: &CreateRoleOptions{
 | 
						|
			PrintFlags: NewPrintFlags("created"),
 | 
						|
			Out:        cmdOut,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	cmd := &cobra.Command{
 | 
						|
		Use: "clusterrole NAME --verb=verb --resource=resource.group [--resource-name=resourcename] [--dry-run]",
 | 
						|
		DisableFlagsInUseLine: true,
 | 
						|
		Short:   clusterRoleLong,
 | 
						|
		Long:    clusterRoleLong,
 | 
						|
		Example: clusterRoleExample,
 | 
						|
		Run: func(cmd *cobra.Command, args []string) {
 | 
						|
			cmdutil.CheckErr(c.Complete(f, cmd, args))
 | 
						|
			cmdutil.CheckErr(c.Validate())
 | 
						|
			cmdutil.CheckErr(c.RunCreateRole())
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	c.PrintFlags.AddFlags(cmd)
 | 
						|
 | 
						|
	cmdutil.AddApplyAnnotationFlags(cmd)
 | 
						|
	cmdutil.AddValidateFlags(cmd)
 | 
						|
	cmdutil.AddDryRunFlag(cmd)
 | 
						|
	cmd.Flags().StringSliceVar(&c.Verbs, "verb", c.Verbs, "Verb that applies to the resources contained in the rule")
 | 
						|
	cmd.Flags().StringSliceVar(&c.NonResourceURLs, "non-resource-url", c.NonResourceURLs, "A partial url that user should have access to.")
 | 
						|
	cmd.Flags().StringSlice("resource", []string{}, "Resource that the rule applies to")
 | 
						|
	cmd.Flags().StringArrayVar(&c.ResourceNames, "resource-name", c.ResourceNames, "Resource in the white list that the rule applies to, repeat this flag for multiple items")
 | 
						|
 | 
						|
	return cmd
 | 
						|
}
 | 
						|
 | 
						|
func (c *CreateClusterRoleOptions) Complete(f cmdutil.Factory, cmd *cobra.Command, args []string) error {
 | 
						|
	// Remove duplicate nonResourceURLs
 | 
						|
	nonResourceURLs := []string{}
 | 
						|
	for _, n := range c.NonResourceURLs {
 | 
						|
		if !arrayContains(nonResourceURLs, n) {
 | 
						|
			nonResourceURLs = append(nonResourceURLs, n)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	c.NonResourceURLs = nonResourceURLs
 | 
						|
 | 
						|
	return c.CreateRoleOptions.Complete(f, cmd, args)
 | 
						|
}
 | 
						|
 | 
						|
func (c *CreateClusterRoleOptions) Validate() error {
 | 
						|
	if c.Name == "" {
 | 
						|
		return fmt.Errorf("name must be specified")
 | 
						|
	}
 | 
						|
 | 
						|
	// validate verbs.
 | 
						|
	if len(c.Verbs) == 0 {
 | 
						|
		return fmt.Errorf("at least one verb must be specified")
 | 
						|
	}
 | 
						|
 | 
						|
	if len(c.Resources) == 0 && len(c.NonResourceURLs) == 0 {
 | 
						|
		return fmt.Errorf("one of resource or nonResourceURL must be specified")
 | 
						|
	}
 | 
						|
 | 
						|
	// validate resources
 | 
						|
	if len(c.Resources) > 0 {
 | 
						|
		for _, v := range c.Verbs {
 | 
						|
			if !arrayContains(validResourceVerbs, v) {
 | 
						|
				return fmt.Errorf("invalid verb: '%s'", v)
 | 
						|
			}
 | 
						|
		}
 | 
						|
		if err := c.validateResource(); err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	//validate non-resource-url
 | 
						|
	if len(c.NonResourceURLs) > 0 {
 | 
						|
		for _, v := range c.Verbs {
 | 
						|
			if !arrayContains(validNonResourceVerbs, v) {
 | 
						|
				return fmt.Errorf("invalid verb: '%s' for nonResourceURL", v)
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		for _, nonResourceURL := range c.NonResourceURLs {
 | 
						|
			if nonResourceURL == "*" {
 | 
						|
				continue
 | 
						|
			}
 | 
						|
 | 
						|
			if nonResourceURL == "" || !strings.HasPrefix(nonResourceURL, "/") {
 | 
						|
				return fmt.Errorf("nonResourceURL should start with /")
 | 
						|
			}
 | 
						|
 | 
						|
			if strings.ContainsRune(nonResourceURL[:len(nonResourceURL)-1], '*') {
 | 
						|
				return fmt.Errorf("nonResourceURL only supports wildcard matches when '*' is at the end")
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
func (c *CreateClusterRoleOptions) RunCreateRole() error {
 | 
						|
	clusterRole := &rbacv1.ClusterRole{}
 | 
						|
	clusterRole.Name = c.Name
 | 
						|
	rules, err := generateResourcePolicyRules(c.Mapper, c.Verbs, c.Resources, c.ResourceNames, c.NonResourceURLs)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	clusterRole.Rules = rules
 | 
						|
 | 
						|
	// Create ClusterRole.
 | 
						|
	if !c.DryRun {
 | 
						|
		clusterRole, err = c.Client.ClusterRoles().Create(clusterRole)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return c.PrintObj(clusterRole)
 | 
						|
}
 |