mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-30 21:30:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			211 lines
		
	
	
		
			6.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			211 lines
		
	
	
		
			6.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2017 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package create
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"strings"
 | |
| 
 | |
| 	"github.com/spf13/cobra"
 | |
| 
 | |
| 	rbacv1 "k8s.io/api/rbac/v1"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	utilflag "k8s.io/apiserver/pkg/util/flag"
 | |
| 	"k8s.io/cli-runtime/pkg/genericclioptions"
 | |
| 	cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
 | |
| 	"k8s.io/kubernetes/pkg/kubectl/util/i18n"
 | |
| 	"k8s.io/kubernetes/pkg/kubectl/util/templates"
 | |
| )
 | |
| 
 | |
| var (
 | |
| 	clusterRoleLong = templates.LongDesc(i18n.T(`
 | |
| 		Create a ClusterRole.`))
 | |
| 
 | |
| 	clusterRoleExample = templates.Examples(i18n.T(`
 | |
| 		# Create a ClusterRole named "pod-reader" that allows user to perform "get", "watch" and "list" on pods
 | |
| 		kubectl create clusterrole pod-reader --verb=get,list,watch --resource=pods
 | |
| 
 | |
| 		# Create a ClusterRole named "pod-reader" with ResourceName specified
 | |
| 		kubectl create clusterrole pod-reader --verb=get --resource=pods --resource-name=readablepod --resource-name=anotherpod
 | |
| 
 | |
| 		# Create a ClusterRole named "foo" with API Group specified
 | |
| 		kubectl create clusterrole foo --verb=get,list,watch --resource=rs.extensions
 | |
| 
 | |
| 		# Create a ClusterRole named "foo" with SubResource specified
 | |
| 		kubectl create clusterrole foo --verb=get,list,watch --resource=pods,pods/status
 | |
| 
 | |
| 		# Create a ClusterRole name "foo" with NonResourceURL specified
 | |
| 		kubectl create clusterrole "foo" --verb=get --non-resource-url=/logs/*
 | |
| 
 | |
| 		# Create a ClusterRole name "monitoring" with AggregationRule specified
 | |
| 		kubectl create clusterrole monitoring --aggregation-rule="rbac.example.com/aggregate-to-monitoring=true"`))
 | |
| 
 | |
| 	// Valid nonResource verb list for validation.
 | |
| 	validNonResourceVerbs = []string{"*", "get", "post", "put", "delete", "patch", "head", "options"}
 | |
| )
 | |
| 
 | |
| // CreateClusterRoleOptions is returned by NewCmdCreateClusterRole
 | |
| type CreateClusterRoleOptions struct {
 | |
| 	*CreateRoleOptions
 | |
| 	NonResourceURLs []string
 | |
| 	AggregationRule map[string]string
 | |
| }
 | |
| 
 | |
| // NewCmdCreateClusterRole initializes and returns new ClusterRoles command
 | |
| func NewCmdCreateClusterRole(f cmdutil.Factory, ioStreams genericclioptions.IOStreams) *cobra.Command {
 | |
| 	c := &CreateClusterRoleOptions{
 | |
| 		CreateRoleOptions: NewCreateRoleOptions(ioStreams),
 | |
| 		AggregationRule:   map[string]string{},
 | |
| 	}
 | |
| 	cmd := &cobra.Command{
 | |
| 		Use:                   "clusterrole NAME --verb=verb --resource=resource.group [--resource-name=resourcename] [--dry-run]",
 | |
| 		DisableFlagsInUseLine: true,
 | |
| 		Short:                 clusterRoleLong,
 | |
| 		Long:                  clusterRoleLong,
 | |
| 		Example:               clusterRoleExample,
 | |
| 		Run: func(cmd *cobra.Command, args []string) {
 | |
| 			cmdutil.CheckErr(c.Complete(f, cmd, args))
 | |
| 			cmdutil.CheckErr(c.Validate())
 | |
| 			cmdutil.CheckErr(c.RunCreateRole())
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	c.PrintFlags.AddFlags(cmd)
 | |
| 
 | |
| 	cmdutil.AddApplyAnnotationFlags(cmd)
 | |
| 	cmdutil.AddValidateFlags(cmd)
 | |
| 	cmdutil.AddDryRunFlag(cmd)
 | |
| 	cmd.Flags().StringSliceVar(&c.Verbs, "verb", c.Verbs, "Verb that applies to the resources contained in the rule")
 | |
| 	cmd.Flags().StringSliceVar(&c.NonResourceURLs, "non-resource-url", c.NonResourceURLs, "A partial url that user should have access to.")
 | |
| 	cmd.Flags().StringSlice("resource", []string{}, "Resource that the rule applies to")
 | |
| 	cmd.Flags().StringArrayVar(&c.ResourceNames, "resource-name", c.ResourceNames, "Resource in the white list that the rule applies to, repeat this flag for multiple items")
 | |
| 	cmd.Flags().Var(utilflag.NewMapStringString(&c.AggregationRule), "aggregation-rule", "An aggregation label selector for combining ClusterRoles.")
 | |
| 
 | |
| 	return cmd
 | |
| }
 | |
| 
 | |
| // Complete completes all the required options
 | |
| func (c *CreateClusterRoleOptions) Complete(f cmdutil.Factory, cmd *cobra.Command, args []string) error {
 | |
| 	// Remove duplicate nonResourceURLs
 | |
| 	nonResourceURLs := []string{}
 | |
| 	for _, n := range c.NonResourceURLs {
 | |
| 		if !arrayContains(nonResourceURLs, n) {
 | |
| 			nonResourceURLs = append(nonResourceURLs, n)
 | |
| 		}
 | |
| 	}
 | |
| 	c.NonResourceURLs = nonResourceURLs
 | |
| 
 | |
| 	return c.CreateRoleOptions.Complete(f, cmd, args)
 | |
| }
 | |
| 
 | |
| // Validate makes sure there is no discrepency in CreateClusterRoleOptions
 | |
| func (c *CreateClusterRoleOptions) Validate() error {
 | |
| 	if c.Name == "" {
 | |
| 		return fmt.Errorf("name must be specified")
 | |
| 	}
 | |
| 
 | |
| 	if len(c.AggregationRule) > 0 {
 | |
| 		if len(c.NonResourceURLs) > 0 || len(c.Verbs) > 0 || len(c.Resources) > 0 || len(c.ResourceNames) > 0 {
 | |
| 			return fmt.Errorf("aggregation rule must be specified without nonResourceURLs, verbs, resources or resourceNames")
 | |
| 		}
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	// validate verbs.
 | |
| 	if len(c.Verbs) == 0 {
 | |
| 		return fmt.Errorf("at least one verb must be specified")
 | |
| 	}
 | |
| 
 | |
| 	if len(c.Resources) == 0 && len(c.NonResourceURLs) == 0 {
 | |
| 		return fmt.Errorf("one of resource or nonResourceURL must be specified")
 | |
| 	}
 | |
| 
 | |
| 	// validate resources
 | |
| 	if len(c.Resources) > 0 {
 | |
| 		for _, v := range c.Verbs {
 | |
| 			if !arrayContains(validResourceVerbs, v) {
 | |
| 				return fmt.Errorf("invalid verb: '%s'", v)
 | |
| 			}
 | |
| 		}
 | |
| 		if err := c.validateResource(); err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	//validate non-resource-url
 | |
| 	if len(c.NonResourceURLs) > 0 {
 | |
| 		for _, v := range c.Verbs {
 | |
| 			if !arrayContains(validNonResourceVerbs, v) {
 | |
| 				return fmt.Errorf("invalid verb: '%s' for nonResourceURL", v)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		for _, nonResourceURL := range c.NonResourceURLs {
 | |
| 			if nonResourceURL == "*" {
 | |
| 				continue
 | |
| 			}
 | |
| 
 | |
| 			if nonResourceURL == "" || !strings.HasPrefix(nonResourceURL, "/") {
 | |
| 				return fmt.Errorf("nonResourceURL should start with /")
 | |
| 			}
 | |
| 
 | |
| 			if strings.ContainsRune(nonResourceURL[:len(nonResourceURL)-1], '*') {
 | |
| 				return fmt.Errorf("nonResourceURL only supports wildcard matches when '*' is at the end")
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| 
 | |
| }
 | |
| 
 | |
| // RunCreateRole creates a new clusterRole
 | |
| func (c *CreateClusterRoleOptions) RunCreateRole() error {
 | |
| 	clusterRole := &rbacv1.ClusterRole{
 | |
| 		// this is ok because we know exactly how we want to be serialized
 | |
| 		TypeMeta: metav1.TypeMeta{APIVersion: rbacv1.SchemeGroupVersion.String(), Kind: "ClusterRole"},
 | |
| 	}
 | |
| 	clusterRole.Name = c.Name
 | |
| 
 | |
| 	var err error
 | |
| 	if len(c.AggregationRule) == 0 {
 | |
| 		rules, err := generateResourcePolicyRules(c.Mapper, c.Verbs, c.Resources, c.ResourceNames, c.NonResourceURLs)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 		clusterRole.Rules = rules
 | |
| 	} else {
 | |
| 		clusterRole.AggregationRule = &rbacv1.AggregationRule{
 | |
| 			ClusterRoleSelectors: []metav1.LabelSelector{
 | |
| 				{
 | |
| 					MatchLabels: c.AggregationRule,
 | |
| 				},
 | |
| 			},
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Create ClusterRole.
 | |
| 	if !c.DryRun {
 | |
| 		clusterRole, err = c.Client.ClusterRoles().Create(clusterRole)
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return c.PrintObj(clusterRole)
 | |
| }
 |