mirror of
https://github.com/vmware-tanzu/velero.git
synced 2026-01-05 13:05:17 +00:00
Some checks failed
Run the E2E test on kind / build (push) Failing after 6m48s
Run the E2E test on kind / setup-test-matrix (push) Successful in 3s
Run the E2E test on kind / run-e2e-test (push) Has been skipped
Main CI / Build (push) Failing after 35s
Close stale issues and PRs / stale (push) Successful in 8s
Trivy Nightly Scan / Trivy nightly scan (velero, main) (push) Failing after 1m11s
Trivy Nightly Scan / Trivy nightly scan (velero-plugin-for-aws, main) (push) Failing after 47s
Trivy Nightly Scan / Trivy nightly scan (velero-plugin-for-gcp, main) (push) Failing after 49s
Trivy Nightly Scan / Trivy nightly scan (velero-plugin-for-microsoft-azure, main) (push) Failing after 43s
* lchore: define common alias for k8s packages Signed-off-by: Matthieu MOREL <matthieu.morel35@gmail.com> * Update .golangci.yaml Signed-off-by: Matthieu MOREL <matthieu.morel35@gmail.com> * Update .golangci.yaml Signed-off-by: Matthieu MOREL <matthieu.morel35@gmail.com> * Update .golangci.yaml Signed-off-by: Matthieu MOREL <matthieu.morel35@gmail.com> --------- Signed-off-by: Matthieu MOREL <matthieu.morel35@gmail.com>
143 lines
4.4 KiB
Go
143 lines
4.4 KiB
Go
/*
|
|
Copyright 2018 the Velero contributors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package actionhelpers
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/pkg/errors"
|
|
rbacv1 "k8s.io/api/rbac/v1"
|
|
rbacbeta "k8s.io/api/rbac/v1beta1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/client-go/kubernetes"
|
|
rbacclient "k8s.io/client-go/kubernetes/typed/rbac/v1"
|
|
rbacbetaclient "k8s.io/client-go/kubernetes/typed/rbac/v1beta1"
|
|
)
|
|
|
|
// ClusterRoleBindingLister allows for listing ClusterRoleBindings in a version-independent way.
|
|
type ClusterRoleBindingLister interface {
|
|
// List returns a slice of ClusterRoleBindings which can represent either v1 or v1beta1 ClusterRoleBindings.
|
|
List() ([]ClusterRoleBinding, error)
|
|
}
|
|
|
|
// noopClusterRoleBindingLister exists to handle clusters where RBAC is disabled.
|
|
type NoopClusterRoleBindingLister struct {
|
|
}
|
|
|
|
func (noop NoopClusterRoleBindingLister) List() ([]ClusterRoleBinding, error) {
|
|
return []ClusterRoleBinding{}, nil
|
|
}
|
|
|
|
type V1ClusterRoleBindingLister struct {
|
|
client rbacclient.ClusterRoleBindingInterface
|
|
}
|
|
|
|
func (v1 V1ClusterRoleBindingLister) List() ([]ClusterRoleBinding, error) {
|
|
crbList, err := v1.client.List(context.TODO(), metav1.ListOptions{})
|
|
if err != nil {
|
|
return nil, errors.WithStack(err)
|
|
}
|
|
var crbs []ClusterRoleBinding
|
|
for _, crb := range crbList.Items {
|
|
crbs = append(crbs, V1ClusterRoleBinding{Crb: crb})
|
|
}
|
|
|
|
return crbs, nil
|
|
}
|
|
|
|
type V1beta1ClusterRoleBindingLister struct {
|
|
client rbacbetaclient.ClusterRoleBindingInterface
|
|
}
|
|
|
|
func (v1beta1 V1beta1ClusterRoleBindingLister) List() ([]ClusterRoleBinding, error) {
|
|
crbList, err := v1beta1.client.List(context.TODO(), metav1.ListOptions{})
|
|
if err != nil {
|
|
return nil, errors.WithStack(err)
|
|
}
|
|
var crbs []ClusterRoleBinding
|
|
for _, crb := range crbList.Items {
|
|
crbs = append(crbs, V1beta1ClusterRoleBinding{Crb: crb})
|
|
}
|
|
|
|
return crbs, nil
|
|
}
|
|
|
|
// NewClusterRoleBindingListerMap creates a map of RBAC version strings to their associated
|
|
// ClusterRoleBindingLister structs.
|
|
// Necessary so that callers to the ClusterRoleBindingLister interfaces don't need the kubernetes.Interface.
|
|
func NewClusterRoleBindingListerMap(clientset kubernetes.Interface) map[string]ClusterRoleBindingLister {
|
|
return map[string]ClusterRoleBindingLister{
|
|
rbacv1.SchemeGroupVersion.Version: V1ClusterRoleBindingLister{client: clientset.RbacV1().ClusterRoleBindings()},
|
|
rbacbeta.SchemeGroupVersion.Version: V1beta1ClusterRoleBindingLister{client: clientset.RbacV1beta1().ClusterRoleBindings()},
|
|
"": NoopClusterRoleBindingLister{},
|
|
}
|
|
}
|
|
|
|
// ClusterRoleBinding abstracts access to ClusterRoleBindings whether they're v1 or v1beta1.
|
|
type ClusterRoleBinding interface {
|
|
// Name returns the name of a ClusterRoleBinding.
|
|
Name() string
|
|
// ServiceAccountSubjects returns the names of subjects that are service accounts in the given namespace.
|
|
ServiceAccountSubjects(namespace string) []string
|
|
// RoleRefName returns the name of a ClusterRoleBinding's RoleRef.
|
|
RoleRefName() string
|
|
}
|
|
|
|
type V1ClusterRoleBinding struct {
|
|
Crb rbacv1.ClusterRoleBinding
|
|
}
|
|
|
|
func (c V1ClusterRoleBinding) Name() string {
|
|
return c.Crb.Name
|
|
}
|
|
|
|
func (c V1ClusterRoleBinding) RoleRefName() string {
|
|
return c.Crb.RoleRef.Name
|
|
}
|
|
|
|
func (c V1ClusterRoleBinding) ServiceAccountSubjects(namespace string) []string {
|
|
var saSubjects []string
|
|
for _, s := range c.Crb.Subjects {
|
|
if s.Kind == rbacv1.ServiceAccountKind && s.Namespace == namespace {
|
|
saSubjects = append(saSubjects, s.Name)
|
|
}
|
|
}
|
|
return saSubjects
|
|
}
|
|
|
|
type V1beta1ClusterRoleBinding struct {
|
|
Crb rbacbeta.ClusterRoleBinding
|
|
}
|
|
|
|
func (c V1beta1ClusterRoleBinding) Name() string {
|
|
return c.Crb.Name
|
|
}
|
|
|
|
func (c V1beta1ClusterRoleBinding) RoleRefName() string {
|
|
return c.Crb.RoleRef.Name
|
|
}
|
|
|
|
func (c V1beta1ClusterRoleBinding) ServiceAccountSubjects(namespace string) []string {
|
|
var saSubjects []string
|
|
for _, s := range c.Crb.Subjects {
|
|
if s.Kind == rbacv1.ServiceAccountKind && s.Namespace == namespace {
|
|
saSubjects = append(saSubjects, s.Name)
|
|
}
|
|
}
|
|
return saSubjects
|
|
}
|