123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403 |
- /*
- Copyright 2017 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package create
- import (
- "fmt"
- "strings"
- "github.com/spf13/cobra"
- rbacv1 "k8s.io/api/rbac/v1"
- "k8s.io/apimachinery/pkg/api/meta"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/runtime"
- "k8s.io/apimachinery/pkg/runtime/schema"
- "k8s.io/apimachinery/pkg/util/sets"
- "k8s.io/cli-runtime/pkg/genericclioptions"
- clientgorbacv1 "k8s.io/client-go/kubernetes/typed/rbac/v1"
- cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
- "k8s.io/kubernetes/pkg/kubectl/scheme"
- "k8s.io/kubernetes/pkg/kubectl/util/i18n"
- "k8s.io/kubernetes/pkg/kubectl/util/templates"
- )
- var (
- roleLong = templates.LongDesc(i18n.T(`
- Create a role with single rule.`))
- roleExample = templates.Examples(i18n.T(`
- # Create a Role named "pod-reader" that allows user to perform "get", "watch" and "list" on pods
- kubectl create role pod-reader --verb=get --verb=list --verb=watch --resource=pods
- # Create a Role named "pod-reader" with ResourceName specified
- kubectl create role pod-reader --verb=get --resource=pods --resource-name=readablepod --resource-name=anotherpod
- # Create a Role named "foo" with API Group specified
- kubectl create role foo --verb=get,list,watch --resource=rs.extensions
- # Create a Role named "foo" with SubResource specified
- kubectl create role foo --verb=get,list,watch --resource=pods,pods/status`))
- // Valid resource verb list for validation.
- validResourceVerbs = []string{"*", "get", "delete", "list", "create", "update", "patch", "watch", "proxy", "deletecollection", "use", "bind", "escalate", "impersonate"}
- // Specialized verbs and GroupResources
- specialVerbs = map[string][]schema.GroupResource{
- "use": {
- {
- Group: "extensions",
- Resource: "podsecuritypolicies",
- },
- },
- "bind": {
- {
- Group: "rbac.authorization.k8s.io",
- Resource: "roles",
- },
- {
- Group: "rbac.authorization.k8s.io",
- Resource: "clusterroles",
- },
- },
- "escalate": {
- {
- Group: "rbac.authorization.k8s.io",
- Resource: "roles",
- },
- {
- Group: "rbac.authorization.k8s.io",
- Resource: "clusterroles",
- },
- },
- "impersonate": {
- {
- Group: "",
- Resource: "users",
- },
- {
- Group: "",
- Resource: "serviceaccounts",
- },
- {
- Group: "",
- Resource: "groups",
- },
- {
- Group: "authentication.k8s.io",
- Resource: "userextras",
- },
- },
- }
- )
- // ResourceOptions holds the related options for '--resource' option
- type ResourceOptions struct {
- Group string
- Resource string
- SubResource string
- }
- // CreateRoleOptions holds the options for 'create role' sub command
- type CreateRoleOptions struct {
- PrintFlags *genericclioptions.PrintFlags
- Name string
- Verbs []string
- Resources []ResourceOptions
- ResourceNames []string
- DryRun bool
- OutputFormat string
- Namespace string
- Client clientgorbacv1.RbacV1Interface
- Mapper meta.RESTMapper
- PrintObj func(obj runtime.Object) error
- genericclioptions.IOStreams
- }
- // NewCreateRoleOptions returns an initialized CreateRoleOptions instance
- func NewCreateRoleOptions(ioStreams genericclioptions.IOStreams) *CreateRoleOptions {
- return &CreateRoleOptions{
- PrintFlags: genericclioptions.NewPrintFlags("created").WithTypeSetter(scheme.Scheme),
- IOStreams: ioStreams,
- }
- }
- // NewCmdCreateRole returnns an initialized Command instance for 'create role' sub command
- func NewCmdCreateRole(f cmdutil.Factory, ioStreams genericclioptions.IOStreams) *cobra.Command {
- o := NewCreateRoleOptions(ioStreams)
- cmd := &cobra.Command{
- Use: "role NAME --verb=verb --resource=resource.group/subresource [--resource-name=resourcename] [--dry-run]",
- DisableFlagsInUseLine: true,
- Short: roleLong,
- Long: roleLong,
- Example: roleExample,
- Run: func(cmd *cobra.Command, args []string) {
- cmdutil.CheckErr(o.Complete(f, cmd, args))
- cmdutil.CheckErr(o.Validate())
- cmdutil.CheckErr(o.RunCreateRole())
- },
- }
- o.PrintFlags.AddFlags(cmd)
- cmdutil.AddApplyAnnotationFlags(cmd)
- cmdutil.AddValidateFlags(cmd)
- cmdutil.AddDryRunFlag(cmd)
- cmd.Flags().StringSliceVar(&o.Verbs, "verb", o.Verbs, "Verb that applies to the resources contained in the rule")
- cmd.Flags().StringSlice("resource", []string{}, "Resource that the rule applies to")
- cmd.Flags().StringArrayVar(&o.ResourceNames, "resource-name", o.ResourceNames, "Resource in the white list that the rule applies to, repeat this flag for multiple items")
- return cmd
- }
- // Complete completes all the required options
- func (o *CreateRoleOptions) Complete(f cmdutil.Factory, cmd *cobra.Command, args []string) error {
- name, err := NameFromCommandArgs(cmd, args)
- if err != nil {
- return err
- }
- o.Name = name
- // Remove duplicate verbs.
- verbs := []string{}
- for _, v := range o.Verbs {
- // VerbAll respresents all kinds of verbs.
- if v == "*" {
- verbs = []string{"*"}
- break
- }
- if !arrayContains(verbs, v) {
- verbs = append(verbs, v)
- }
- }
- o.Verbs = verbs
- // Support resource.group pattern. If no API Group specified, use "" as core API Group.
- // e.g. --resource=pods,deployments.extensions
- resources := cmdutil.GetFlagStringSlice(cmd, "resource")
- for _, r := range resources {
- sections := strings.SplitN(r, "/", 2)
- resource := &ResourceOptions{}
- if len(sections) == 2 {
- resource.SubResource = sections[1]
- }
- parts := strings.SplitN(sections[0], ".", 2)
- if len(parts) == 2 {
- resource.Group = parts[1]
- }
- resource.Resource = parts[0]
- if resource.Resource == "*" && len(parts) == 1 && len(sections) == 1 {
- o.Resources = []ResourceOptions{*resource}
- break
- }
- o.Resources = append(o.Resources, *resource)
- }
- // Remove duplicate resource names.
- resourceNames := []string{}
- for _, n := range o.ResourceNames {
- if !arrayContains(resourceNames, n) {
- resourceNames = append(resourceNames, n)
- }
- }
- o.ResourceNames = resourceNames
- // Complete other options for Run.
- o.Mapper, err = f.ToRESTMapper()
- if err != nil {
- return err
- }
- o.DryRun = cmdutil.GetDryRunFlag(cmd)
- o.OutputFormat = cmdutil.GetFlagString(cmd, "output")
- if o.DryRun {
- o.PrintFlags.Complete("%s (dry run)")
- }
- printer, err := o.PrintFlags.ToPrinter()
- if err != nil {
- return err
- }
- o.PrintObj = func(obj runtime.Object) error {
- return printer.PrintObj(obj, o.Out)
- }
- o.Namespace, _, err = f.ToRawKubeConfigLoader().Namespace()
- if err != nil {
- return err
- }
- clientset, err := f.KubernetesClientSet()
- if err != nil {
- return err
- }
- o.Client = clientset.RbacV1()
- return nil
- }
- // Validate makes sure there is no discrepency in provided option values
- func (o *CreateRoleOptions) Validate() error {
- if o.Name == "" {
- return fmt.Errorf("name must be specified")
- }
- // validate verbs.
- if len(o.Verbs) == 0 {
- return fmt.Errorf("at least one verb must be specified")
- }
- for _, v := range o.Verbs {
- if !arrayContains(validResourceVerbs, v) {
- return fmt.Errorf("invalid verb: '%s'", v)
- }
- }
- // validate resources.
- if len(o.Resources) == 0 {
- return fmt.Errorf("at least one resource must be specified")
- }
- return o.validateResource()
- }
- func (o *CreateRoleOptions) validateResource() error {
- for _, r := range o.Resources {
- if len(r.Resource) == 0 {
- return fmt.Errorf("resource must be specified if apiGroup/subresource specified")
- }
- if r.Resource == "*" {
- return nil
- }
- resource := schema.GroupVersionResource{Resource: r.Resource, Group: r.Group}
- groupVersionResource, err := o.Mapper.ResourceFor(schema.GroupVersionResource{Resource: r.Resource, Group: r.Group})
- if err == nil {
- resource = groupVersionResource
- }
- for _, v := range o.Verbs {
- if groupResources, ok := specialVerbs[v]; ok {
- match := false
- for _, extra := range groupResources {
- if resource.Resource == extra.Resource && resource.Group == extra.Group {
- match = true
- err = nil
- break
- }
- }
- if !match {
- return fmt.Errorf("can not perform '%s' on '%s' in group '%s'", v, resource.Resource, resource.Group)
- }
- }
- }
- if err != nil {
- return err
- }
- }
- return nil
- }
- // RunCreateRole performs the execution of 'create role' sub command
- func (o *CreateRoleOptions) RunCreateRole() error {
- role := &rbacv1.Role{
- // this is ok because we know exactly how we want to be serialized
- TypeMeta: metav1.TypeMeta{APIVersion: rbacv1.SchemeGroupVersion.String(), Kind: "Role"},
- }
- role.Name = o.Name
- rules, err := generateResourcePolicyRules(o.Mapper, o.Verbs, o.Resources, o.ResourceNames, []string{})
- if err != nil {
- return err
- }
- role.Rules = rules
- // Create role.
- if !o.DryRun {
- role, err = o.Client.Roles(o.Namespace).Create(role)
- if err != nil {
- return err
- }
- }
- return o.PrintObj(role)
- }
- func arrayContains(s []string, e string) bool {
- for _, a := range s {
- if a == e {
- return true
- }
- }
- return false
- }
- func generateResourcePolicyRules(mapper meta.RESTMapper, verbs []string, resources []ResourceOptions, resourceNames []string, nonResourceURLs []string) ([]rbacv1.PolicyRule, error) {
- // groupResourceMapping is a apigroup-resource map. The key of this map is api group, while the value
- // is a string array of resources under this api group.
- // E.g. groupResourceMapping = {"extensions": ["replicasets", "deployments"], "batch":["jobs"]}
- groupResourceMapping := map[string][]string{}
- // This loop does the following work:
- // 1. Constructs groupResourceMapping based on input resources.
- // 2. Prevents pointing to non-existent resources.
- // 3. Transfers resource short name to long name. E.g. rs.extensions is transferred to replicasets.extensions
- for _, r := range resources {
- resource := schema.GroupVersionResource{Resource: r.Resource, Group: r.Group}
- groupVersionResource, err := mapper.ResourceFor(schema.GroupVersionResource{Resource: r.Resource, Group: r.Group})
- if err == nil {
- resource = groupVersionResource
- }
- if len(r.SubResource) > 0 {
- resource.Resource = resource.Resource + "/" + r.SubResource
- }
- if !arrayContains(groupResourceMapping[resource.Group], resource.Resource) {
- groupResourceMapping[resource.Group] = append(groupResourceMapping[resource.Group], resource.Resource)
- }
- }
- // Create separate rule for each of the api group.
- rules := []rbacv1.PolicyRule{}
- for _, g := range sets.StringKeySet(groupResourceMapping).List() {
- rule := rbacv1.PolicyRule{}
- rule.Verbs = verbs
- rule.Resources = groupResourceMapping[g]
- rule.APIGroups = []string{g}
- rule.ResourceNames = resourceNames
- rules = append(rules, rule)
- }
- if len(nonResourceURLs) > 0 {
- rule := rbacv1.PolicyRule{}
- rule.Verbs = verbs
- rule.NonResourceURLs = nonResourceURLs
- rules = append(rules, rule)
- }
- return rules, nil
- }
|