forked from gardener/gardener
-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathadd.go
More file actions
128 lines (108 loc) · 4.69 KB
/
add.go
File metadata and controls
128 lines (108 loc) · 4.69 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
// SPDX-FileCopyrightText: SAP SE or an SAP affiliate company and Gardener contributors
//
// SPDX-License-Identifier: Apache-2.0
package extensionclusterrole
import (
"context"
"encoding/json"
"fmt"
"strings"
"github.com/go-logr/logr"
corev1 "k8s.io/api/core/v1"
rbacv1 "k8s.io/api/rbac/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels"
"k8s.io/apimachinery/pkg/selection"
"k8s.io/apimachinery/pkg/types"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
"sigs.k8s.io/controller-runtime/pkg/builder"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/controller"
"sigs.k8s.io/controller-runtime/pkg/handler"
"sigs.k8s.io/controller-runtime/pkg/manager"
"sigs.k8s.io/controller-runtime/pkg/predicate"
"sigs.k8s.io/controller-runtime/pkg/reconcile"
v1beta1constants "github.com/gardener/gardener/pkg/apis/core/v1beta1/constants"
"github.com/gardener/gardener/pkg/utils"
gardenerutils "github.com/gardener/gardener/pkg/utils/gardener"
)
// ControllerName is the name of this controller.
const ControllerName = "controllerregistration-extension-clusterrole"
var labelSelectorPredicate predicate.Predicate
func init() {
var err error
labelSelectorPredicate, err = predicate.LabelSelectorPredicate(metav1.LabelSelector{
MatchExpressions: []metav1.LabelSelectorRequirement{{
Key: v1beta1constants.LabelAuthorizationCustomExtensionsPermissions,
Operator: metav1.LabelSelectorOpIn,
Values: []string{"true"},
}},
})
utilruntime.Must(err)
}
// AddToManager adds Reconciler to the given manager.
func (r *Reconciler) AddToManager(mgr manager.Manager) error {
if r.Client == nil {
r.Client = mgr.GetClient()
}
clusterRole := &metav1.PartialObjectMetadata{}
clusterRole.SetGroupVersionKind(rbacv1.SchemeGroupVersion.WithKind("ClusterRole"))
serviceAccount := &metav1.PartialObjectMetadata{}
serviceAccount.SetGroupVersionKind(corev1.SchemeGroupVersion.WithKind("ServiceAccount"))
return builder.
ControllerManagedBy(mgr).
Named(ControllerName).
For(clusterRole, builder.WithPredicates(labelSelectorPredicate)).
WithOptions(controller.Options{MaxConcurrentReconciles: 5}).
Watches(
serviceAccount,
handler.EnqueueRequestsFromMapFunc(r.MapToMatchingClusterRoles(mgr.GetLogger().WithValues("controller", ControllerName))),
builder.WithPredicates(r.ServiceAccountPredicate()),
).
Complete(r)
}
// ServiceAccountPredicate returns true when the namespace is prefixed with `seed-`.
func (r *Reconciler) ServiceAccountPredicate() predicate.Predicate {
return predicate.NewPredicateFuncs(func(obj client.Object) bool {
return strings.HasPrefix(obj.GetNamespace(), gardenerutils.SeedNamespaceNamePrefix)
})
}
// MapToMatchingClusterRoles returns reconcile.Request objects for all ClusterRoles whose service account selector
// matches the labels of the given service account object.
func (r *Reconciler) MapToMatchingClusterRoles(log logr.Logger) handler.MapFunc {
return func(ctx context.Context, serviceAccount client.Object) []reconcile.Request {
clusterRoleList := &metav1.PartialObjectMetadataList{}
clusterRoleList.SetGroupVersionKind(rbacv1.SchemeGroupVersion.WithKind("ClusterRoleList"))
if err := r.Client.List(ctx, clusterRoleList, client.MatchingLabelsSelector{Selector: labels.NewSelector().Add(utils.MustNewRequirement(v1beta1constants.LabelAuthorizationCustomExtensionsPermissions, selection.In, "true"))}); err != nil {
log.Error(err, "Failed to list ClusterRoles")
return nil
}
var requests []reconcile.Request
for _, clusterRole := range clusterRoleList.Items {
labelSelector, err := clusterRoleServiceAccountLabelSelectorToSelector(clusterRole.Annotations)
if err != nil {
log.Error(err, "Failed parsing label selector", "clusterRoleName", clusterRole.Name)
continue
}
if labelSelector.Matches(labels.Set(serviceAccount.GetLabels())) {
requests = append(requests, reconcile.Request{NamespacedName: types.NamespacedName{Name: clusterRole.Name}})
}
}
return requests
}
}
func clusterRoleServiceAccountLabelSelectorToSelector(annotations map[string]string) (labels.Selector, error) {
selectorJSON, ok := annotations[v1beta1constants.LabelAuthorizationExtensionsServiceAccountSelector]
if !ok {
return nil, fmt.Errorf("no service account selector annotations present")
}
var selector metav1.LabelSelector
if err := json.Unmarshal([]byte(selectorJSON), &selector); err != nil {
return nil, fmt.Errorf("failed unmarshalling extensions service account selector %s: %w", selectorJSON, err)
}
labelSelector, err := metav1.LabelSelectorAsSelector(&selector)
if err != nil {
return nil, fmt.Errorf("failed parsing label selector %s: %w", selectorJSON, err)
}
return labelSelector, nil
}