|  | // Copyright 2020 The Monogon Project Authors. | 
|  | // | 
|  | // SPDX-License-Identifier: Apache-2.0 | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //     http://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  |  | 
|  | package reconciler | 
|  |  | 
|  | import ( | 
|  | "context" | 
|  |  | 
|  | rbac "k8s.io/api/rbac/v1" | 
|  | meta "k8s.io/apimachinery/pkg/apis/meta/v1" | 
|  | "k8s.io/client-go/kubernetes" | 
|  | ) | 
|  |  | 
|  | var ( | 
|  | clusterRolePSPDefault                    = builtinRBACName("psp-default") | 
|  | clusterRoleBindingDefaultPSP             = builtinRBACName("default-psp-for-sa") | 
|  | clusterRoleBindingAPIServerKubeletClient = builtinRBACName("apiserver-kubelet-client") | 
|  | clusterRoleBindingOwnerAdmin             = builtinRBACName("owner-admin") | 
|  | ) | 
|  |  | 
|  | type resourceClusterRoles struct { | 
|  | kubernetes.Interface | 
|  | } | 
|  |  | 
|  | func (r resourceClusterRoles) List(ctx context.Context) ([]string, error) { | 
|  | res, err := r.RbacV1().ClusterRoles().List(ctx, listBuiltins) | 
|  | if err != nil { | 
|  | return nil, err | 
|  | } | 
|  | objs := make([]string, len(res.Items)) | 
|  | for i, el := range res.Items { | 
|  | objs[i] = el.ObjectMeta.Name | 
|  | } | 
|  | return objs, nil | 
|  | } | 
|  |  | 
|  | func (r resourceClusterRoles) Create(ctx context.Context, el interface{}) error { | 
|  | _, err := r.RbacV1().ClusterRoles().Create(ctx, el.(*rbac.ClusterRole), meta.CreateOptions{}) | 
|  | return err | 
|  | } | 
|  |  | 
|  | func (r resourceClusterRoles) Delete(ctx context.Context, name string) error { | 
|  | return r.RbacV1().ClusterRoles().Delete(ctx, name, meta.DeleteOptions{}) | 
|  | } | 
|  |  | 
|  | func (r resourceClusterRoles) Expected() map[string]interface{} { | 
|  | return map[string]interface{}{ | 
|  | clusterRolePSPDefault: &rbac.ClusterRole{ | 
|  | ObjectMeta: meta.ObjectMeta{ | 
|  | Name:   clusterRolePSPDefault, | 
|  | Labels: builtinLabels(nil), | 
|  | Annotations: map[string]string{ | 
|  | "kubernetes.io/description": "This role grants access to the \"default\" PSP.", | 
|  | }, | 
|  | }, | 
|  | Rules: []rbac.PolicyRule{ | 
|  | { | 
|  | APIGroups:     []string{"policy"}, | 
|  | Resources:     []string{"podsecuritypolicies"}, | 
|  | ResourceNames: []string{"default"}, | 
|  | Verbs:         []string{"use"}, | 
|  | }, | 
|  | }, | 
|  | }, | 
|  | } | 
|  | } | 
|  |  | 
|  | type resourceClusterRoleBindings struct { | 
|  | kubernetes.Interface | 
|  | } | 
|  |  | 
|  | func (r resourceClusterRoleBindings) List(ctx context.Context) ([]string, error) { | 
|  | res, err := r.RbacV1().ClusterRoleBindings().List(ctx, listBuiltins) | 
|  | if err != nil { | 
|  | return nil, err | 
|  | } | 
|  | objs := make([]string, len(res.Items)) | 
|  | for i, el := range res.Items { | 
|  | objs[i] = el.ObjectMeta.Name | 
|  | } | 
|  | return objs, nil | 
|  | } | 
|  |  | 
|  | func (r resourceClusterRoleBindings) Create(ctx context.Context, el interface{}) error { | 
|  | _, err := r.RbacV1().ClusterRoleBindings().Create(ctx, el.(*rbac.ClusterRoleBinding), meta.CreateOptions{}) | 
|  | return err | 
|  | } | 
|  |  | 
|  | func (r resourceClusterRoleBindings) Delete(ctx context.Context, name string) error { | 
|  | return r.RbacV1().ClusterRoleBindings().Delete(ctx, name, meta.DeleteOptions{}) | 
|  | } | 
|  |  | 
|  | func (r resourceClusterRoleBindings) Expected() map[string]interface{} { | 
|  | return map[string]interface{}{ | 
|  | clusterRoleBindingDefaultPSP: &rbac.ClusterRoleBinding{ | 
|  | ObjectMeta: meta.ObjectMeta{ | 
|  | Name:   clusterRoleBindingDefaultPSP, | 
|  | Labels: builtinLabels(nil), | 
|  | Annotations: map[string]string{ | 
|  | "kubernetes.io/description": "This binding grants every service account access to the \"default\" PSP. " + | 
|  | "Creation of Pods is still restricted by other RBAC roles. Otherwise no pods (unprivileged or not) " + | 
|  | "can be created.", | 
|  | }, | 
|  | }, | 
|  | RoleRef: rbac.RoleRef{ | 
|  | APIGroup: rbac.GroupName, | 
|  | Kind:     "ClusterRole", | 
|  | Name:     clusterRolePSPDefault, | 
|  | }, | 
|  | Subjects: []rbac.Subject{ | 
|  | { | 
|  | APIGroup: rbac.GroupName, | 
|  | Kind:     "Group", | 
|  | Name:     "system:serviceaccounts", | 
|  | }, | 
|  | }, | 
|  | }, | 
|  | clusterRoleBindingAPIServerKubeletClient: &rbac.ClusterRoleBinding{ | 
|  | ObjectMeta: meta.ObjectMeta{ | 
|  | Name:   clusterRoleBindingAPIServerKubeletClient, | 
|  | Labels: builtinLabels(nil), | 
|  | Annotations: map[string]string{ | 
|  | "kubernetes.io/description": "This binding grants the apiserver access to the kubelets. This enables " + | 
|  | "lots of built-in functionality like reading logs or forwarding ports via the API.", | 
|  | }, | 
|  | }, | 
|  | RoleRef: rbac.RoleRef{ | 
|  | APIGroup: rbac.GroupName, | 
|  | Kind:     "ClusterRole", | 
|  | Name:     "system:kubelet-api-admin", | 
|  | }, | 
|  | Subjects: []rbac.Subject{ | 
|  | { | 
|  | APIGroup: rbac.GroupName, | 
|  | Kind:     "User", | 
|  | // TODO(q3k): describe this name's contract, or unify with whatever creates this. | 
|  | Name: "metropolis:apiserver-kubelet-client", | 
|  | }, | 
|  | }, | 
|  | }, | 
|  | clusterRoleBindingOwnerAdmin: &rbac.ClusterRoleBinding{ | 
|  | ObjectMeta: meta.ObjectMeta{ | 
|  | Name:   clusterRoleBindingOwnerAdmin, | 
|  | Labels: builtinLabels(nil), | 
|  | Annotations: map[string]string{ | 
|  | "kubernetes.io/description": "This binding grants the Metropolis Cluster owner access to the " + | 
|  | "cluster-admin role on Kubernetes.", | 
|  | }, | 
|  | }, | 
|  | RoleRef: rbac.RoleRef{ | 
|  | APIGroup: rbac.GroupName, | 
|  | Kind:     "ClusterRole", | 
|  | Name:     "cluster-admin", | 
|  | }, | 
|  | Subjects: []rbac.Subject{ | 
|  | { | 
|  | APIGroup: rbac.GroupName, | 
|  | Kind:     "User", | 
|  | Name:     "owner", | 
|  | }, | 
|  | }, | 
|  | }, | 
|  | } | 
|  | } |