mirror of https://github.com/portainer/portainer
162 lines
4.4 KiB
Go
162 lines
4.4 KiB
Go
package cli
|
|
|
|
import (
|
|
"context"
|
|
"strings"
|
|
|
|
models "github.com/portainer/portainer/api/http/models/kubernetes"
|
|
"github.com/portainer/portainer/api/internal/errorlist"
|
|
"github.com/rs/zerolog/log"
|
|
rbacv1 "k8s.io/api/rbac/v1"
|
|
k8serrors "k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
)
|
|
|
|
// GetRoles gets all the roles for either at the cluster level or a given namespace in a k8s endpoint.
|
|
// It returns a list of K8sRole objects.
|
|
func (kcl *KubeClient) GetRoles(namespace string) ([]models.K8sRole, error) {
|
|
if kcl.IsKubeAdmin {
|
|
return kcl.fetchRoles(namespace)
|
|
}
|
|
|
|
return kcl.fetchRolesForNonAdmin(namespace)
|
|
}
|
|
|
|
// fetchRolesForNonAdmin gets all the roles for either at the cluster level or a given namespace in a k8s endpoint.
|
|
// the namespace will be coming from NonAdminNamespaces as non-admin users are restricted to certain namespaces.
|
|
// it returns a list of K8sRole objects.
|
|
func (kcl *KubeClient) fetchRolesForNonAdmin(namespace string) ([]models.K8sRole, error) {
|
|
roles, err := kcl.fetchRoles(namespace)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
nonAdminNamespaceSet := kcl.buildNonAdminNamespacesMap()
|
|
results := make([]models.K8sRole, 0)
|
|
for _, role := range roles {
|
|
if _, ok := nonAdminNamespaceSet[role.Namespace]; ok {
|
|
results = append(results, role)
|
|
}
|
|
}
|
|
|
|
return results, nil
|
|
}
|
|
|
|
// fetchRoles returns a list of all Roles in the specified namespace.
|
|
func (kcl *KubeClient) fetchRoles(namespace string) ([]models.K8sRole, error) {
|
|
roles, err := kcl.cli.RbacV1().Roles(namespace).List(context.TODO(), metav1.ListOptions{})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
results := make([]models.K8sRole, 0)
|
|
for _, role := range roles.Items {
|
|
results = append(results, kcl.parseRole(role))
|
|
}
|
|
|
|
return results, nil
|
|
}
|
|
|
|
// parseRole converts a rbacv1.Role object to a models.K8sRole object.
|
|
func (kcl *KubeClient) parseRole(role rbacv1.Role) models.K8sRole {
|
|
return models.K8sRole{
|
|
Name: role.Name,
|
|
UID: role.UID,
|
|
Namespace: role.Namespace,
|
|
CreationDate: role.CreationTimestamp.Time,
|
|
IsSystem: kcl.isSystemRole(&role),
|
|
}
|
|
}
|
|
|
|
func getPortainerUserDefaultPolicies() []rbacv1.PolicyRule {
|
|
return []rbacv1.PolicyRule{
|
|
{
|
|
Verbs: []string{"list", "get"},
|
|
Resources: []string{"namespaces", "nodes", "endpoints"},
|
|
APIGroups: []string{""},
|
|
},
|
|
{
|
|
Verbs: []string{"list"},
|
|
Resources: []string{"storageclasses"},
|
|
APIGroups: []string{"storage.k8s.io"},
|
|
},
|
|
{
|
|
Verbs: []string{"list", "get"},
|
|
Resources: []string{"namespaces", "pods", "nodes"},
|
|
APIGroups: []string{"metrics.k8s.io"},
|
|
},
|
|
{
|
|
Verbs: []string{"list"},
|
|
Resources: []string{"ingressclasses"},
|
|
APIGroups: []string{"networking.k8s.io"},
|
|
},
|
|
}
|
|
}
|
|
|
|
func (kcl *KubeClient) upsertPortainerK8sClusterRoles() error {
|
|
clusterRole := &rbacv1.ClusterRole{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: portainerUserCRName,
|
|
},
|
|
Rules: getPortainerUserDefaultPolicies(),
|
|
}
|
|
|
|
_, err := kcl.cli.RbacV1().ClusterRoles().Create(context.TODO(), clusterRole, metav1.CreateOptions{})
|
|
if err != nil {
|
|
if k8serrors.IsAlreadyExists(err) {
|
|
_, err = kcl.cli.RbacV1().ClusterRoles().Update(context.TODO(), clusterRole, metav1.UpdateOptions{})
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func getPortainerDefaultK8sRoleNames() []string {
|
|
return []string{
|
|
string(portainerUserCRName),
|
|
}
|
|
}
|
|
|
|
func (kcl *KubeClient) isSystemRole(role *rbacv1.Role) bool {
|
|
if strings.HasPrefix(role.Name, "system:") {
|
|
return true
|
|
}
|
|
|
|
return kcl.isSystemNamespace(role.Namespace)
|
|
}
|
|
|
|
// DeleteRoles processes a K8sServiceDeleteRequest by deleting each role
|
|
// in its given namespace.
|
|
func (kcl *KubeClient) DeleteRoles(reqs models.K8sRoleDeleteRequests) error {
|
|
var errors []error
|
|
for namespace := range reqs {
|
|
for _, name := range reqs[namespace] {
|
|
client := kcl.cli.RbacV1().Roles(namespace)
|
|
|
|
role, err := client.Get(context.Background(), name, v1.GetOptions{})
|
|
if err != nil {
|
|
if k8serrors.IsNotFound(err) {
|
|
continue
|
|
}
|
|
|
|
// This is a more serious error to do with the client so we return right away
|
|
return err
|
|
}
|
|
|
|
if kcl.isSystemRole(role) {
|
|
log.Error().Str("role_name", name).Msg("ignoring delete of 'system' role, not allowed")
|
|
}
|
|
|
|
if err := client.Delete(context.TODO(), name, metav1.DeleteOptions{}); err != nil {
|
|
errors = append(errors, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
return errorlist.Combine(errors)
|
|
}
|