// Copyright (c) 2021 Gitpod GmbH. All rights reserved. // Licensed under the GNU Affero General Public License (AGPL). // See License.AGPL.txt in the project root for license information. package wsdaemon import ( "fmt" "github.com/gitpod-io/gitpod/installer/pkg/common" "github.com/gitpod-io/gitpod/installer/pkg/config/v1/experimental" rbacv1 "k8s.io/api/rbac/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime" ) func clusterrole(ctx *common.RenderContext) ([]runtime.Object, error) { labels := common.DefaultLabels(Component) var rules []rbacv1.PolicyRule _ = ctx.WithExperimental(func(cfg *experimental.Config) error { if cfg.Common != nil && cfg.Common.UsePodSecurityPolicies { rules = append(rules, rbacv1.PolicyRule{ APIGroups: []string{"policy"}, Resources: []string{"podsecuritypolicies"}, Verbs: []string{"use"}, ResourceNames: []string{ fmt.Sprintf("%s-ns-privileged-unconfined", ctx.Namespace), }, }) } return nil }) return []runtime.Object{ &rbacv1.ClusterRole{ TypeMeta: common.TypeMetaClusterRole, ObjectMeta: metav1.ObjectMeta{ Name: fmt.Sprintf("%s-ns-%s", ctx.Namespace, Component), Labels: labels, }, Rules: append(rules, rbacv1.PolicyRule{ APIGroups: []string{""}, Resources: []string{"nodes"}, Verbs: []string{"get", "list", "update", "patch"}, }, rbacv1.PolicyRule{ APIGroups: []string{""}, Resources: []string{"pods", "services"}, Verbs: []string{"get", "list", "watch"}, }, rbacv1.PolicyRule{ APIGroups: []string{""}, Resources: []string{"pods"}, Verbs: []string{"delete", "update", "patch"}, }, rbacv1.PolicyRule{ APIGroups: []string{"workspace.gitpod.io"}, Resources: []string{"workspaces"}, Verbs: []string{ "get", "list", "watch", }, }, rbacv1.PolicyRule{ APIGroups: []string{"workspace.gitpod.io"}, Resources: []string{"workspaces/status"}, Verbs: []string{ "get", "patch", "update", }, }, ), }, }, nil }