64 lines
1.7 KiB
Go

// Copyright (c) 2021 Gitpod GmbH. All rights reserved.
// Licensed under the GNU Affero General Public License (AGPL).
// See License-AGPL.txt in the project root for license information.
package wsdaemon
import (
"fmt"
"github.com/gitpod-io/gitpod/installer/pkg/common"
"github.com/gitpod-io/gitpod/installer/pkg/config/v1/experimental"
rbacv1 "k8s.io/api/rbac/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
)
func clusterrole(ctx *common.RenderContext) ([]runtime.Object, error) {
labels := common.DefaultLabels(Component)
var rules []rbacv1.PolicyRule
_ = ctx.WithExperimental(func(cfg *experimental.Config) error {
if cfg.Common != nil && cfg.Common.UsePodSecurityPolicies {
rules = append(rules, rbacv1.PolicyRule{
APIGroups: []string{"policy"},
Resources: []string{"podsecuritypolicies"},
Verbs: []string{"use"},
ResourceNames: []string{
fmt.Sprintf("%s-ns-privileged-unconfined", ctx.Namespace),
},
})
}
return nil
})
return []runtime.Object{
&rbacv1.ClusterRole{
TypeMeta: common.TypeMetaClusterRole,
ObjectMeta: metav1.ObjectMeta{
Name: fmt.Sprintf("%s-ns-%s", ctx.Namespace, Component),
Labels: labels,
},
Rules: append(rules,
rbacv1.PolicyRule{
APIGroups: []string{""},
Resources: []string{"nodes"},
Verbs: []string{"get", "list", "update", "patch"},
},
rbacv1.PolicyRule{
APIGroups: []string{""},
Resources: []string{"pods", "services"},
Verbs: []string{"get", "list", "watch"},
},
rbacv1.PolicyRule{
APIGroups: []string{""},
Resources: []string{"pods"},
Verbs: []string{"delete", "update", "patch"},
},
),
},
}, nil
}