@atomist/sdm
Version:
Atomist Software Delivery Machine SDK
163 lines • 6.55 kB
JavaScript
;
/*
* Copyright © 2020 Atomist, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
Object.defineProperty(exports, "__esModule", { value: true });
exports.clusterRoleBindingTemplate = exports.roleBindingTemplate = exports.upsertRoleBinding = void 0;
const logger_1 = require("@atomist/automation-client/lib/util/logger");
const _ = require("lodash");
const error_1 = require("../support/error");
const retry_1 = require("../support/retry");
const labels_1 = require("./labels");
const metadata_1 = require("./metadata");
const patch_1 = require("./patch");
const request_1 = require("./request");
const resource_1 = require("./resource");
/**
* Create or patch role or cluster rolebinding.
*
* @param req Kubernetes application request
* @return Kubernetes resource spec used to create/patch the resource
*/
async function upsertRoleBinding(req) {
const slug = request_1.appName(req);
if (req.roleSpec.kind === "ClusterRole") {
const spec = await clusterRoleBindingTemplate(req);
try {
await req.clients.rbac.readClusterRoleBinding(spec.metadata.name);
}
catch (e) {
logger_1.logger.debug(`Failed to read cluster role binding ${slug}, creating: ${error_1.k8sErrMsg(e)}`);
logger_1.logger.info(`Creating cluster role binding ${slug} using '${resource_1.logObject(spec)}'`);
await retry_1.logRetry(() => req.clients.rbac.createClusterRoleBinding(spec), `create cluster role binding ${slug}`);
return spec;
}
logger_1.logger.info(`Cluster role binding ${slug} exists, patching using '${resource_1.logObject(spec)}'`);
await retry_1.logRetry(() => req.clients.rbac.patchClusterRoleBinding(spec.metadata.name, spec, undefined, undefined, undefined, undefined, patch_1.patchHeaders(req)), `patch cluster role binding ${slug}`);
return spec;
}
else {
const spec = await roleBindingTemplate(req);
try {
await req.clients.rbac.readNamespacedRoleBinding(spec.metadata.name, spec.metadata.namespace);
}
catch (e) {
logger_1.logger.debug(`Failed to read role binding ${slug}, creating: ${error_1.k8sErrMsg(e)}`);
logger_1.logger.info(`Creating role binding ${slug} using '${resource_1.logObject(spec)}'`);
await retry_1.logRetry(() => req.clients.rbac.createNamespacedRoleBinding(spec.metadata.namespace, spec), `create role binding ${slug}`);
return spec;
}
logger_1.logger.info(`Role binding ${slug} exists, patching using '${resource_1.logObject(spec)}'`);
await retry_1.logRetry(() => req.clients.rbac.patchNamespacedRoleBinding(spec.metadata.name, spec.metadata.namespace, spec, undefined, undefined, undefined, undefined, patch_1.patchHeaders(req)), `patch role binding ${slug}`);
return spec;
}
}
exports.upsertRoleBinding = upsertRoleBinding;
/**
* Create role binding spec for a Kubernetes application. The
* `req.rbac.roleBindingSpec`, if it is not false, is merged into the
* spec created by this function using `lodash.merge(default,
* req.rbac.roleBindingSpec)`.
*
* It is possible to override the role binding name using the
* [[KubernetesApplication.roleBindingSpec]]. If you do this, make
* sure you know what you are doing.
*
* @param req application request
* @return role binding resource specification
*/
async function roleBindingTemplate(req) {
const labels = labels_1.applicationLabels(req);
const metadata = metadata_1.metadataTemplate({
name: req.name,
namespace: req.ns,
labels,
});
const apiVersion = "rbac.authorization.k8s.io/v1";
const kind = "RoleBinding";
const rb = {
apiVersion,
kind,
metadata,
roleRef: {
apiGroup: "rbac.authorization.k8s.io",
kind: "Role",
name: req.name,
},
subjects: [
{
kind: "ServiceAccount",
name: req.name,
},
],
};
if (req.serviceAccountSpec && req.serviceAccountSpec.metadata && req.serviceAccountSpec.metadata.name) {
rb.subjects[0].name = req.serviceAccountSpec.metadata.name;
}
if (req.roleBindingSpec) {
_.merge(rb, req.roleBindingSpec, { apiVersion, kind });
rb.metadata.namespace = req.ns;
}
return rb;
}
exports.roleBindingTemplate = roleBindingTemplate;
/**
* Create cluster role binding spec for a Kubernetes application. The
* `req.rbac.roleBindingSpec` is merged into the
* spec created by this function using `lodash.merge(default,
* req.rbac.roleBindingSpec)`.
*
* It is possible to override the cluster role binding name using the
* [[KubernetesApplication.roleBindingSpec]]. If you do this, make
* sure you know what you are doing.
*
* @param req application request
* @return cluster role binding resource specification
*/
async function clusterRoleBindingTemplate(req) {
const labels = labels_1.applicationLabels(req);
const metadata = metadata_1.metadataTemplate({
name: req.name,
labels,
});
const apiVersion = "rbac.authorization.k8s.io/v1";
const kind = "ClusterRoleBinding";
const rb = {
apiVersion,
kind,
metadata,
roleRef: {
apiGroup: "rbac.authorization.k8s.io",
kind: "ClusterRole",
name: req.name,
},
subjects: [
{
kind: "ServiceAccount",
name: req.name,
namespace: req.ns,
},
],
};
if (req.serviceAccountSpec && req.serviceAccountSpec.metadata && req.serviceAccountSpec.metadata.name) {
rb.subjects[0].name = req.serviceAccountSpec.metadata.name;
}
if (req.roleBindingSpec) {
_.merge(rb, req.roleBindingSpec, { apiVersion, kind });
}
return rb;
}
exports.clusterRoleBindingTemplate = clusterRoleBindingTemplate;
//# sourceMappingURL=roleBinding.js.map