Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

✨ Add installer policy rule generators #1774

Open
wants to merge 5 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
166 changes: 166 additions & 0 deletions internal/operator-controller/rukpak/convert/installer_rbac.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,166 @@
package convert

import (
"fmt"
"slices"
"strings"

rbacv1 "k8s.io/api/rbac/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
"sigs.k8s.io/controller-runtime/pkg/client"

"github.com/operator-framework/operator-controller/internal/shared/util/filter"
slicesutil "github.com/operator-framework/operator-controller/internal/shared/util/slices"
)

var (
unnamedResourceVerbs = []string{"create", "list", "watch"}
namedResourceVerbs = []string{"get", "update", "patch", "delete"}

// clusterScopedResources is a slice of registry+v1 bundle supported cluster scoped resource kinds
clusterScopedResources = []string{
"ClusterRole",
"ClusterRoleBinding",
"PriorityClass",
"ConsoleYAMLSample",
"ConsoleQuickStart",
"ConsoleCLIDownload",
"ConsoleLink",
"CustomResourceDefinition",
}

// clusterScopedResources is a slice of registry+v1 bundle supported namespace scoped resource kinds
namespaceScopedResources = []string{
"Secret",
"ConfigMap",
"ServiceAccount",
"Service",
"Role",
"RoleBinding",
"PrometheusRule",
"ServiceMonitor",
"PodDisruptionBudget",
"VerticalPodAutoscaler",
"Deployment",
}
)

// GenerateResourceManagerClusterRolePerms generates a ClusterRole permissions to manage objs resources. The
// permissions also aggregate any permissions from any ClusterRoles in objs allowing the holder to also assign
// the RBAC therein to another service account. Note: assumes objs have been created by convert.Convert.
func GenerateResourceManagerClusterRolePerms(objs []client.Object) []rbacv1.PolicyRule {
return slices.Concat(
// cluster scoped resource creation and management rules
generatePolicyRules(filter.Filter(objs, isClusterScopedResource)),
// controller rbac scope
collectRBACResourcePolicyRules(filter.Filter(objs, filter.And(isGeneratedResource, isOfKind("ClusterRole")))),
)
}

// GenerateClusterExtensionFinalizerPolicyRule generates a policy rule that allows the holder to update
// finalizer for a ClusterExtension with clusterExtensionName.
func GenerateClusterExtensionFinalizerPolicyRule(clusterExtensionName string) rbacv1.PolicyRule {
return rbacv1.PolicyRule{
APIGroups: []string{"olm.operatorframework.io"},
Resources: []string{"clusterextensions/finalizers"},
Verbs: []string{"update"},
ResourceNames: []string{clusterExtensionName},
}
}

// GenerateResourceManagerRolePerms generates role permissions to manage objs resources in their
// namespaces. The permissions also include any permissions defined in any Roles in objs within the namespace, allowing
// the holder to also assign the RBAC therein to another service account.
// Note: currently assumes objs have been created by convert.Convert.
// The returned Roles will not have set .metadata.name
func GenerateResourceManagerRolePerms(objs []client.Object) map[string][]rbacv1.PolicyRule {
out := map[string][]rbacv1.PolicyRule{}
namespaceScopedObjs := filter.Filter(objs, isNamespaceScopedResource)
for _, obj := range namespaceScopedObjs {
namespace := obj.GetNamespace()
if _, ok := out[namespace]; !ok {
objsInNamespace := filter.Filter(namespaceScopedObjs, isInNamespace(namespace))
out[namespace] = slices.Concat(
// namespace scoped resource creation and management rules
generatePolicyRules(objsInNamespace),
// controller rbac scope
collectRBACResourcePolicyRules(filter.Filter(objsInNamespace, filter.And(isOfKind("Role"), isGeneratedResource))),
)
}
}
return out
}

func generatePolicyRules(objs []client.Object) []rbacv1.PolicyRule {
return slices.Concat(
mapToSlice(slicesutil.GroupBy(objs, groupKind), func(gk schema.GroupKind, resources []client.Object) []rbacv1.PolicyRule {
return []rbacv1.PolicyRule{
newPolicyRule(gk, unnamedResourceVerbs),
newPolicyRule(gk, namedResourceVerbs, slicesutil.Map(resources, toResourceName)...),
}
})...,
)
}

func collectRBACResourcePolicyRules(objs []client.Object) []rbacv1.PolicyRule {
return slices.Concat(slicesutil.Map(objs, func(obj client.Object) []rbacv1.PolicyRule {
if cr, ok := obj.(*rbacv1.ClusterRole); ok {
return cr.Rules
} else if r, ok := obj.(*rbacv1.Role); ok {
return r.Rules
} else {
panic(fmt.Sprintf("unexpected type %T", obj))
}
})...)
}

func newPolicyRule(groupKind schema.GroupKind, verbs []string, resourceNames ...string) rbacv1.PolicyRule {
return rbacv1.PolicyRule{
APIGroups: []string{groupKind.Group},
Resources: []string{fmt.Sprintf("%ss", strings.ToLower(groupKind.Kind))},
Verbs: verbs,
ResourceNames: resourceNames,
}
}

func mapToSlice[K comparable, V any, R any](m map[K]V, fn func(k K, v V) R) []R {
out := make([]R, 0, len(m))
for k, v := range m {
out = append(out, fn(k, v))
}
return out
}

func isClusterScopedResource(o client.Object) bool {
return slices.Contains(clusterScopedResources, o.GetObjectKind().GroupVersionKind().Kind)
}

func isNamespaceScopedResource(o client.Object) bool {
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

since we expect the rendered manifests as input, I'm wondering if we could just check whether .metadata.namespace is set as the discriminant....

return slices.Contains(namespaceScopedResources, o.GetObjectKind().GroupVersionKind().Kind)
}

func isOfKind(kind string) filter.Predicate[client.Object] {
return func(o client.Object) bool {
return o.GetObjectKind().GroupVersionKind().Kind == kind
}
}

func isGeneratedResource(o client.Object) bool {
annotations := o.GetAnnotations()
_, ok := annotations[AnnotationRegistryV1GeneratedManifest]
return ok
}

func isInNamespace(namespace string) filter.Predicate[client.Object] {
return func(o client.Object) bool {
return o.GetNamespace() == namespace
}
}

func groupKind(obj client.Object) schema.GroupKind {
return obj.GetObjectKind().GroupVersionKind().GroupKind()
}

func toResourceName(o client.Object) string {
return o.GetName()
}
Loading
Loading