cdk8s-plus-31 2.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.backportrc.json +17 -0
- package/.jsii +90235 -0
- package/CODE_OF_CONDUCT.md +3 -0
- package/CONTRIBUTING.md +185 -0
- package/DCO +34 -0
- package/LICENSE +202 -0
- package/NOTICE +1 -0
- package/OWNERS.md +5 -0
- package/README.md +32 -0
- package/SECURITY.md +5 -0
- package/cdk8s.yaml +8 -0
- package/docs/java.md +23855 -0
- package/docs/plus/config-map.md +98 -0
- package/docs/plus/container.md +133 -0
- package/docs/plus/cronjob.md +67 -0
- package/docs/plus/deployment.md +232 -0
- package/docs/plus/horizontal-pod-autoscaler.md +226 -0
- package/docs/plus/ingress.md +68 -0
- package/docs/plus/job.md +48 -0
- package/docs/plus/namespace.md +58 -0
- package/docs/plus/network-policy.md +341 -0
- package/docs/plus/pod.md +455 -0
- package/docs/plus/pv.md +82 -0
- package/docs/plus/pvc.md +77 -0
- package/docs/plus/rbac.md +104 -0
- package/docs/plus/secret.md +32 -0
- package/docs/plus/service-account.md +35 -0
- package/docs/plus/service.md +41 -0
- package/docs/plus/volume.md +38 -0
- package/docs/python.md +26079 -0
- package/docs/typescript.md +19565 -0
- package/git-hooks/README.md +9 -0
- package/git-hooks/prepare-commit-msg +18 -0
- package/git-hooks/setup.sh +10 -0
- package/lib/_action.d.ts +21 -0
- package/lib/_action.js +32 -0
- package/lib/api-resource.d.ts +298 -0
- package/lib/api-resource.js +430 -0
- package/lib/base.d.ts +79 -0
- package/lib/base.js +92 -0
- package/lib/config-map.d.ts +126 -0
- package/lib/config-map.js +159 -0
- package/lib/container.d.ts +1057 -0
- package/lib/container.js +845 -0
- package/lib/cron-job.d.ts +138 -0
- package/lib/cron-job.js +103 -0
- package/lib/daemon-set.d.ts +45 -0
- package/lib/daemon-set.js +55 -0
- package/lib/deployment.d.ts +223 -0
- package/lib/deployment.js +214 -0
- package/lib/handler.d.ts +62 -0
- package/lib/handler.js +54 -0
- package/lib/horizontal-pod-autoscaler.d.ts +500 -0
- package/lib/horizontal-pod-autoscaler.js +569 -0
- package/lib/imports/k8s.d.ts +21534 -0
- package/lib/imports/k8s.js +16496 -0
- package/lib/index.d.ts +26 -0
- package/lib/index.js +39 -0
- package/lib/ingress.d.ts +230 -0
- package/lib/ingress.js +246 -0
- package/lib/job.d.ts +64 -0
- package/lib/job.js +54 -0
- package/lib/namespace.d.ts +128 -0
- package/lib/namespace.js +109 -0
- package/lib/network-policy.d.ts +311 -0
- package/lib/network-policy.js +344 -0
- package/lib/pod.d.ts +1080 -0
- package/lib/pod.js +1139 -0
- package/lib/probe.d.ts +141 -0
- package/lib/probe.js +77 -0
- package/lib/pv.d.ts +375 -0
- package/lib/pv.js +273 -0
- package/lib/pvc.d.ts +163 -0
- package/lib/pvc.js +152 -0
- package/lib/role-binding.d.ts +138 -0
- package/lib/role-binding.js +165 -0
- package/lib/role.d.ts +268 -0
- package/lib/role.js +401 -0
- package/lib/secret.d.ts +195 -0
- package/lib/secret.js +185 -0
- package/lib/service-account.d.ts +83 -0
- package/lib/service-account.js +105 -0
- package/lib/service.d.ts +289 -0
- package/lib/service.js +182 -0
- package/lib/stateful-set.d.ts +169 -0
- package/lib/stateful-set.js +174 -0
- package/lib/utils.d.ts +4 -0
- package/lib/utils.js +34 -0
- package/lib/volume.d.ts +573 -0
- package/lib/volume.js +371 -0
- package/lib/workload.d.ts +121 -0
- package/lib/workload.js +122 -0
- package/node_modules/balanced-match/.github/FUNDING.yml +2 -0
- package/node_modules/balanced-match/LICENSE.md +21 -0
- package/node_modules/balanced-match/README.md +97 -0
- package/node_modules/balanced-match/index.js +62 -0
- package/node_modules/balanced-match/package.json +48 -0
- package/node_modules/concat-map/.travis.yml +4 -0
- package/node_modules/concat-map/LICENSE +18 -0
- package/node_modules/concat-map/README.markdown +62 -0
- package/node_modules/concat-map/example/map.js +6 -0
- package/node_modules/concat-map/index.js +13 -0
- package/node_modules/concat-map/package.json +43 -0
- package/node_modules/concat-map/test/map.js +39 -0
- package/node_modules/minimatch/LICENSE +15 -0
- package/node_modules/minimatch/README.md +230 -0
- package/node_modules/minimatch/minimatch.js +947 -0
- package/node_modules/minimatch/node_modules/brace-expansion/LICENSE +21 -0
- package/node_modules/minimatch/node_modules/brace-expansion/README.md +129 -0
- package/node_modules/minimatch/node_modules/brace-expansion/index.js +201 -0
- package/node_modules/minimatch/node_modules/brace-expansion/package.json +47 -0
- package/node_modules/minimatch/package.json +33 -0
- package/package.json +186 -0
- package/rotate.md +84 -0
package/lib/role.js
ADDED
|
@@ -0,0 +1,401 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var _a, _b;
|
|
3
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
4
|
+
exports.ClusterRole = exports.Role = void 0;
|
|
5
|
+
const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
|
|
6
|
+
const cdk8s_1 = require("cdk8s");
|
|
7
|
+
const constructs_1 = require("constructs");
|
|
8
|
+
const base = require("./base");
|
|
9
|
+
const k8s = require("./imports/k8s");
|
|
10
|
+
const rb = require("./role-binding");
|
|
11
|
+
const utils_1 = require("./utils");
|
|
12
|
+
class ImportedRole extends constructs_1.Construct {
|
|
13
|
+
constructor(scope, id, name) {
|
|
14
|
+
super(scope, id);
|
|
15
|
+
this.resourceType = 'roles';
|
|
16
|
+
this._name = name;
|
|
17
|
+
}
|
|
18
|
+
get name() {
|
|
19
|
+
return this._name;
|
|
20
|
+
}
|
|
21
|
+
get apiVersion() {
|
|
22
|
+
return k8s.KubeRole.GVK.apiVersion;
|
|
23
|
+
}
|
|
24
|
+
get apiGroup() {
|
|
25
|
+
return 'rbac.authorization.k8s.io';
|
|
26
|
+
}
|
|
27
|
+
get kind() {
|
|
28
|
+
return k8s.KubeRole.GVK.kind;
|
|
29
|
+
}
|
|
30
|
+
get resourceName() {
|
|
31
|
+
return this.name;
|
|
32
|
+
}
|
|
33
|
+
}
|
|
34
|
+
/**
|
|
35
|
+
* Role is a namespaced, logical grouping of PolicyRules that can be referenced
|
|
36
|
+
* as a unit by a RoleBinding.
|
|
37
|
+
*/
|
|
38
|
+
class Role extends base.Resource {
|
|
39
|
+
constructor(scope, id, props = {}) {
|
|
40
|
+
super(scope, id);
|
|
41
|
+
this.resourceType = 'roles';
|
|
42
|
+
this._rules = [];
|
|
43
|
+
this.apiObject = new k8s.KubeRole(this, 'Resource', {
|
|
44
|
+
metadata: props.metadata,
|
|
45
|
+
rules: cdk8s_1.Lazy.any({ produce: () => this.synthesizeRules() }),
|
|
46
|
+
});
|
|
47
|
+
for (const rule of props.rules ?? []) {
|
|
48
|
+
this.allow(rule.verbs, ...rule.resources);
|
|
49
|
+
}
|
|
50
|
+
}
|
|
51
|
+
/**
|
|
52
|
+
* Imports a role from the cluster as a reference.
|
|
53
|
+
*/
|
|
54
|
+
static fromRoleName(scope, id, name) {
|
|
55
|
+
return new ImportedRole(scope, id, name);
|
|
56
|
+
}
|
|
57
|
+
/**
|
|
58
|
+
* Rules associaated with this Role.
|
|
59
|
+
* Returns a copy, use `allow` to add rules.
|
|
60
|
+
*/
|
|
61
|
+
get rules() {
|
|
62
|
+
return [...this._rules];
|
|
63
|
+
}
|
|
64
|
+
/**
|
|
65
|
+
* Add permission to perform a list of HTTP verbs on a collection of
|
|
66
|
+
* resources.
|
|
67
|
+
*
|
|
68
|
+
* @param resources The resource(s) to apply to
|
|
69
|
+
* @see https://kubernetes.io/docs/reference/access-authn-authz/authorization/#determine-the-request-verb
|
|
70
|
+
*/
|
|
71
|
+
allow(verbs, ...resources) {
|
|
72
|
+
this._rules.push({ verbs, resources });
|
|
73
|
+
}
|
|
74
|
+
/**
|
|
75
|
+
* Add "create" permission for the resources.
|
|
76
|
+
* @param resources The resource(s) to apply to
|
|
77
|
+
*/
|
|
78
|
+
allowCreate(...resources) {
|
|
79
|
+
this.allow(['create'], ...resources);
|
|
80
|
+
}
|
|
81
|
+
/**
|
|
82
|
+
* Add "get" permission for the resources.
|
|
83
|
+
* @param resources The resource(s) to apply to
|
|
84
|
+
*/
|
|
85
|
+
allowGet(...resources) {
|
|
86
|
+
this.allow(['get'], ...resources);
|
|
87
|
+
}
|
|
88
|
+
/**
|
|
89
|
+
* Add "list" permission for the resources.
|
|
90
|
+
* @param resources The resource(s) to apply to
|
|
91
|
+
*/
|
|
92
|
+
allowList(...resources) {
|
|
93
|
+
this.allow(['list'], ...resources);
|
|
94
|
+
}
|
|
95
|
+
/**
|
|
96
|
+
* Add "watch" permission for the resources.
|
|
97
|
+
* @param resources The resource(s) to apply to
|
|
98
|
+
*/
|
|
99
|
+
allowWatch(...resources) {
|
|
100
|
+
this.allow(['watch'], ...resources);
|
|
101
|
+
}
|
|
102
|
+
/**
|
|
103
|
+
* Add "update" permission for the resources.
|
|
104
|
+
* @param resources The resource(s) to apply to
|
|
105
|
+
*/
|
|
106
|
+
allowUpdate(...resources) {
|
|
107
|
+
this.allow(['update'], ...resources);
|
|
108
|
+
}
|
|
109
|
+
/**
|
|
110
|
+
* Add "patch" permission for the resources.
|
|
111
|
+
* @param resources The resource(s) to apply to
|
|
112
|
+
*/
|
|
113
|
+
allowPatch(...resources) {
|
|
114
|
+
this.allow(['patch'], ...resources);
|
|
115
|
+
}
|
|
116
|
+
/**
|
|
117
|
+
* Add "delete" permission for the resources.
|
|
118
|
+
* @param resources The resource(s) to apply to
|
|
119
|
+
*/
|
|
120
|
+
allowDelete(...resources) {
|
|
121
|
+
this.allow(['delete'], ...resources);
|
|
122
|
+
}
|
|
123
|
+
/**
|
|
124
|
+
* Add "deletecollection" permission for the resources.
|
|
125
|
+
* @param resources The resource(s) to apply to
|
|
126
|
+
*/
|
|
127
|
+
allowDeleteCollection(...resources) {
|
|
128
|
+
this.allow(['deletecollection'], ...resources);
|
|
129
|
+
}
|
|
130
|
+
/**
|
|
131
|
+
* Add "get", "list", and "watch" permissions for the resources.
|
|
132
|
+
* @param resources The resource(s) to apply to
|
|
133
|
+
*/
|
|
134
|
+
allowRead(...resources) {
|
|
135
|
+
this.allow(['get', 'list', 'watch'], ...resources);
|
|
136
|
+
}
|
|
137
|
+
/**
|
|
138
|
+
* Add "get", "list", "watch", "create", "update", "patch", "delete", and
|
|
139
|
+
* "deletecollection" permissions for the resources.
|
|
140
|
+
*
|
|
141
|
+
* @param resources The resource(s) to apply to
|
|
142
|
+
*/
|
|
143
|
+
allowReadWrite(...resources) {
|
|
144
|
+
this.allow(['get', 'list', 'watch', 'create', 'update', 'patch', 'delete', 'deletecollection'], ...resources);
|
|
145
|
+
}
|
|
146
|
+
/**
|
|
147
|
+
* Create a RoleBinding that binds the permissions in this Role
|
|
148
|
+
* to a list of subjects, that will only apply this role's namespace.
|
|
149
|
+
* @param subjects a list of subjects to bind to
|
|
150
|
+
*/
|
|
151
|
+
bind(...subjects) {
|
|
152
|
+
const subjectsAddress = utils_1.address(...subjects);
|
|
153
|
+
const binding = new rb.RoleBinding(this, `RoleBinding${subjectsAddress}`, {
|
|
154
|
+
metadata: {
|
|
155
|
+
namespace: this.metadata.namespace,
|
|
156
|
+
},
|
|
157
|
+
role: this,
|
|
158
|
+
});
|
|
159
|
+
binding.addSubjects(...subjects);
|
|
160
|
+
return binding;
|
|
161
|
+
}
|
|
162
|
+
synthesizeRules() {
|
|
163
|
+
const rules = [];
|
|
164
|
+
for (const rule of this._rules) {
|
|
165
|
+
for (const resource of rule.resources) {
|
|
166
|
+
rules.push({
|
|
167
|
+
verbs: rule.verbs,
|
|
168
|
+
apiGroups: [resource.apiGroup === 'core' ? '' : resource.apiGroup],
|
|
169
|
+
resourceNames: resource.resourceName ? [resource.resourceName] : undefined,
|
|
170
|
+
resources: resource.resourceType ? [resource.resourceType] : undefined,
|
|
171
|
+
});
|
|
172
|
+
}
|
|
173
|
+
}
|
|
174
|
+
return rules;
|
|
175
|
+
}
|
|
176
|
+
}
|
|
177
|
+
exports.Role = Role;
|
|
178
|
+
_a = JSII_RTTI_SYMBOL_1;
|
|
179
|
+
Role[_a] = { fqn: "cdk8s-plus-31.Role", version: "2.0.0" };
|
|
180
|
+
class ImportedClusterRole extends constructs_1.Construct {
|
|
181
|
+
constructor(scope, id, name) {
|
|
182
|
+
super(scope, id);
|
|
183
|
+
this.resourceType = 'clusterroles';
|
|
184
|
+
this._name = name;
|
|
185
|
+
}
|
|
186
|
+
get name() {
|
|
187
|
+
return this._name;
|
|
188
|
+
}
|
|
189
|
+
get apiVersion() {
|
|
190
|
+
return k8s.KubeClusterRole.GVK.apiVersion;
|
|
191
|
+
}
|
|
192
|
+
get apiGroup() {
|
|
193
|
+
return 'rbac.authorization.k8s.io';
|
|
194
|
+
}
|
|
195
|
+
get kind() {
|
|
196
|
+
return k8s.KubeClusterRole.GVK.kind;
|
|
197
|
+
}
|
|
198
|
+
get resourceName() {
|
|
199
|
+
return this.name;
|
|
200
|
+
}
|
|
201
|
+
}
|
|
202
|
+
/**
|
|
203
|
+
* ClusterRole is a cluster level, logical grouping of PolicyRules that can be
|
|
204
|
+
* referenced as a unit by a RoleBinding or ClusterRoleBinding.
|
|
205
|
+
*/
|
|
206
|
+
class ClusterRole extends base.Resource {
|
|
207
|
+
constructor(scope, id, props = {}) {
|
|
208
|
+
super(scope, id);
|
|
209
|
+
this.resourceType = 'clusterroles';
|
|
210
|
+
this._labelSelector = {};
|
|
211
|
+
this._rules = [];
|
|
212
|
+
this.apiObject = new k8s.KubeClusterRole(this, 'Resource', {
|
|
213
|
+
metadata: props.metadata,
|
|
214
|
+
rules: cdk8s_1.Lazy.any({ produce: () => this.synthesizeRules() }),
|
|
215
|
+
aggregationRule: cdk8s_1.Lazy.any({ produce: () => this.synthesizeAggregationRules() }),
|
|
216
|
+
});
|
|
217
|
+
for (const rule of props.rules ?? []) {
|
|
218
|
+
this.allow(rule.verbs, ...rule.endpoints);
|
|
219
|
+
}
|
|
220
|
+
for (const [key, value] of Object.entries(props.aggregationLabels ?? {})) {
|
|
221
|
+
this.aggregate(key, value);
|
|
222
|
+
}
|
|
223
|
+
}
|
|
224
|
+
/**
|
|
225
|
+
* Imports a role from the cluster as a reference.
|
|
226
|
+
*/
|
|
227
|
+
static fromClusterRoleName(scope, id, name) {
|
|
228
|
+
return new ImportedClusterRole(scope, id, name);
|
|
229
|
+
}
|
|
230
|
+
/**
|
|
231
|
+
* Rules associaated with this Role.
|
|
232
|
+
* Returns a copy, use `allow` to add rules.
|
|
233
|
+
*/
|
|
234
|
+
get rules() {
|
|
235
|
+
return [...this._rules];
|
|
236
|
+
}
|
|
237
|
+
/**
|
|
238
|
+
* Add permission to perform a list of HTTP verbs on a collection of
|
|
239
|
+
* resources.
|
|
240
|
+
*
|
|
241
|
+
* @param endpoints The endpoints(s) to apply to
|
|
242
|
+
* @see https://kubernetes.io/docs/reference/access-authn-authz/authorization/#determine-the-request-verb
|
|
243
|
+
*/
|
|
244
|
+
allow(verbs, ...endpoints) {
|
|
245
|
+
this._rules.push({ verbs, endpoints });
|
|
246
|
+
}
|
|
247
|
+
/**
|
|
248
|
+
* Add "create" permission for the resources.
|
|
249
|
+
* @param endpoints The resource(s) to apply to
|
|
250
|
+
*/
|
|
251
|
+
allowCreate(...endpoints) {
|
|
252
|
+
this.allow(['create'], ...endpoints);
|
|
253
|
+
}
|
|
254
|
+
/**
|
|
255
|
+
* Add "get" permission for the resources.
|
|
256
|
+
* @param endpoints The resource(s) to apply to
|
|
257
|
+
*/
|
|
258
|
+
allowGet(...endpoints) {
|
|
259
|
+
this.allow(['get'], ...endpoints);
|
|
260
|
+
}
|
|
261
|
+
/**
|
|
262
|
+
* Add "list" permission for the resources.
|
|
263
|
+
* @param endpoints The resource(s) to apply to
|
|
264
|
+
*/
|
|
265
|
+
allowList(...endpoints) {
|
|
266
|
+
this.allow(['list'], ...endpoints);
|
|
267
|
+
}
|
|
268
|
+
/**
|
|
269
|
+
* Add "watch" permission for the resources.
|
|
270
|
+
* @param endpoints The resource(s) to apply to
|
|
271
|
+
*/
|
|
272
|
+
allowWatch(...endpoints) {
|
|
273
|
+
this.allow(['watch'], ...endpoints);
|
|
274
|
+
}
|
|
275
|
+
/**
|
|
276
|
+
* Add "update" permission for the resources.
|
|
277
|
+
* @param endpoints The resource(s) to apply to
|
|
278
|
+
*/
|
|
279
|
+
allowUpdate(...endpoints) {
|
|
280
|
+
this.allow(['update'], ...endpoints);
|
|
281
|
+
}
|
|
282
|
+
/**
|
|
283
|
+
* Add "patch" permission for the resources.
|
|
284
|
+
* @param endpoints The resource(s) to apply to
|
|
285
|
+
*/
|
|
286
|
+
allowPatch(...endpoints) {
|
|
287
|
+
this.allow(['patch'], ...endpoints);
|
|
288
|
+
}
|
|
289
|
+
/**
|
|
290
|
+
* Add "delete" permission for the resources.
|
|
291
|
+
* @param endpoints The resource(s) to apply to
|
|
292
|
+
*/
|
|
293
|
+
allowDelete(...endpoints) {
|
|
294
|
+
this.allow(['delete'], ...endpoints);
|
|
295
|
+
}
|
|
296
|
+
/**
|
|
297
|
+
* Add "deletecollection" permission for the resources.
|
|
298
|
+
* @param endpoints The resource(s) to apply to
|
|
299
|
+
*/
|
|
300
|
+
allowDeleteCollection(...endpoints) {
|
|
301
|
+
this.allow(['deletecollection'], ...endpoints);
|
|
302
|
+
}
|
|
303
|
+
/**
|
|
304
|
+
* Add "get", "list", and "watch" permissions for the resources.
|
|
305
|
+
* @param endpoints The resource(s) to apply to
|
|
306
|
+
*/
|
|
307
|
+
allowRead(...endpoints) {
|
|
308
|
+
this.allow(['get', 'list', 'watch'], ...endpoints);
|
|
309
|
+
}
|
|
310
|
+
/**
|
|
311
|
+
* Add "get", "list", "watch", "create", "update", "patch", "delete", and
|
|
312
|
+
* "deletecollection" permissions for the resources.
|
|
313
|
+
*
|
|
314
|
+
* @param endpoints The resource(s) to apply to
|
|
315
|
+
*/
|
|
316
|
+
allowReadWrite(...endpoints) {
|
|
317
|
+
this.allow(['get', 'list', 'watch', 'create', 'update', 'patch', 'delete', 'deletecollection'], ...endpoints);
|
|
318
|
+
}
|
|
319
|
+
/**
|
|
320
|
+
* Aggregate rules from roles matching this label selector.
|
|
321
|
+
*/
|
|
322
|
+
aggregate(key, value) {
|
|
323
|
+
this._labelSelector[key] = value;
|
|
324
|
+
}
|
|
325
|
+
/**
|
|
326
|
+
* Combines the rules of the argument ClusterRole into this ClusterRole
|
|
327
|
+
* using aggregation labels.
|
|
328
|
+
* @param rol
|
|
329
|
+
*/
|
|
330
|
+
combine(rol) {
|
|
331
|
+
const key = `cdk8s.cluster-role/aggregate-to-${cdk8s_1.Names.toLabelValue(this)}`;
|
|
332
|
+
const value = 'true';
|
|
333
|
+
rol.metadata.addLabel(key, value);
|
|
334
|
+
this.aggregate(key, value);
|
|
335
|
+
}
|
|
336
|
+
/**
|
|
337
|
+
* Create a RoleBinding that binds the permissions in this ClusterRole
|
|
338
|
+
* to a list of subjects, that will only apply to the given namespace.
|
|
339
|
+
* @param namespace the namespace to limit permissions to.
|
|
340
|
+
* @param subjects a list of subjects to bind to
|
|
341
|
+
*/
|
|
342
|
+
bindInNamespace(namespace, ...subjects) {
|
|
343
|
+
const binding = new rb.RoleBinding(this, `RoleBinding-${namespace}`, {
|
|
344
|
+
metadata: {
|
|
345
|
+
namespace,
|
|
346
|
+
},
|
|
347
|
+
role: this,
|
|
348
|
+
});
|
|
349
|
+
binding.addSubjects(...subjects);
|
|
350
|
+
return binding;
|
|
351
|
+
}
|
|
352
|
+
/**
|
|
353
|
+
* Create a ClusterRoleBinding that binds the permissions in this
|
|
354
|
+
* ClusterRole to a list of subjects, without namespace restrictions.
|
|
355
|
+
* @param subjects a list of subjects to bind to
|
|
356
|
+
*/
|
|
357
|
+
bind(...subjects) {
|
|
358
|
+
const binding = new rb.ClusterRoleBinding(this, 'ClusterRoleBinding', {
|
|
359
|
+
role: this,
|
|
360
|
+
});
|
|
361
|
+
binding.addSubjects(...subjects);
|
|
362
|
+
return binding;
|
|
363
|
+
}
|
|
364
|
+
synthesizeRules() {
|
|
365
|
+
const rules = [];
|
|
366
|
+
for (const rule of this._rules) {
|
|
367
|
+
for (const endpoint of rule.endpoints) {
|
|
368
|
+
const resource = endpoint.asApiResource();
|
|
369
|
+
const nonResource = endpoint.asNonApiResource();
|
|
370
|
+
if (resource && nonResource) {
|
|
371
|
+
throw new Error('Endpoint must be either resource or non resource. not both.');
|
|
372
|
+
}
|
|
373
|
+
if (!resource && !nonResource) {
|
|
374
|
+
throw new Error('Endpoint must be either resource or non resource. not neither.');
|
|
375
|
+
}
|
|
376
|
+
if (resource) {
|
|
377
|
+
rules.push({
|
|
378
|
+
apiGroups: [resource.apiGroup === 'core' ? '' : resource.apiGroup],
|
|
379
|
+
resources: [resource.resourceType],
|
|
380
|
+
resourceNames: resource.resourceName ? [resource.resourceName] : [],
|
|
381
|
+
verbs: rule.verbs,
|
|
382
|
+
});
|
|
383
|
+
}
|
|
384
|
+
if (nonResource) {
|
|
385
|
+
rules.push({ verbs: rule.verbs, nonResourceUrLs: [nonResource] });
|
|
386
|
+
}
|
|
387
|
+
}
|
|
388
|
+
}
|
|
389
|
+
return rules;
|
|
390
|
+
}
|
|
391
|
+
synthesizeAggregationRules() {
|
|
392
|
+
if (Object.keys(this._labelSelector).length === 0) {
|
|
393
|
+
return undefined;
|
|
394
|
+
}
|
|
395
|
+
return { clusterRoleSelectors: [{ matchLabels: this._labelSelector }] };
|
|
396
|
+
}
|
|
397
|
+
}
|
|
398
|
+
exports.ClusterRole = ClusterRole;
|
|
399
|
+
_b = JSII_RTTI_SYMBOL_1;
|
|
400
|
+
ClusterRole[_b] = { fqn: "cdk8s-plus-31.ClusterRole", version: "2.0.0" };
|
|
401
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"role.js","sourceRoot":"","sources":["../src/role.ts"],"names":[],"mappings":";;;;;AAAA,iCAA+C;AAC/C,2CAAuC;AAEvC,+BAA+B;AAC/B,qCAAqC;AACrC,qCAAqC;AACrC,mCAAkC;AAsClC,MAAM,YAAa,SAAQ,sBAAS;IAMlC,YAAY,KAAgB,EAAE,EAAU,EAAE,IAAY;QACpD,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAHH,iBAAY,GAAG,OAAO,CAAC;QAIrC,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;IACpB,CAAC;IAED,IAAW,IAAI;QACb,OAAO,IAAI,CAAC,KAAK,CAAC;IACpB,CAAC;IAED,IAAW,UAAU;QACnB,OAAO,GAAG,CAAC,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC;IACrC,CAAC;IAED,IAAW,QAAQ;QACjB,OAAO,2BAA2B,CAAC;IACrC,CAAC;IAED,IAAW,IAAI;QACb,OAAO,GAAG,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC;IAC/B,CAAC;IAED,IAAW,YAAY;QACrB,OAAO,IAAI,CAAC,IAAI,CAAC;IACnB,CAAC;CAEF;AAED;;;GAGG;AACH,MAAa,IAAK,SAAQ,IAAI,CAAC,QAAQ;IAkBrC,YAAY,KAAgB,EAAE,EAAU,EAAE,QAAmB,EAAE;QAC7D,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QALH,iBAAY,GAAG,OAAO,CAAC;QAEtB,WAAM,GAA0B,EAAE,CAAC;QAKlD,IAAI,CAAC,SAAS,GAAG,IAAI,GAAG,CAAC,QAAQ,CAAC,IAAI,EAAE,UAAU,EAAE;YAClD,QAAQ,EAAE,KAAK,CAAC,QAAQ;YACxB,KAAK,EAAE,YAAI,CAAC,GAAG,CAAC,EAAE,OAAO,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,eAAe,EAAE,EAAE,CAAC;SAC3D,CAAC,CAAC;QAEH,KAAK,MAAM,IAAI,IAAI,KAAK,CAAC,KAAK,IAAI,EAAE,EAAE;YACpC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,KAAK,EAAE,GAAG,IAAI,CAAC,SAAS,CAAC,CAAC;SAC3C;IACH,CAAC;IA3BD;;OAEG;IACI,MAAM,CAAC,YAAY,CAAC,KAAgB,EAAE,EAAU,EAAE,IAAY;QACnE,OAAO,IAAI,YAAY,CAAC,KAAK,EAAE,EAAE,EAAE,IAAI,CAAC,CAAC;IAC3C,CAAC;IAwBD;;;OAGG;IACH,IAAW,KAAK;QACd,OAAO,CAAC,GAAG,IAAI,CAAC,MAAM,CAAC,CAAC;IAC1B,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,KAAe,EAAE,GAAG,SAAyB;QACxD,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC,CAAC;IACzC,CAAC;IAED;;;OAGG;IACI,WAAW,CAAC,GAAG,SAAyB;QAC7C,IAAI,CAAC,KAAK,CAAC,CAAC,QAAQ,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACvC,CAAC;IAED;;;OAGG;IACI,QAAQ,CAAC,GAAG,SAAyB;QAC1C,IAAI,CAAC,KAAK,CAAC,CAAC,KAAK,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACpC,CAAC;IAED;;;OAGG;IACI,SAAS,CAAC,GAAG,SAAyB;QAC3C,IAAI,CAAC,KAAK,CAAC,CAAC,MAAM,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACrC,CAAC;IAED;;;OAGG;IACI,UAAU,CAAC,GAAG,SAAyB;QAC5C,IAAI,CAAC,KAAK,CAAC,CAAC,OAAO,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACtC,CAAC;IAED;;;OAGG;IACI,WAAW,CAAC,GAAG,SAAyB;QAC7C,IAAI,CAAC,KAAK,CAAC,CAAC,QAAQ,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACvC,CAAC;IAED;;;OAGG;IACI,UAAU,CAAC,GAAG,SAAyB;QAC5C,IAAI,CAAC,KAAK,CAAC,CAAC,OAAO,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACtC,CAAC;IAED;;;OAGG;IACI,WAAW,CAAC,GAAG,SAAyB;QAC7C,IAAI,CAAC,KAAK,CAAC,CAAC,QAAQ,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACvC,CAAC;IAED;;;OAGG;IACI,qBAAqB,CAAC,GAAG,SAAyB;QACvD,IAAI,CAAC,KAAK,CAAC,CAAC,kBAAkB,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACjD,CAAC;IAED;;;OAGG;IACI,SAAS,CAAC,GAAG,SAAyB;QAC3C,IAAI,CAAC,KAAK,CAAC,CAAC,KAAK,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACrD,CAAC;IAED;;;;;OAKG;IACI,cAAc,CAAC,GAAG,SAAyB;QAChD,IAAI,CAAC,KAAK,CAAC,CAAC,KAAK,EAAE,MAAM,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,kBAAkB,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IAChH,CAAC;IAED;;;;OAIG;IACI,IAAI,CAAC,GAAG,QAAuB;QACpC,MAAM,eAAe,GAAG,eAAO,CAAC,GAAG,QAAQ,CAAC,CAAC;QAC7C,MAAM,OAAO,GAAG,IAAI,EAAE,CAAC,WAAW,CAAC,IAAI,EAAE,cAAc,eAAe,EAAE,EAAE;YACxE,QAAQ,EAAE;gBACR,SAAS,EAAE,IAAI,CAAC,QAAQ,CAAC,SAAS;aACnC;YACD,IAAI,EAAE,IAAI;SACX,CAAC,CAAC;QACH,OAAO,CAAC,WAAW,CAAC,GAAG,QAAQ,CAAC,CAAC;QACjC,OAAO,OAAO,CAAC;IACjB,CAAC;IAEO,eAAe;QACrB,MAAM,KAAK,GAAqB,EAAE,CAAC;QACnC,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,MAAM,EAAE;YAC9B,KAAK,MAAM,QAAQ,IAAI,IAAI,CAAC,SAAS,EAAE;gBACrC,KAAK,CAAC,IAAI,CAAC;oBACT,KAAK,EAAE,IAAI,CAAC,KAAK;oBACjB,SAAS,EAAE,CAAC,QAAQ,CAAC,QAAQ,KAAK,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;oBAClE,aAAa,EAAE,QAAQ,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,SAAS;oBAC1E,SAAS,EAAE,QAAQ,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,SAAS;iBACvE,CAAC,CAAC;aACJ;SACF;QACD,OAAO,KAAK,CAAC;IACf,CAAC;;AAlKH,oBAmKC;;;AA6CD,MAAM,mBAAoB,SAAQ,sBAAS;IAMzC,YAAY,KAAgB,EAAE,EAAU,EAAE,IAAY;QACpD,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAHH,iBAAY,GAAW,cAAc,CAAC;QAIpD,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;IACpB,CAAC;IAED,IAAW,IAAI;QACb,OAAO,IAAI,CAAC,KAAK,CAAC;IACpB,CAAC;IAED,IAAW,UAAU;QACnB,OAAO,GAAG,CAAC,eAAe,CAAC,GAAG,CAAC,UAAU,CAAC;IAC5C,CAAC;IAED,IAAW,QAAQ;QACjB,OAAO,2BAA2B,CAAC;IACrC,CAAC;IAED,IAAW,IAAI;QACb,OAAO,GAAG,CAAC,eAAe,CAAC,GAAG,CAAC,IAAI,CAAC;IACtC,CAAC;IAED,IAAW,YAAY;QACrB,OAAO,IAAI,CAAC,IAAI,CAAC;IACnB,CAAC;CAEF;AAED;;;GAGG;AACH,MAAa,WAAY,SAAQ,IAAI,CAAC,QAAQ;IAmB5C,YAAY,KAAgB,EAAE,EAAU,EAAE,QAA0B,EAAE;QACpE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QANH,iBAAY,GAAG,cAAc,CAAC;QAE7B,mBAAc,GAA2B,EAAE,CAAC;QAC5C,WAAM,GAAiC,EAAE,CAAC;QAKzD,IAAI,CAAC,SAAS,GAAG,IAAI,GAAG,CAAC,eAAe,CAAC,IAAI,EAAE,UAAU,EAAE;YACzD,QAAQ,EAAE,KAAK,CAAC,QAAQ;YACxB,KAAK,EAAE,YAAI,CAAC,GAAG,CAAC,EAAE,OAAO,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,eAAe,EAAE,EAAE,CAAC;YAC1D,eAAe,EAAE,YAAI,CAAC,GAAG,CAAC,EAAE,OAAO,EAAE,GAAG,EAAE,CAAC,IAAI,CAAC,0BAA0B,EAAE,EAAE,CAAC;SAChF,CAAC,CAAC;QAEH,KAAK,MAAM,IAAI,IAAI,KAAK,CAAC,KAAK,IAAI,EAAE,EAAE;YACpC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,KAAK,EAAE,GAAG,IAAI,CAAC,SAAS,CAAC,CAAC;SAC3C;QAED,KAAK,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,KAAK,CAAC,iBAAiB,IAAI,EAAE,CAAC,EAAE;YACxE,IAAI,CAAC,SAAS,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;SAC5B;IACH,CAAC;IAjCD;;OAEG;IACI,MAAM,CAAC,mBAAmB,CAAC,KAAgB,EAAE,EAAU,EAAE,IAAY;QAC1E,OAAO,IAAI,mBAAmB,CAAC,KAAK,EAAE,EAAE,EAAE,IAAI,CAAC,CAAC;IAClD,CAAC;IA8BD;;;OAGG;IACH,IAAW,KAAK;QACd,OAAO,CAAC,GAAG,IAAI,CAAC,MAAM,CAAC,CAAC;IAC1B,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,KAAe,EAAE,GAAG,SAAyB;QACxD,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC,CAAC;IACzC,CAAC;IAED;;;OAGG;IACI,WAAW,CAAC,GAAG,SAAyB;QAC7C,IAAI,CAAC,KAAK,CAAC,CAAC,QAAQ,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACvC,CAAC;IAED;;;OAGG;IACI,QAAQ,CAAC,GAAG,SAAyB;QAC1C,IAAI,CAAC,KAAK,CAAC,CAAC,KAAK,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACpC,CAAC;IAED;;;OAGG;IACI,SAAS,CAAC,GAAG,SAAyB;QAC3C,IAAI,CAAC,KAAK,CAAC,CAAC,MAAM,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACrC,CAAC;IAED;;;OAGG;IACI,UAAU,CAAC,GAAG,SAAyB;QAC5C,IAAI,CAAC,KAAK,CAAC,CAAC,OAAO,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACtC,CAAC;IAED;;;OAGG;IACI,WAAW,CAAC,GAAG,SAAyB;QAC7C,IAAI,CAAC,KAAK,CAAC,CAAC,QAAQ,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACvC,CAAC;IAED;;;OAGG;IACI,UAAU,CAAC,GAAG,SAAyB;QAC5C,IAAI,CAAC,KAAK,CAAC,CAAC,OAAO,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACtC,CAAC;IAED;;;OAGG;IACI,WAAW,CAAC,GAAG,SAAyB;QAC7C,IAAI,CAAC,KAAK,CAAC,CAAC,QAAQ,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACvC,CAAC;IAED;;;OAGG;IACI,qBAAqB,CAAC,GAAG,SAAyB;QACvD,IAAI,CAAC,KAAK,CAAC,CAAC,kBAAkB,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACjD,CAAC;IAED;;;OAGG;IACI,SAAS,CAAC,GAAG,SAAyB;QAC3C,IAAI,CAAC,KAAK,CAAC,CAAC,KAAK,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IACrD,CAAC;IAED;;;;;OAKG;IACI,cAAc,CAAC,GAAG,SAAyB;QAChD,IAAI,CAAC,KAAK,CAAC,CAAC,KAAK,EAAE,MAAM,EAAE,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,OAAO,EAAE,QAAQ,EAAE,kBAAkB,CAAC,EAAE,GAAG,SAAS,CAAC,CAAC;IAChH,CAAC;IAED;;OAEG;IACI,SAAS,CAAC,GAAW,EAAE,KAAa;QACzC,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,GAAG,KAAK,CAAC;IACnC,CAAC;IAED;;;;OAIG;IACI,OAAO,CAAC,GAAgB;QAC7B,MAAM,GAAG,GAAG,mCAAmC,aAAK,CAAC,YAAY,CAAC,IAAI,CAAC,EAAE,CAAC;QAC1E,MAAM,KAAK,GAAG,MAAM,CAAC;QACrB,GAAG,CAAC,QAAQ,CAAC,QAAQ,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;QAClC,IAAI,CAAC,SAAS,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;IAC7B,CAAC;IAED;;;;;OAKG;IACI,eAAe,CAAC,SAAiB,EAAE,GAAG,QAAuB;QAClE,MAAM,OAAO,GAAG,IAAI,EAAE,CAAC,WAAW,CAAC,IAAI,EAAE,eAAe,SAAS,EAAE,EAAE;YACnE,QAAQ,EAAE;gBACR,SAAS;aACV;YACD,IAAI,EAAE,IAAI;SACX,CAAC,CAAC;QACH,OAAO,CAAC,WAAW,CAAC,GAAG,QAAQ,CAAC,CAAC;QACjC,OAAO,OAAO,CAAC;IACjB,CAAC;IAED;;;;OAIG;IACI,IAAI,CAAC,GAAG,QAAuB;QACpC,MAAM,OAAO,GAAG,IAAI,EAAE,CAAC,kBAAkB,CAAC,IAAI,EAAE,oBAAoB,EAAE;YACpE,IAAI,EAAE,IAAI;SACX,CAAC,CAAC;QACH,OAAO,CAAC,WAAW,CAAC,GAAG,QAAQ,CAAC,CAAC;QACjC,OAAO,OAAO,CAAC;IACjB,CAAC;IAEO,eAAe;QACrB,MAAM,KAAK,GAAqB,EAAE,CAAC;QACnC,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,MAAM,EAAE;YAC9B,KAAK,MAAM,QAAQ,IAAI,IAAI,CAAC,SAAS,EAAE;gBACrC,MAAM,QAAQ,GAAG,QAAQ,CAAC,aAAa,EAAE,CAAC;gBAC1C,MAAM,WAAW,GAAG,QAAQ,CAAC,gBAAgB,EAAE,CAAC;gBAEhD,IAAI,QAAQ,IAAI,WAAW,EAAE;oBAC3B,MAAM,IAAI,KAAK,CAAC,6DAA6D,CAAC,CAAC;iBAChF;gBAED,IAAI,CAAC,QAAQ,IAAI,CAAC,WAAW,EAAE;oBAC7B,MAAM,IAAI,KAAK,CAAC,gEAAgE,CAAC,CAAC;iBACnF;gBAED,IAAI,QAAQ,EAAE;oBACZ,KAAK,CAAC,IAAI,CAAC;wBACT,SAAS,EAAE,CAAC,QAAQ,CAAC,QAAQ,KAAK,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;wBAClE,SAAS,EAAE,CAAC,QAAQ,CAAC,YAAY,CAAC;wBAClC,aAAa,EAAE,QAAQ,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,EAAE;wBACnE,KAAK,EAAE,IAAI,CAAC,KAAK;qBAClB,CAAC,CAAC;iBACJ;gBACD,IAAI,WAAW,EAAE;oBACf,KAAK,CAAC,IAAI,CAAC,EAAE,KAAK,EAAE,IAAI,CAAC,KAAK,EAAE,eAAe,EAAE,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC;iBACnE;aACF;SAEF;QACD,OAAO,KAAK,CAAC;IACf,CAAC;IAEO,0BAA0B;QAChC,IAAI,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,MAAM,KAAK,CAAC,EAAE;YACjD,OAAO,SAAS,CAAC;SAClB;QAED,OAAO,EAAE,oBAAoB,EAAE,CAAC,EAAE,WAAW,EAAE,IAAI,CAAC,cAAc,EAAE,CAAC,EAAE,CAAC;IAC1E,CAAC;;AAjOH,kCAkOC","sourcesContent":["import { ApiObject, Lazy, Names } from 'cdk8s';\nimport { Construct } from 'constructs';\nimport { IApiResource, IApiEndpoint } from './api-resource';\nimport * as base from './base';\nimport * as k8s from './imports/k8s';\nimport * as rb from './role-binding';\nimport { address } from './utils';\n\n/**\n * A reference to any Role or ClusterRole.\n */\nexport interface IRole extends base.IResource {\n\n}\n\n/**\n * Properties for `Role`.\n */\nexport interface RoleProps extends base.ResourceProps {\n\n  /**\n   * A list of rules the role should allow.\n   *\n   * @default []\n   */\n  readonly rules?: RolePolicyRule[];\n}\n\n/**\n * Policy rule of a `Role.\n */\nexport interface RolePolicyRule {\n\n  /**\n   * Verbs to allow. (e.g ['get', 'watch'])\n   */\n  readonly verbs: string[];\n\n  /**\n   * Resources this rule applies to.\n   */\n  readonly resources: IApiResource[];\n}\n\nclass ImportedRole extends Construct implements IRole {\n\n  private readonly _name: string;\n\n  public readonly resourceType = 'roles';\n\n  constructor(scope: Construct, id: string, name: string) {\n    super(scope, id);\n    this._name = name;\n  }\n\n  public get name(): string {\n    return this._name;\n  }\n\n  public get apiVersion(): string {\n    return k8s.KubeRole.GVK.apiVersion;\n  }\n\n  public get apiGroup(): string {\n    return 'rbac.authorization.k8s.io';\n  }\n\n  public get kind(): string {\n    return k8s.KubeRole.GVK.kind;\n  }\n\n  public get resourceName(): string {\n    return this.name;\n  }\n\n}\n\n/**\n * Role is a namespaced, logical grouping of PolicyRules that can be referenced\n * as a unit by a RoleBinding.\n */\nexport class Role extends base.Resource implements IRole {\n\n  /**\n   * Imports a role from the cluster as a reference.\n   */\n  public static fromRoleName(scope: Construct, id: string, name: string): IRole {\n    return new ImportedRole(scope, id, name);\n  }\n\n  /**\n   * @see base.Resource.apiObject\n   */\n  protected readonly apiObject: ApiObject;\n\n  public readonly resourceType = 'roles';\n\n  private readonly _rules: Array<RolePolicyRule> = [];\n\n  constructor(scope: Construct, id: string, props: RoleProps = {}) {\n    super(scope, id);\n\n    this.apiObject = new k8s.KubeRole(this, 'Resource', {\n      metadata: props.metadata,\n      rules: Lazy.any({ produce: () => this.synthesizeRules() }),\n    });\n\n    for (const rule of props.rules ?? []) {\n      this.allow(rule.verbs, ...rule.resources);\n    }\n  }\n\n  /**\n   * Rules associaated with this Role.\n   * Returns a copy, use `allow` to add rules.\n   */\n  public get rules(): RolePolicyRule[] {\n    return [...this._rules];\n  }\n\n  /**\n   * Add permission to perform a list of HTTP verbs on a collection of\n   * resources.\n   *\n   * @param resources The resource(s) to apply to\n   * @see https://kubernetes.io/docs/reference/access-authn-authz/authorization/#determine-the-request-verb\n   */\n  public allow(verbs: string[], ...resources: IApiResource[]): void {\n    this._rules.push({ verbs, resources });\n  }\n\n  /**\n   * Add \"create\" permission for the resources.\n   * @param resources The resource(s) to apply to\n   */\n  public allowCreate(...resources: IApiResource[]): void {\n    this.allow(['create'], ...resources);\n  }\n\n  /**\n   * Add \"get\" permission for the resources.\n   * @param resources The resource(s) to apply to\n   */\n  public allowGet(...resources: IApiResource[]): void {\n    this.allow(['get'], ...resources);\n  }\n\n  /**\n   * Add \"list\" permission for the resources.\n   * @param resources The resource(s) to apply to\n   */\n  public allowList(...resources: IApiResource[]): void {\n    this.allow(['list'], ...resources);\n  }\n\n  /**\n   * Add \"watch\" permission for the resources.\n   * @param resources The resource(s) to apply to\n   */\n  public allowWatch(...resources: IApiResource[]): void {\n    this.allow(['watch'], ...resources);\n  }\n\n  /**\n   * Add \"update\" permission for the resources.\n   * @param resources The resource(s) to apply to\n   */\n  public allowUpdate(...resources: IApiResource[]): void {\n    this.allow(['update'], ...resources);\n  }\n\n  /**\n   * Add \"patch\" permission for the resources.\n   * @param resources The resource(s) to apply to\n   */\n  public allowPatch(...resources: IApiResource[]): void {\n    this.allow(['patch'], ...resources);\n  }\n\n  /**\n   * Add \"delete\" permission for the resources.\n   * @param resources The resource(s) to apply to\n   */\n  public allowDelete(...resources: IApiResource[]): void {\n    this.allow(['delete'], ...resources);\n  }\n\n  /**\n   * Add \"deletecollection\" permission for the resources.\n   * @param resources The resource(s) to apply to\n   */\n  public allowDeleteCollection(...resources: IApiResource[]): void {\n    this.allow(['deletecollection'], ...resources);\n  }\n\n  /**\n   * Add \"get\", \"list\", and \"watch\" permissions for the resources.\n   * @param resources The resource(s) to apply to\n   */\n  public allowRead(...resources: IApiResource[]): void {\n    this.allow(['get', 'list', 'watch'], ...resources);\n  }\n\n  /**\n   * Add \"get\", \"list\", \"watch\", \"create\", \"update\", \"patch\", \"delete\", and\n   * \"deletecollection\" permissions for the resources.\n   *\n   * @param resources The resource(s) to apply to\n   */\n  public allowReadWrite(...resources: IApiResource[]): void {\n    this.allow(['get', 'list', 'watch', 'create', 'update', 'patch', 'delete', 'deletecollection'], ...resources);\n  }\n\n  /**\n   * Create a RoleBinding that binds the permissions in this Role\n   * to a list of subjects, that will only apply this role's namespace.\n   * @param subjects a list of subjects to bind to\n   */\n  public bind(...subjects: rb.ISubject[]): rb.RoleBinding {\n    const subjectsAddress = address(...subjects);\n    const binding = new rb.RoleBinding(this, `RoleBinding${subjectsAddress}`, {\n      metadata: {\n        namespace: this.metadata.namespace,\n      },\n      role: this,\n    });\n    binding.addSubjects(...subjects);\n    return binding;\n  }\n\n  private synthesizeRules(): k8s.PolicyRule[] {\n    const rules: k8s.PolicyRule[] = [];\n    for (const rule of this._rules) {\n      for (const resource of rule.resources) {\n        rules.push({\n          verbs: rule.verbs,\n          apiGroups: [resource.apiGroup === 'core' ? '' : resource.apiGroup],\n          resourceNames: resource.resourceName ? [resource.resourceName] : undefined,\n          resources: resource.resourceType ? [resource.resourceType] : undefined,\n        });\n      }\n    }\n    return rules;\n  }\n}\n\n/**\n * Represents a cluster-level role.\n */\nexport interface IClusterRole extends base.IResource {\n\n}\n\n/**\n * Properties for `ClusterRole`.\n */\nexport interface ClusterRoleProps extends base.ResourceProps {\n\n  /**\n    * A list of rules the role should allow.\n    *\n    * @default []\n    */\n  readonly rules?: ClusterRolePolicyRule[];\n\n  /**\n    * Specify labels that should be used to locate ClusterRoles, whose rules\n    * will be automatically filled into this ClusterRole's rules.\n    */\n  readonly aggregationLabels?: { [key: string]: string };\n}\n\n/**\n * Policy rule of a `ClusterRole.\n */\nexport interface ClusterRolePolicyRule {\n\n  /**\n   * Verbs to allow. (e.g ['get', 'watch'])\n   */\n  readonly verbs: string[];\n\n  /**\n   * Endpoints this rule applies to. Can be either api resources\n   * or non api resources.\n   */\n  readonly endpoints: IApiEndpoint[];\n}\n\nclass ImportedClusterRole extends Construct implements IClusterRole {\n\n  private readonly _name: string;\n\n  public readonly resourceType: string = 'clusterroles';\n\n  constructor(scope: Construct, id: string, name: string) {\n    super(scope, id);\n    this._name = name;\n  }\n\n  public get name(): string {\n    return this._name;\n  }\n\n  public get apiVersion(): string {\n    return k8s.KubeClusterRole.GVK.apiVersion;\n  }\n\n  public get apiGroup(): string {\n    return 'rbac.authorization.k8s.io';\n  }\n\n  public get kind(): string {\n    return k8s.KubeClusterRole.GVK.kind;\n  }\n\n  public get resourceName(): string {\n    return this.name;\n  }\n\n}\n\n/**\n * ClusterRole is a cluster level, logical grouping of PolicyRules that can be\n * referenced as a unit by a RoleBinding or ClusterRoleBinding.\n */\nexport class ClusterRole extends base.Resource implements IClusterRole, IRole {\n\n  /**\n   * Imports a role from the cluster as a reference.\n   */\n  public static fromClusterRoleName(scope: Construct, id: string, name: string): IClusterRole {\n    return new ImportedClusterRole(scope, id, name);\n  }\n\n  /**\n   * @see base.Resource.apiObject\n   */\n  protected readonly apiObject: ApiObject;\n\n  public readonly resourceType = 'clusterroles';\n\n  private readonly _labelSelector: Record<string, string> = {};\n  private readonly _rules: Array<ClusterRolePolicyRule> = [];\n\n  constructor(scope: Construct, id: string, props: ClusterRoleProps = {}) {\n    super(scope, id);\n\n    this.apiObject = new k8s.KubeClusterRole(this, 'Resource', {\n      metadata: props.metadata,\n      rules: Lazy.any({ produce: () => this.synthesizeRules() }),\n      aggregationRule: Lazy.any({ produce: () => this.synthesizeAggregationRules() }),\n    });\n\n    for (const rule of props.rules ?? []) {\n      this.allow(rule.verbs, ...rule.endpoints);\n    }\n\n    for (const [key, value] of Object.entries(props.aggregationLabels ?? {})) {\n      this.aggregate(key, value);\n    }\n  }\n\n  /**\n   * Rules associaated with this Role.\n   * Returns a copy, use `allow` to add rules.\n   */\n  public get rules(): ClusterRolePolicyRule[] {\n    return [...this._rules];\n  }\n\n  /**\n   * Add permission to perform a list of HTTP verbs on a collection of\n   * resources.\n   *\n   * @param endpoints The endpoints(s) to apply to\n   * @see https://kubernetes.io/docs/reference/access-authn-authz/authorization/#determine-the-request-verb\n   */\n  public allow(verbs: string[], ...endpoints: IApiEndpoint[]): void {\n    this._rules.push({ verbs, endpoints });\n  }\n\n  /**\n   * Add \"create\" permission for the resources.\n   * @param endpoints The resource(s) to apply to\n   */\n  public allowCreate(...endpoints: IApiEndpoint[]): void {\n    this.allow(['create'], ...endpoints);\n  }\n\n  /**\n   * Add \"get\" permission for the resources.\n   * @param endpoints The resource(s) to apply to\n   */\n  public allowGet(...endpoints: IApiEndpoint[]): void {\n    this.allow(['get'], ...endpoints);\n  }\n\n  /**\n   * Add \"list\" permission for the resources.\n   * @param endpoints The resource(s) to apply to\n   */\n  public allowList(...endpoints: IApiEndpoint[]): void {\n    this.allow(['list'], ...endpoints);\n  }\n\n  /**\n   * Add \"watch\" permission for the resources.\n   * @param endpoints The resource(s) to apply to\n   */\n  public allowWatch(...endpoints: IApiEndpoint[]): void {\n    this.allow(['watch'], ...endpoints);\n  }\n\n  /**\n   * Add \"update\" permission for the resources.\n   * @param endpoints The resource(s) to apply to\n   */\n  public allowUpdate(...endpoints: IApiEndpoint[]): void {\n    this.allow(['update'], ...endpoints);\n  }\n\n  /**\n   * Add \"patch\" permission for the resources.\n   * @param endpoints The resource(s) to apply to\n   */\n  public allowPatch(...endpoints: IApiEndpoint[]): void {\n    this.allow(['patch'], ...endpoints);\n  }\n\n  /**\n   * Add \"delete\" permission for the resources.\n   * @param endpoints The resource(s) to apply to\n   */\n  public allowDelete(...endpoints: IApiEndpoint[]): void {\n    this.allow(['delete'], ...endpoints);\n  }\n\n  /**\n   * Add \"deletecollection\" permission for the resources.\n   * @param endpoints The resource(s) to apply to\n   */\n  public allowDeleteCollection(...endpoints: IApiEndpoint[]): void {\n    this.allow(['deletecollection'], ...endpoints);\n  }\n\n  /**\n   * Add \"get\", \"list\", and \"watch\" permissions for the resources.\n   * @param endpoints The resource(s) to apply to\n   */\n  public allowRead(...endpoints: IApiEndpoint[]): void {\n    this.allow(['get', 'list', 'watch'], ...endpoints);\n  }\n\n  /**\n   * Add \"get\", \"list\", \"watch\", \"create\", \"update\", \"patch\", \"delete\", and\n   * \"deletecollection\" permissions for the resources.\n   *\n   * @param endpoints The resource(s) to apply to\n   */\n  public allowReadWrite(...endpoints: IApiEndpoint[]): void {\n    this.allow(['get', 'list', 'watch', 'create', 'update', 'patch', 'delete', 'deletecollection'], ...endpoints);\n  }\n\n  /**\n   * Aggregate rules from roles matching this label selector.\n   */\n  public aggregate(key: string, value: string): void {\n    this._labelSelector[key] = value;\n  }\n\n  /**\n   * Combines the rules of the argument ClusterRole into this ClusterRole\n   * using aggregation labels.\n   * @param rol\n   */\n  public combine(rol: ClusterRole): void {\n    const key = `cdk8s.cluster-role/aggregate-to-${Names.toLabelValue(this)}`;\n    const value = 'true';\n    rol.metadata.addLabel(key, value);\n    this.aggregate(key, value);\n  }\n\n  /**\n   * Create a RoleBinding that binds the permissions in this ClusterRole\n   * to a list of subjects, that will only apply to the given namespace.\n   * @param namespace the namespace to limit permissions to.\n   * @param subjects a list of subjects to bind to\n   */\n  public bindInNamespace(namespace: string, ...subjects: rb.ISubject[]): rb.RoleBinding {\n    const binding = new rb.RoleBinding(this, `RoleBinding-${namespace}`, {\n      metadata: {\n        namespace,\n      },\n      role: this,\n    });\n    binding.addSubjects(...subjects);\n    return binding;\n  }\n\n  /**\n   * Create a ClusterRoleBinding that binds the permissions in this\n   * ClusterRole to a list of subjects, without namespace restrictions.\n   * @param subjects a list of subjects to bind to\n   */\n  public bind(...subjects: rb.ISubject[]): rb.ClusterRoleBinding {\n    const binding = new rb.ClusterRoleBinding(this, 'ClusterRoleBinding', {\n      role: this,\n    });\n    binding.addSubjects(...subjects);\n    return binding;\n  }\n\n  private synthesizeRules(): k8s.PolicyRule[] {\n    const rules: k8s.PolicyRule[] = [];\n    for (const rule of this._rules) {\n      for (const endpoint of rule.endpoints) {\n        const resource = endpoint.asApiResource();\n        const nonResource = endpoint.asNonApiResource();\n\n        if (resource && nonResource) {\n          throw new Error('Endpoint must be either resource or non resource. not both.');\n        }\n\n        if (!resource && !nonResource) {\n          throw new Error('Endpoint must be either resource or non resource. not neither.');\n        }\n\n        if (resource) {\n          rules.push({\n            apiGroups: [resource.apiGroup === 'core' ? '' : resource.apiGroup],\n            resources: [resource.resourceType],\n            resourceNames: resource.resourceName ? [resource.resourceName] : [],\n            verbs: rule.verbs,\n          });\n        }\n        if (nonResource) {\n          rules.push({ verbs: rule.verbs, nonResourceUrLs: [nonResource] });\n        }\n      }\n\n    }\n    return rules;\n  }\n\n  private synthesizeAggregationRules(): k8s.AggregationRule | undefined {\n    if (Object.keys(this._labelSelector).length === 0) {\n      return undefined;\n    }\n\n    return { clusterRoleSelectors: [{ matchLabels: this._labelSelector }] };\n  }\n}\n"]}
|
package/lib/secret.d.ts
ADDED
|
@@ -0,0 +1,195 @@
|
|
|
1
|
+
import { ApiObject } from 'cdk8s';
|
|
2
|
+
import { Construct } from 'constructs';
|
|
3
|
+
import * as base from './base';
|
|
4
|
+
import { EnvValue, EnvValueFromSecretOptions } from './container';
|
|
5
|
+
import * as serviceaccount from './service-account';
|
|
6
|
+
/**
|
|
7
|
+
* Common properties for `Secret`.
|
|
8
|
+
*/
|
|
9
|
+
export interface CommonSecretProps extends base.ResourceProps {
|
|
10
|
+
/**
|
|
11
|
+
* If set to true, ensures that data stored in the Secret cannot be updated (only object metadata can be modified).
|
|
12
|
+
* If not set to true, the field can be modified at any time.
|
|
13
|
+
*
|
|
14
|
+
* @default false
|
|
15
|
+
*/
|
|
16
|
+
readonly immutable?: boolean;
|
|
17
|
+
}
|
|
18
|
+
/**
|
|
19
|
+
* Options for `Secret`.
|
|
20
|
+
*/
|
|
21
|
+
export interface SecretProps extends CommonSecretProps {
|
|
22
|
+
/**
|
|
23
|
+
* stringData allows specifying non-binary secret data in string form. It is
|
|
24
|
+
* provided as a write-only convenience method. All keys and values are merged
|
|
25
|
+
* into the data field on write, overwriting any existing values. It is never
|
|
26
|
+
* output when reading from the API.
|
|
27
|
+
*/
|
|
28
|
+
readonly stringData?: {
|
|
29
|
+
[key: string]: string;
|
|
30
|
+
};
|
|
31
|
+
/**
|
|
32
|
+
* Optional type associated with the secret. Used to facilitate programmatic
|
|
33
|
+
* handling of secret data by various controllers.
|
|
34
|
+
*
|
|
35
|
+
* @default undefined - Don't set a type.
|
|
36
|
+
*/
|
|
37
|
+
readonly type?: string;
|
|
38
|
+
}
|
|
39
|
+
export interface ISecret extends base.IResource {
|
|
40
|
+
/**
|
|
41
|
+
* Returns EnvValue object from a secret's key.
|
|
42
|
+
* @param key Secret's key
|
|
43
|
+
* @param options Additional EnvValue options
|
|
44
|
+
*/
|
|
45
|
+
envValue(key: string, options?: EnvValueFromSecretOptions): EnvValue;
|
|
46
|
+
}
|
|
47
|
+
/**
|
|
48
|
+
* Represents a specific value in JSON secret.
|
|
49
|
+
*/
|
|
50
|
+
export interface SecretValue {
|
|
51
|
+
/**
|
|
52
|
+
* The secret
|
|
53
|
+
*/
|
|
54
|
+
readonly secret: ISecret;
|
|
55
|
+
/**
|
|
56
|
+
* The JSON key
|
|
57
|
+
*/
|
|
58
|
+
readonly key: string;
|
|
59
|
+
}
|
|
60
|
+
/**
|
|
61
|
+
* Kubernetes Secrets let you store and manage sensitive information, such as
|
|
62
|
+
* passwords, OAuth tokens, and ssh keys. Storing confidential information in a
|
|
63
|
+
* Secret is safer and more flexible than putting it verbatim in a Pod
|
|
64
|
+
* definition or in a container image.
|
|
65
|
+
*
|
|
66
|
+
* @see https://kubernetes.io/docs/concepts/configuration/secret
|
|
67
|
+
*/
|
|
68
|
+
export declare class Secret extends base.Resource implements ISecret {
|
|
69
|
+
/**
|
|
70
|
+
* Imports a secret from the cluster as a reference.
|
|
71
|
+
*/
|
|
72
|
+
static fromSecretName(scope: Construct, id: string, name: string): ISecret;
|
|
73
|
+
/**
|
|
74
|
+
* @see base.Resource.apiObject
|
|
75
|
+
*/
|
|
76
|
+
protected readonly apiObject: ApiObject;
|
|
77
|
+
readonly resourceType = "secrets";
|
|
78
|
+
/**
|
|
79
|
+
* Whether or not the secret is immutable.
|
|
80
|
+
*/
|
|
81
|
+
readonly immutable: boolean;
|
|
82
|
+
private readonly stringData;
|
|
83
|
+
constructor(scope: Construct, id: string, props?: SecretProps);
|
|
84
|
+
/**
|
|
85
|
+
* Adds a string data field to the secret.
|
|
86
|
+
* @param key Key
|
|
87
|
+
* @param value Value
|
|
88
|
+
*/
|
|
89
|
+
addStringData(key: string, value: string): void;
|
|
90
|
+
/**
|
|
91
|
+
* Gets a string data by key or undefined
|
|
92
|
+
* @param key Key
|
|
93
|
+
*/
|
|
94
|
+
getStringData(key: string): string | undefined;
|
|
95
|
+
envValue(key: string, options?: EnvValueFromSecretOptions): EnvValue;
|
|
96
|
+
}
|
|
97
|
+
/**
|
|
98
|
+
* Options for `BasicAuthSecret`.
|
|
99
|
+
*/
|
|
100
|
+
export interface BasicAuthSecretProps extends CommonSecretProps {
|
|
101
|
+
/**
|
|
102
|
+
* The user name for authentication
|
|
103
|
+
*/
|
|
104
|
+
readonly username: string;
|
|
105
|
+
/**
|
|
106
|
+
* The password or token for authentication
|
|
107
|
+
*/
|
|
108
|
+
readonly password: string;
|
|
109
|
+
}
|
|
110
|
+
/**
|
|
111
|
+
* Create a secret for basic authentication.
|
|
112
|
+
*
|
|
113
|
+
* @see https://kubernetes.io/docs/concepts/configuration/secret/#basic-authentication-secret
|
|
114
|
+
*/
|
|
115
|
+
export declare class BasicAuthSecret extends Secret {
|
|
116
|
+
constructor(scope: Construct, id: string, props: BasicAuthSecretProps);
|
|
117
|
+
}
|
|
118
|
+
/**
|
|
119
|
+
* Options for `SshAuthSecret`.
|
|
120
|
+
*/
|
|
121
|
+
export interface SshAuthSecretProps extends CommonSecretProps {
|
|
122
|
+
/**
|
|
123
|
+
* The SSH private key to use
|
|
124
|
+
*/
|
|
125
|
+
readonly sshPrivateKey: string;
|
|
126
|
+
}
|
|
127
|
+
/**
|
|
128
|
+
* Create a secret for ssh authentication.
|
|
129
|
+
*
|
|
130
|
+
* @see https://kubernetes.io/docs/concepts/configuration/secret/#ssh-authentication-secrets
|
|
131
|
+
*/
|
|
132
|
+
export declare class SshAuthSecret extends Secret {
|
|
133
|
+
constructor(scope: Construct, id: string, props: SshAuthSecretProps);
|
|
134
|
+
}
|
|
135
|
+
/**
|
|
136
|
+
* Options for `ServiceAccountTokenSecret`.
|
|
137
|
+
*/
|
|
138
|
+
export interface ServiceAccountTokenSecretProps extends CommonSecretProps {
|
|
139
|
+
/**
|
|
140
|
+
* The service account to store a secret for
|
|
141
|
+
*/
|
|
142
|
+
readonly serviceAccount: serviceaccount.IServiceAccount;
|
|
143
|
+
}
|
|
144
|
+
/**
|
|
145
|
+
* Create a secret for a service account token.
|
|
146
|
+
*
|
|
147
|
+
* @see https://kubernetes.io/docs/concepts/configuration/secret/#service-account-token-secrets
|
|
148
|
+
*/
|
|
149
|
+
export declare class ServiceAccountTokenSecret extends Secret {
|
|
150
|
+
constructor(scope: Construct, id: string, props: ServiceAccountTokenSecretProps);
|
|
151
|
+
}
|
|
152
|
+
/**
|
|
153
|
+
* Options for `TlsSecret`.
|
|
154
|
+
*/
|
|
155
|
+
export interface TlsSecretProps extends CommonSecretProps {
|
|
156
|
+
/**
|
|
157
|
+
* The TLS cert
|
|
158
|
+
*/
|
|
159
|
+
readonly tlsCert: string;
|
|
160
|
+
/**
|
|
161
|
+
* The TLS key
|
|
162
|
+
*/
|
|
163
|
+
readonly tlsKey: string;
|
|
164
|
+
}
|
|
165
|
+
/**
|
|
166
|
+
* Create a secret for storing a TLS certificate and its associated key.
|
|
167
|
+
*
|
|
168
|
+
* @see https://kubernetes.io/docs/concepts/configuration/secret/#tls-secrets
|
|
169
|
+
*/
|
|
170
|
+
export declare class TlsSecret extends Secret {
|
|
171
|
+
constructor(scope: Construct, id: string, props: TlsSecretProps);
|
|
172
|
+
}
|
|
173
|
+
/**
|
|
174
|
+
* Options for `DockerConfigSecret`.
|
|
175
|
+
*/
|
|
176
|
+
export interface DockerConfigSecretProps extends CommonSecretProps {
|
|
177
|
+
/**
|
|
178
|
+
* JSON content to provide for the `~/.docker/config.json` file. This will
|
|
179
|
+
* be stringified and inserted as stringData.
|
|
180
|
+
*
|
|
181
|
+
* @see https://docs.docker.com/engine/reference/commandline/cli/#sample-configuration-file
|
|
182
|
+
*/
|
|
183
|
+
readonly data: {
|
|
184
|
+
[key: string]: any;
|
|
185
|
+
};
|
|
186
|
+
}
|
|
187
|
+
/**
|
|
188
|
+
* Create a secret for storing credentials for accessing a container image
|
|
189
|
+
* registry.
|
|
190
|
+
*
|
|
191
|
+
* @see https://kubernetes.io/docs/concepts/configuration/secret/#docker-config-secrets
|
|
192
|
+
*/
|
|
193
|
+
export declare class DockerConfigSecret extends Secret {
|
|
194
|
+
constructor(scope: Construct, id: string, props: DockerConfigSecretProps);
|
|
195
|
+
}
|