Path: blob/main/install/installer/pkg/components/ide-service/rolebinding.go
2501 views
// Copyright (c) 2022 Gitpod GmbH. All rights reserved.1// Licensed under the GNU Affero General Public License (AGPL).2// See License.AGPL.txt in the project root for license information.34package ide_service56import (7"fmt"89"github.com/gitpod-io/gitpod/installer/pkg/common"1011rbacv1 "k8s.io/api/rbac/v1"12metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"13"k8s.io/apimachinery/pkg/runtime"14)1516func rolebinding(ctx *common.RenderContext) ([]runtime.Object, error) {17labels := common.DefaultLabels(Component)1819return []runtime.Object{20&rbacv1.ClusterRoleBinding{21TypeMeta: common.TypeMetaClusterRoleBinding,22ObjectMeta: metav1.ObjectMeta{23Name: fmt.Sprintf("%s-%s-kube-rbac-proxy", ctx.Namespace, Component),24Labels: labels,25},26RoleRef: rbacv1.RoleRef{27Kind: "ClusterRole",28Name: fmt.Sprintf("%s-kube-rbac-proxy", ctx.Namespace),29APIGroup: "rbac.authorization.k8s.io",30},31Subjects: []rbacv1.Subject{32{33Kind: "ServiceAccount",34Name: Component,35Namespace: ctx.Namespace,36},37},38},39&rbacv1.ClusterRoleBinding{40TypeMeta: common.TypeMetaClusterRoleBinding,41ObjectMeta: metav1.ObjectMeta{42Name: Component,43Labels: labels,44},45RoleRef: rbacv1.RoleRef{46Kind: "ClusterRole",47Name: Component,48APIGroup: "rbac.authorization.k8s.io",49},50Subjects: []rbacv1.Subject{51{52Kind: "ServiceAccount",53Name: Component,54Namespace: ctx.Namespace,55},56},57},58&rbacv1.RoleBinding{59TypeMeta: common.TypeMetaRoleBinding,60ObjectMeta: metav1.ObjectMeta{61Name: Component,62Namespace: ctx.Namespace,63Labels: labels,64},65RoleRef: rbacv1.RoleRef{66Kind: "ClusterRole",67Name: fmt.Sprintf("%s-ns-psp:restricted-root-user", ctx.Namespace),68APIGroup: "rbac.authorization.k8s.io",69},70Subjects: []rbacv1.Subject{{71Kind: "ServiceAccount",72Name: Component,73}},74}}, nil75}767778