Path: blob/main/install/installer/pkg/components/ws-manager-bridge/rolebinding.go
2501 views
// Copyright (c) 2021 Gitpod GmbH. All rights reserved.1// Licensed under the GNU Affero General Public License (AGPL).2// See License.AGPL.txt in the project root for license information.34package wsmanagerbridge56import (7"fmt"89"github.com/gitpod-io/gitpod/installer/pkg/common"1011rbacv1 "k8s.io/api/rbac/v1"12metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"13"k8s.io/apimachinery/pkg/runtime"14)1516func rolebinding(ctx *common.RenderContext) ([]runtime.Object, error) {17labels := common.DefaultLabels(Component)1819return []runtime.Object{20&rbacv1.ClusterRoleBinding{21TypeMeta: common.TypeMetaClusterRoleBinding,22ObjectMeta: metav1.ObjectMeta{23Name: fmt.Sprintf("%s-%s-rb-kube-rbac-proxy", ctx.Namespace, Component),24Labels: labels,25},26RoleRef: rbacv1.RoleRef{27Kind: "ClusterRole",28Name: fmt.Sprintf("%s-kube-rbac-proxy", ctx.Namespace),29APIGroup: "rbac.authorization.k8s.io",30},31Subjects: []rbacv1.Subject{{32Kind: "ServiceAccount",33Name: Component,34Namespace: ctx.Namespace,35}},36},37&rbacv1.RoleBinding{38TypeMeta: common.TypeMetaRoleBinding,39ObjectMeta: metav1.ObjectMeta{40Name: Component,41Namespace: ctx.Namespace,42Labels: labels,43},44RoleRef: rbacv1.RoleRef{45APIGroup: "rbac.authorization.k8s.io",46Kind: "ClusterRole",47Name: fmt.Sprintf("%s-ns-psp:unprivileged", ctx.Namespace),48},49Subjects: []rbacv1.Subject{50{51Kind: "ServiceAccount",52Name: Component,53},54},55},56}, nil57}585960