|  | 
|  | 1 | +package resources | 
|  | 2 | + | 
|  | 3 | +import ( | 
|  | 4 | +	"fmt" | 
|  | 5 | + | 
|  | 6 | +	v1 "k8s.io/api/rbac/v1" | 
|  | 7 | +	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | 
|  | 8 | +) | 
|  | 9 | + | 
|  | 10 | +type ClusterRoleBindingMutator struct { | 
|  | 11 | +	ClusterRoleBindingName  string | 
|  | 12 | +	ClusterRoleName         string | 
|  | 13 | +	ServiceAccountName      string | 
|  | 14 | +	ServiceAccountNamespace string | 
|  | 15 | +	Labels                  map[string]string | 
|  | 16 | +} | 
|  | 17 | + | 
|  | 18 | +var _ Mutator[*v1.ClusterRoleBinding] = &ClusterRoleBindingMutator{} | 
|  | 19 | + | 
|  | 20 | +func (m *ClusterRoleBindingMutator) String() string { | 
|  | 21 | +	return fmt.Sprintf("clusterrolebinding %s", m.ClusterRoleBindingName) | 
|  | 22 | +} | 
|  | 23 | + | 
|  | 24 | +func (m *ClusterRoleBindingMutator) Empty() *v1.ClusterRoleBinding { | 
|  | 25 | +	return &v1.ClusterRoleBinding{ | 
|  | 26 | +		TypeMeta: metav1.TypeMeta{ | 
|  | 27 | +			APIVersion: "rbac.authorization.k8s.io/v1", | 
|  | 28 | +			Kind:       "ClusterRoleBinding", | 
|  | 29 | +		}, | 
|  | 30 | +		ObjectMeta: metav1.ObjectMeta{ | 
|  | 31 | +			Name: m.ClusterRoleBindingName, | 
|  | 32 | +		}, | 
|  | 33 | +	} | 
|  | 34 | +} | 
|  | 35 | + | 
|  | 36 | +func (m *ClusterRoleBindingMutator) Mutate(r *v1.ClusterRoleBinding) error { | 
|  | 37 | +	r.ObjectMeta.Labels = m.Labels | 
|  | 38 | +	r.RoleRef = v1.RoleRef{ | 
|  | 39 | +		APIGroup: "rbac.authorization.k8s.io", | 
|  | 40 | +		Kind:     "ClusterRole", | 
|  | 41 | +		Name:     m.ClusterRoleName, | 
|  | 42 | +	} | 
|  | 43 | +	r.Subjects = []v1.Subject{ | 
|  | 44 | +		{ | 
|  | 45 | +			Kind:      "ServiceAccount", | 
|  | 46 | +			Name:      m.ServiceAccountName, | 
|  | 47 | +			Namespace: m.ServiceAccountNamespace, | 
|  | 48 | +		}, | 
|  | 49 | +	} | 
|  | 50 | +	return nil | 
|  | 51 | +} | 
0 commit comments