use k8s_openapi::{
api::rbac::v1::{ClusterRole, ClusterRoleBinding, Role, RoleBinding},
chrono::Utc,
};
use super::{models::KubeResource, utils};
#[derive(Clone, Debug, PartialEq)]
pub struct KubeRoles {
pub namespace: String,
pub name: String,
pub age: String,
k8s_obj: Role,
}
#[derive(Clone, Debug, PartialEq)]
pub struct KubeRoleBindings {
pub namespace: String,
pub name: String,
pub role: String,
pub age: String,
k8s_obj: RoleBinding,
}
#[derive(Clone, Debug, PartialEq)]
pub struct KubeClusterRoles {
pub name: String,
pub age: String,
k8s_obj: ClusterRole,
}
#[derive(Clone, Debug, PartialEq)]
pub struct KubeClusterRoleBinding {
pub name: String,
pub role: String,
pub age: String,
k8s_obj: ClusterRoleBinding,
}
impl KubeResource<Role> for KubeRoles {
fn from_api(role: &Role) -> Self {
KubeRoles {
namespace: role.metadata.namespace.clone().unwrap_or_default(),
name: role.metadata.name.clone().unwrap_or_default(),
age: utils::to_age(role.metadata.creation_timestamp.as_ref(), Utc::now()),
k8s_obj: role.to_owned(),
}
}
fn get_k8s_obj(&self) -> &Role {
&self.k8s_obj
}
}
impl KubeResource<ClusterRole> for KubeClusterRoles {
fn from_api(cluster_role: &ClusterRole) -> Self {
KubeClusterRoles {
name: cluster_role.metadata.name.clone().unwrap_or_default(),
age: utils::to_age(
cluster_role.metadata.creation_timestamp.as_ref(),
Utc::now(),
),
k8s_obj: cluster_role.to_owned(),
}
}
fn get_k8s_obj(&self) -> &ClusterRole {
&self.k8s_obj
}
}
impl KubeResource<RoleBinding> for KubeRoleBindings {
fn from_api(role_binding: &RoleBinding) -> Self {
KubeRoleBindings {
namespace: role_binding.metadata.namespace.clone().unwrap_or_default(),
name: role_binding.metadata.name.clone().unwrap_or_default(),
role: role_binding.role_ref.name.clone(),
age: utils::to_age(
role_binding.metadata.creation_timestamp.as_ref(),
Utc::now(),
),
k8s_obj: role_binding.to_owned(),
}
}
fn get_k8s_obj(&self) -> &RoleBinding {
&self.k8s_obj
}
}
impl KubeResource<ClusterRoleBinding> for KubeClusterRoleBinding {
fn from_api(cluster_role_binding: &ClusterRoleBinding) -> Self {
KubeClusterRoleBinding {
name: cluster_role_binding
.metadata
.name
.clone()
.unwrap_or_default(),
role: format!(
"{}/{}",
cluster_role_binding.role_ref.kind.clone(),
cluster_role_binding.role_ref.name.clone()
),
age: utils::to_age(
cluster_role_binding.metadata.creation_timestamp.as_ref(),
Utc::now(),
),
k8s_obj: cluster_role_binding.to_owned(),
}
}
fn get_k8s_obj(&self) -> &ClusterRoleBinding {
&self.k8s_obj
}
}
#[cfg(test)]
mod tests {
use k8s_openapi::chrono::Utc;
use crate::app::{
roles::{KubeClusterRoleBinding, KubeClusterRoles, KubeRoleBindings, KubeRoles},
test_utils::{convert_resource_from_file, get_time},
utils,
};
#[test]
fn test_roles_binding_from_rbac_api() {
let (roles, roles_list): (Vec<KubeRoles>, Vec<_>) = convert_resource_from_file("roles");
assert_eq!(roles.len(), 1);
assert_eq!(
roles[0],
KubeRoles {
namespace: "default".to_string(),
name: "kiali-viewer".into(),
age: utils::to_age(Some(&get_time("2022-06-27T16:33:06Z")), Utc::now()),
k8s_obj: roles_list[0].clone(),
}
)
}
#[test]
fn test_cluster_roles_from_rbac_api() {
let (cluster_roles, cluster_roles_list): (Vec<KubeClusterRoles>, Vec<_>) =
convert_resource_from_file("clusterroles");
assert_eq!(cluster_roles.len(), 1);
assert_eq!(
cluster_roles[0],
KubeClusterRoles {
name: "admin".into(),
age: utils::to_age(Some(&get_time("2021-12-14T11:04:22Z")), Utc::now()),
k8s_obj: cluster_roles_list[0].clone(),
}
)
}
#[test]
fn test_role_binding_from_rbac_api() {
let (role_bindings, rolebindings_list): (Vec<KubeRoleBindings>, Vec<_>) =
convert_resource_from_file("role_bindings");
assert_eq!(role_bindings.len(), 1);
assert_eq!(
role_bindings[0],
KubeRoleBindings {
namespace: "default".to_string(),
name: "kiali".into(),
role: "kiali-viewer".into(),
age: utils::to_age(Some(&get_time("2022-06-27T16:33:07Z")), Utc::now()),
k8s_obj: rolebindings_list[0].clone(),
}
)
}
#[test]
fn test_cluster_role_bindings_from_rbac_api() {
let (cluster_role_binding, cluster_role_bindings_list): (Vec<KubeClusterRoleBinding>, Vec<_>) =
convert_resource_from_file("clusterrole_binding");
assert_eq!(cluster_role_binding.len(), 2);
assert_eq!(
cluster_role_binding[0],
KubeClusterRoleBinding {
name: "admin-user".into(),
role: "ClusterRole/cluster-admin".into(),
age: utils::to_age(Some(&get_time("2022-03-02T16:50:53Z")), Utc::now()),
k8s_obj: cluster_role_bindings_list[0].clone(),
}
)
}
}