role

package
v0.7.1 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Apr 1, 2026 License: Apache-2.0 Imports: 7 Imported by: 0

Documentation

Overview

Package role provides a builder and resource for managing Kubernetes Roles.

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

This section is empty.

Types

type Builder

type Builder struct {
	// contains filtered or unexported fields
}

Builder is a configuration helper for creating and customizing a Role Resource.

It provides a fluent API for registering mutations and data extractors. Build() validates the configuration and returns an initialized Resource ready for use in a reconciliation loop.

func NewBuilder

func NewBuilder(role *rbacv1.Role) *Builder

NewBuilder initializes a new Builder with the provided Role object.

The Role object serves as the desired base state. During reconciliation the Resource will make the cluster's state match this base, modified by any registered mutations.

The provided Role must have both Name and Namespace set, which is validated during the Build() call.

func (*Builder) Build

func (b *Builder) Build() (*Resource, error)

Build validates the configuration and returns the initialized Resource.

It returns an error if:

  • No Role object was provided.
  • The Role is missing a Name or Namespace.

func (*Builder) WithDataExtractor

func (b *Builder) WithDataExtractor(extractor func(rbacv1.Role) error) *Builder

WithDataExtractor registers a function to read values from the Role after it has been successfully reconciled.

The extractor receives a value copy of the reconciled Role. This is useful for surfacing generated or updated entries to other components or resources.

A nil extractor is ignored.

func (*Builder) WithGuard added in v0.4.0

func (b *Builder) WithGuard(guard func(rbacv1.Role) (concepts.GuardStatusWithReason, error)) *Builder

WithGuard registers a guard precondition that is evaluated before the Role is applied during reconciliation. If the guard returns Blocked, the Role and all resources registered after it are skipped until the guard clears. Passing nil clears any previously registered guard.

func (*Builder) WithMutation

func (b *Builder) WithMutation(m Mutation) *Builder

WithMutation registers a mutation for the Role.

Mutations are applied sequentially during the Mutate() phase of reconciliation. A mutation with a nil Feature is applied unconditionally; one with a non-nil Feature is applied only when that feature is enabled.

type Mutation

type Mutation feature.Mutation[*Mutator]

Mutation defines a mutation that is applied to a role Mutator only if its associated feature gate is enabled.

type Mutator

type Mutator struct {
	// contains filtered or unexported fields
}

Mutator is a high-level helper for modifying a Kubernetes Role.

It uses a "plan-and-apply" pattern: mutations are recorded first, then applied to the Role in a single controlled pass when Apply() is called.

The Mutator maintains feature boundaries: each feature's mutations are planned together and applied in the order the features were registered.

Mutator implements editors.ObjectMutator.

func NewMutator

func NewMutator(role *rbacv1.Role) *Mutator

NewMutator creates a new Mutator for the given Role. The constructor creates the initial feature scope, so mutations can be registered immediately without an explicit call to NextFeature.

func (*Mutator) Apply

func (m *Mutator) Apply() error

Apply executes all recorded mutation intents on the underlying Role.

Execution order across all registered features:

  1. Metadata edits (in registration order within each feature)
  2. Rules edits (in registration order within each feature)

Features are applied in the order they were registered. Later features observe the Role as modified by all previous features.

func (*Mutator) EditObjectMetadata

func (m *Mutator) EditObjectMetadata(edit func(*editors.ObjectMetaEditor) error)

EditObjectMetadata records a mutation for the Role's own metadata.

Metadata edits are applied before rules edits within the same feature. A nil edit function is ignored.

func (*Mutator) EditRules

func (m *Mutator) EditRules(edit func(*editors.PolicyRulesEditor) error)

EditRules records a mutation for the Role's .rules field via a PolicyRulesEditor.

The editor provides SetRules to replace atomically, AddRule to append, and Raw() for free-form access. Rules edits are applied after metadata edits within the same feature, in registration order.

A nil edit function is ignored.

func (*Mutator) NextFeature

func (m *Mutator) NextFeature()

NextFeature advances to a new feature planning scope. All subsequent mutation registrations will be grouped into this scope until NextFeature is called again.

The first scope is created automatically by NewMutator. This method is called by the framework between mutations to maintain per-feature ordering semantics.

type Resource

type Resource struct {
	// contains filtered or unexported fields
}

Resource is a high-level abstraction for managing a Kubernetes Role within a controller's reconciliation loop.

It implements the following component interfaces:

  • component.Resource: for basic identity and mutation behaviour.
  • concepts.Guardable: for conditional reconciliation based on a guard precondition.
  • concepts.DataExtractable: for exporting values after successful reconciliation.

Role resources are static: they do not model convergence health, grace periods, or suspension. Use a workload or task primitive for resources that require those concepts.

func (*Resource) ExtractData

func (r *Resource) ExtractData() error

ExtractData executes all registered data extractor functions against a deep copy of the reconciled Role.

This is called by the framework after successful reconciliation, allowing the component to read generated or updated values from the Role.

func (*Resource) GuardStatus added in v0.4.0

func (r *Resource) GuardStatus() (concepts.GuardStatusWithReason, error)

GuardStatus evaluates the resource's guard precondition. If no guard was registered, the resource is unconditionally unblocked.

func (*Resource) Identity

func (r *Resource) Identity() string

Identity returns a unique identifier for the Role in the format "rbac.authorization.k8s.io/v1/Role/<namespace>/<name>".

func (*Resource) Mutate

func (r *Resource) Mutate(current client.Object) error

Mutate transforms the current state of a Kubernetes Role into the desired state.

The mutation process follows this order:

  1. The desired base state is applied to the current object.
  2. Feature mutations: all registered feature-gated mutations are applied in order.

This method is invoked by the framework during the Update phase of reconciliation.

func (*Resource) Object

func (r *Resource) Object() (client.Object, error)

Object returns a deep copy of the underlying Kubernetes Role object.

The returned object implements client.Object, making it compatible with controller-runtime's Client for Create, Update, and Patch operations.

func (*Resource) PreviewObject added in v0.6.0

func (r *Resource) PreviewObject() (*rbacv1.Role, error)

PreviewObject returns the Role as it would appear after feature mutations have been applied, without modifying the resource's internal state.

Suspension mutations are not applied; the preview reflects content state only.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL