@@ -58,20 +58,9 @@ var allVersionedRBACRequirements = []VersionedRBACRequirements{
58
58
func (k * KubernetesChecker ) CheckRBAC (ctx context.Context ) []* api.CheckResult {
59
59
const checkName = "kubernetes-rbac"
60
60
authClient := k .client .AuthorizationV1 ()
61
- rbacReqs := findClosestVersionRequirements (k .coderVersion )
62
61
results := make ([]* api.CheckResult , 0 )
63
- if rbacReqs == nil {
64
- results = append (results ,
65
- api .ErrorResult (
66
- checkName ,
67
- "unable to check RBAC requirements" ,
68
- xerrors .Errorf ("unhandled coder version: %s" , k .coderVersion .String ()),
69
- ),
70
- )
71
- return results
72
- }
73
62
74
- for _ , req := range rbacReqs . RBACRequirements {
63
+ for _ , req := range k . rbacRequirements {
75
64
resName := fmt .Sprintf ("%s-%s" , checkName , req .Resource )
76
65
if err := k .checkOneRBAC (ctx , authClient , req ); err != nil {
77
66
summary := fmt .Sprintf ("missing permissions on resource %s: %s" , req .Resource , err )
@@ -120,10 +109,10 @@ func (k *KubernetesChecker) checkOneRBAC(ctx context.Context, authClient authori
120
109
return nil
121
110
}
122
111
123
- func findClosestVersionRequirements (v * semver.Version ) * VersionedRBACRequirements {
112
+ func findClosestVersionRequirements (v * semver.Version ) [] * RBACRequirement {
124
113
for _ , vreqs := range allVersionedRBACRequirements {
125
114
if vreqs .VersionConstraints .Check (v ) {
126
- return & vreqs
115
+ return vreqs . RBACRequirements
127
116
}
128
117
}
129
118
return nil
0 commit comments