catalog/project/kcc-namespace/kcc-namespace-viewer.yaml (27 lines of code) (raw):
# Copyright 2021 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Give KCC for this project's namespace permission to read KCC resources in the networking namespace.
# This allows GKE and GCE instances to reference the shared network in the networking namespace.
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: cnrm-network-viewer-project-id # kpt-set: cnrm-network-viewer-${project-id}
namespace: networking # kpt-set: ${networking-namespace}
roleRef:
name: cnrm-viewer
kind: ClusterRole
apiGroup: rbac.authorization.k8s.io
subjects:
- name: cnrm-controller-manager-project-id # kpt-set: cnrm-controller-manager-${project-id}
namespace: cnrm-system
kind: ServiceAccount
---
# Give KCC for this project's namespace permission to read KCC resources in the projects namespace.
# This allows IAMMemberPolicy in this project's namespace to reference the project in the projects namespace.
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: cnrm-project-viewer-project-id # kpt-set: cnrm-project-viewer-${project-id}
namespace: projects # kpt-set: ${projects-namespace}
roleRef:
name: cnrm-viewer
kind: ClusterRole
apiGroup: rbac.authorization.k8s.io
subjects:
- name: cnrm-controller-manager-project-id # kpt-set: cnrm-controller-manager-${project-id}
namespace: cnrm-system
kind: ServiceAccount