manifests/hgate/rbac.yaml (66 lines of code) (raw):
# Copyright 2021 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Allow the principal to get audience-based tokens and directly
# access a configmap
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
namespace: istio-system
name: hgate-default-tokens
rules:
- apiGroups: [ "" ]
resources:
- "serviceaccounts/token"
resourceNames:
- "default"
verbs:
- "create"
- "get"
- apiGroups: [ "" ]
resources:
- "configmaps"
resourceNames:
- "istio-ca-root-cert"
- "krun"
verbs:
- "get"
---
# Grant all authenticated users permission to view the hgate service.
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
namespace: istio-system
name: hgate-service-view
rules:
- apiGroups: [ "" ]
resources:
- "configmaps"
- "services"
- "endpoints"
verbs:
- "get"
- "list"
- "watch"
- "create"
- "update"
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
namespace: istio-system
name: hgate-tokens-default
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: hgate-default-tokens
subjects:
- kind: ServiceAccount
name: default
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
namespace: istio-system
name: hgate-service-view
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: hgate-service-view
subjects:
- kind: ServiceAccount
name: default