manifests/hgate/rbac.yaml (66 lines of code) (raw):

# Copyright 2021 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Allow the principal to get audience-based tokens and directly # access a configmap apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: namespace: istio-system name: hgate-default-tokens rules: - apiGroups: [ "" ] resources: - "serviceaccounts/token" resourceNames: - "default" verbs: - "create" - "get" - apiGroups: [ "" ] resources: - "configmaps" resourceNames: - "istio-ca-root-cert" - "krun" verbs: - "get" --- # Grant all authenticated users permission to view the hgate service. apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: namespace: istio-system name: hgate-service-view rules: - apiGroups: [ "" ] resources: - "configmaps" - "services" - "endpoints" verbs: - "get" - "list" - "watch" - "create" - "update" --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: namespace: istio-system name: hgate-tokens-default roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: hgate-default-tokens subjects: - kind: ServiceAccount name: default --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: namespace: istio-system name: hgate-service-view roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: hgate-service-view subjects: - kind: ServiceAccount name: default