solutions/experimentation/core-landing-zone/namespaces/projects.yaml (189 lines of code) (raw):

# Copyright 2021 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. ######### # GCP SA apiVersion: iam.cnrm.cloud.google.com/v1beta1 kind: IAMServiceAccount metadata: name: projects-sa namespace: config-control # kpt-set: ${management-namespace} annotations: cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id} cnrm.cloud.google.com/ignore-clusterless: "true" spec: displayName: projects-sa --- # Grant GCP role Project IAM Admin to GCP SA apiVersion: iam.cnrm.cloud.google.com/v1beta1 kind: IAMPolicyMember metadata: name: projects-sa-projectiamadmin-permissions namespace: config-control # kpt-set: ${management-namespace} annotations: cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id} cnrm.cloud.google.com/ignore-clusterless: "true" spec: resourceRef: apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 kind: Folder external: "123456789012" # kpt-set: ${lz-folder-id} role: roles/resourcemanager.projectIamAdmin member: "serviceAccount:projects-sa@management-project-id.iam.gserviceaccount.com" # kpt-set: serviceAccount:projects-sa@${management-project-id}.iam.gserviceaccount.com --- # Grant GCP role Project Creator to GCP SA apiVersion: iam.cnrm.cloud.google.com/v1beta1 kind: IAMPolicyMember metadata: name: projects-sa-projectcreator-permissions namespace: config-control # kpt-set: ${management-namespace} annotations: cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id} cnrm.cloud.google.com/ignore-clusterless: "true" spec: resourceRef: apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 kind: Folder external: "123456789012" # kpt-set: ${lz-folder-id} role: roles/resourcemanager.projectCreator member: "serviceAccount:projects-sa@management-project-id.iam.gserviceaccount.com" # kpt-set: serviceAccount:projects-sa@${management-project-id}.iam.gserviceaccount.com --- # Grant GCP role Project Mover to GCP SA apiVersion: iam.cnrm.cloud.google.com/v1beta1 kind: IAMPolicyMember metadata: name: projects-sa-projectmover-permissions namespace: config-control # kpt-set: ${management-namespace} annotations: cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id} cnrm.cloud.google.com/ignore-clusterless: "true" spec: resourceRef: apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 kind: Folder external: "123456789012" # kpt-set: ${lz-folder-id} role: roles/resourcemanager.projectMover member: "serviceAccount:projects-sa@management-project-id.iam.gserviceaccount.com" # kpt-set: serviceAccount:projects-sa@${management-project-id}.iam.gserviceaccount.com --- # Grant GCP role Project Deleter to GCP SA apiVersion: iam.cnrm.cloud.google.com/v1beta1 kind: IAMPolicyMember metadata: name: projects-sa-projectdeleter-permissions namespace: config-control # kpt-set: ${management-namespace} annotations: cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id} cnrm.cloud.google.com/ignore-clusterless: "true" spec: resourceRef: apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 kind: Folder external: "123456789012" # kpt-set: ${lz-folder-id} role: roles/resourcemanager.projectDeleter member: "serviceAccount:projects-sa@management-project-id.iam.gserviceaccount.com" # kpt-set: serviceAccount:projects-sa@${management-project-id}.iam.gserviceaccount.com --- # Grant GCP role Service Usage Admin to GCP SA apiVersion: iam.cnrm.cloud.google.com/v1beta1 kind: IAMPolicyMember metadata: name: projects-sa-serviceusageadmin-permissions namespace: config-control # kpt-set: ${management-namespace} annotations: cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id} cnrm.cloud.google.com/ignore-clusterless: "true" spec: resourceRef: apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 kind: Folder external: "123456789012" # kpt-set: ${lz-folder-id} role: roles/serviceusage.serviceUsageAdmin member: "serviceAccount:projects-sa@management-project-id.iam.gserviceaccount.com" # kpt-set: serviceAccount:projects-sa@${management-project-id}.iam.gserviceaccount.com --- # Grant GCP role Billing User to GCP SA # This role cannot be defined at a folder level. It can only be set at the org level. apiVersion: iam.cnrm.cloud.google.com/v1beta1 kind: IAMPolicyMember metadata: name: projects-sa-billinguser-permissions namespace: config-control # kpt-set: ${management-namespace} annotations: cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id} cnrm.cloud.google.com/ignore-clusterless: "true" spec: resourceRef: apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 kind: Organization external: "123456789012" # kpt-set: ${org-id} role: roles/billing.user member: "serviceAccount:projects-sa@management-project-id.iam.gserviceaccount.com" # kpt-set: serviceAccount:projects-sa@${management-project-id}.iam.gserviceaccount.com --- # K8S SA apiVersion: iam.cnrm.cloud.google.com/v1beta1 kind: IAMPartialPolicy metadata: name: projects-sa-workload-identity-binding namespace: config-control # kpt-set: ${management-namespace} annotations: cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id} cnrm.cloud.google.com/ignore-clusterless: "true" spec: resourceRef: name: projects-sa apiVersion: iam.cnrm.cloud.google.com/v1beta1 kind: IAMServiceAccount bindings: - role: roles/iam.workloadIdentityUser members: - member: serviceAccount:management-project-id.svc.id.goog[cnrm-system/cnrm-controller-manager-projects] # kpt-set: serviceAccount:${management-project-id}.svc.id.goog[cnrm-system/cnrm-controller-manager-projects] --- # K8S namespace apiVersion: v1 kind: Namespace metadata: name: projects annotations: cnrm.cloud.google.com/ignore-clusterless: "true" --- # Link GCP SA to K8S namespace apiVersion: core.cnrm.cloud.google.com/v1beta1 kind: ConfigConnectorContext metadata: name: configconnectorcontext.core.cnrm.cloud.google.com namespace: projects annotations: cnrm.cloud.google.com/ignore-clusterless: "true" spec: googleServiceAccount: projects-sa@management-project-id.iam.gserviceaccount.com # kpt-set: projects-sa@${management-project-id}.iam.gserviceaccount.com --- # Grant viewer role on the projects namespace to logging K8S SA apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: allow-projects-resource-reference-from-logging namespace: projects annotations: cnrm.cloud.google.com/ignore-clusterless: "true" roleRef: name: cnrm-viewer kind: ClusterRole apiGroup: rbac.authorization.k8s.io subjects: - name: cnrm-controller-manager-logging namespace: cnrm-system kind: ServiceAccount --- # Grant viewer role on the projects namespace to networking K8S SA apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: allow-projects-resource-reference-from-networking namespace: projects annotations: cnrm.cloud.google.com/ignore-clusterless: "true" roleRef: name: cnrm-viewer kind: ClusterRole apiGroup: rbac.authorization.k8s.io subjects: - name: cnrm-controller-manager-networking namespace: cnrm-system kind: ServiceAccount --- # Grant viewer role on the projects namespace to policies K8S SA apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: allow-projects-resource-reference-from-policies namespace: projects annotations: cnrm.cloud.google.com/ignore-clusterless: "true" roleRef: name: cnrm-viewer kind: ClusterRole apiGroup: rbac.authorization.k8s.io subjects: - name: cnrm-controller-manager-policies namespace: cnrm-system kind: ServiceAccount