solutions/guardrails/configs/iam/org-iam.yaml (67 lines of code) (raw):
# Copyright 2022 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#########
# Create GCP ServiceAccount for use by KCC to manage resources in this project
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMServiceAccount
metadata:
name: project-id # kpt-set: ${guardrails-project-id}
namespace: config-control # kpt-set: ${management-namespace}
annotations:
cnrm.cloud.google.com/project-id: config-controller-project # kpt-set: ${management-project-id}
spec:
displayName: project-id # kpt-set: ${guardrails-project-id}
---
# Allow KCC's Kubernetes Service Account to use the GCP ServiceAccount
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMPartialPolicy
metadata:
name: project-id-sa-workload-identity-binding # kpt-set: ${guardrails-project-id}-sa-workload-identity-binding
namespace: config-control # kpt-set: ${management-namespace}
annotations:
cnrm.cloud.google.com/project-id: config-controller-project # kpt-set: ${management-project-id}
spec:
resourceRef:
name: project-id # kpt-set: ${guardrails-project-id}
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMServiceAccount
bindings:
- role: roles/iam.workloadIdentityUser
members:
- member: serviceAccount:config-controller-project.svc.id.goog[cnrm-system/cnrm-controller-manager-guardrails] # kpt-set: serviceAccount:${management-project-id}.svc.id.goog[cnrm-system/cnrm-controller-manager-${guardrails-namespace}]
---
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMPolicyMember
metadata:
name: config-controller-project-org-policyadmin # kpt-set: ${management-project-id}-org-policyadmin
namespace: config-control # kpt-set: ${management-namespace}
spec:
member: serviceAccount:service-0000000000@gcp-sa-yakima.iam.gserviceaccount.com # kpt-set: serviceAccount:service-${management-project-number}@gcp-sa-yakima.iam.gserviceaccount.com
resourceRef:
apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1
kind: Organization
external: "0000000000" # kpt-set: ${org-id}
role: roles/orgpolicy.policyAdmin
---
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMPolicyMember
metadata:
name: config-controller-project-sa-logging-admin # kpt-set: ${management-project-id}-sa-logging-admin
namespace: config-control # kpt-set: ${management-namespace}
spec:
member: serviceAccount:service-0000000000@gcp-sa-yakima.iam.gserviceaccount.com # kpt-set: serviceAccount:service-${management-project-number}@gcp-sa-yakima.iam.gserviceaccount.com
resourceRef:
apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1
kind: Organization
external: "0000000000" # kpt-set: ${org-id}
role: roles/logging.admin
---
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMPolicyMember
metadata: # kpt-merge: config-control/guardrails-bq-admin
name: config-controller-project-sa-role-admin # kpt-set: ${guardrails-project-id}-sa-role-admin
namespace: config-control # kpt-set: ${management-namespace}
annotations:
cnrm.cloud.google.com/blueprint: 'kpt-pkg-fn-live'
spec:
member: serviceAccount:service-0000000000@gcp-sa-yakima.iam.gserviceaccount.com # kpt-set: serviceAccount:service-${management-project-number}@gcp-sa-yakima.iam.gserviceaccount.com
resourceRef:
apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1
kind: Organization
external: "0000000000" # kpt-set: ${org-id}
role: roles/iam.organizationRoleAdmin