solutions/legacy/landing-zone-v2/namespaces/gatekeeper-system.yaml (54 lines of code) (raw):

# Copyright 2021 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. ######### # Since we are using GKE Workload Identity we must complete the following steps outlined in # [Implementing Policy Controller Metrics](https://cloud.google.com/anthos-config-management/docs/how-to/policy-controller-metrics) # to implement Policy Controller Metrics and avoid numerous IAM errors on the Config Controller instance. ######### # GCP SA # AC-3(7) - Creates lower priv service account for Policy Controller metrics apiVersion: iam.cnrm.cloud.google.com/v1beta1 kind: IAMServiceAccount metadata: name: gatekeeper-admin-sa namespace: config-control # kpt-set: ${management-namespace} annotations: cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id} cnrm.cloud.google.com/ignore-clusterless: "true" spec: displayName: gatekeeper-admin-sa --- # Grant GCP role Metrics Writer to gatekeeper-admin SA on KCC Project # AC-3(7) - RBAC role to account with required permissions for Policy Controller metrics apiVersion: iam.cnrm.cloud.google.com/v1beta1 kind: IAMPolicyMember metadata: name: gatekeeper-admin-sa-metric-writer-permissions namespace: config-control # kpt-set: ${management-namespace} annotations: cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id} cnrm.cloud.google.com/ignore-clusterless: "true" spec: resourceRef: apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 kind: Project external: management-project-id # kpt-set: ${management-project-id} role: roles/monitoring.metricWriter member: "serviceAccount:gatekeeper-admin-sa@management-project-id.iam.gserviceaccount.com" # kpt-set: serviceAccount:gatekeeper-admin-sa@${management-project-id}.iam.gserviceaccount.com --- # K8S SA apiVersion: iam.cnrm.cloud.google.com/v1beta1 kind: IAMPartialPolicy metadata: name: gatekeeper-admin-sa-workload-identity-binding namespace: config-control # kpt-set: ${management-namespace} annotations: cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id} cnrm.cloud.google.com/ignore-clusterless: "true" spec: resourceRef: name: gatekeeper-admin-sa apiVersion: iam.cnrm.cloud.google.com/v1beta1 kind: IAMServiceAccount bindings: - role: roles/iam.workloadIdentityUser members: - member: serviceAccount:management-project-id.svc.id.goog[gatekeeper-system/gatekeeper-admin] # kpt-set: serviceAccount:${management-project-id}.svc.id.goog[gatekeeper-system/gatekeeper-admin] --- # Link GCP SA to K8S namespace apiVersion: core.cnrm.cloud.google.com/v1beta1 kind: ConfigConnectorContext metadata: name: configconnectorcontext.core.cnrm.cloud.google.com namespace: gatekeeper-system annotations: cnrm.cloud.google.com/ignore-clusterless: "true" spec: googleServiceAccount: gatekeeper-admin-sa@management-project-id.iam.gserviceaccount.com # kpt-set: gatekeeper-admin-sa@${management-project-id}.iam.gserviceaccount.com