solutions/legacy/landing-zone-v2/namespaces/projects.yaml (190 lines of code) (raw):
# Copyright 2021 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#########
# GCP SA
# AC-3(7) - Creates lower priv service account for administration of projects
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMServiceAccount
metadata:
name: projects-sa
namespace: config-control # kpt-set: ${management-namespace}
annotations:
cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id}
cnrm.cloud.google.com/ignore-clusterless: "true"
spec:
displayName: projects-sa
---
# Grant GCP role Project IAM Admin to GCP SA
# AC-3(7) - RBAC role to account with required permissions for administration of projects
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMPolicyMember
metadata:
name: projects-sa-projectiamadmin-permissions
namespace: config-control # kpt-set: ${management-namespace}
annotations:
cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id}
cnrm.cloud.google.com/ignore-clusterless: "true"
spec:
resourceRef:
apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1
kind: Folder
external: "123456789012" # kpt-set: ${lz-folder-id}
role: roles/resourcemanager.projectIamAdmin
member: "serviceAccount:projects-sa@management-project-id.iam.gserviceaccount.com" # kpt-set: serviceAccount:projects-sa@${management-project-id}.iam.gserviceaccount.com
---
# Grant GCP role Project Creator to GCP SA
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMPolicyMember
metadata:
name: projects-sa-projectcreator-permissions
namespace: config-control # kpt-set: ${management-namespace}
annotations:
cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id}
cnrm.cloud.google.com/ignore-clusterless: "true"
spec:
resourceRef:
apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1
kind: Folder
external: "123456789012" # kpt-set: ${lz-folder-id}
role: roles/resourcemanager.projectCreator
member: "serviceAccount:projects-sa@management-project-id.iam.gserviceaccount.com" # kpt-set: serviceAccount:projects-sa@${management-project-id}.iam.gserviceaccount.com
---
# Grant GCP role Project Mover to GCP SA
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMPolicyMember
metadata:
name: projects-sa-projectmover-permissions
namespace: config-control # kpt-set: ${management-namespace}
annotations:
cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id}
cnrm.cloud.google.com/ignore-clusterless: "true"
spec:
resourceRef:
apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1
kind: Folder
external: "123456789012" # kpt-set: ${lz-folder-id}
role: roles/resourcemanager.projectMover
member: "serviceAccount:projects-sa@management-project-id.iam.gserviceaccount.com" # kpt-set: serviceAccount:projects-sa@${management-project-id}.iam.gserviceaccount.com
---
# Grant GCP role Project Deleter to GCP SA
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMPolicyMember
metadata:
name: projects-sa-projectdeleter-permissions
namespace: config-control # kpt-set: ${management-namespace}
annotations:
cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id}
cnrm.cloud.google.com/ignore-clusterless: "true"
spec:
resourceRef:
apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1
kind: Folder
external: "123456789012" # kpt-set: ${lz-folder-id}
role: roles/resourcemanager.projectDeleter
member: "serviceAccount:projects-sa@management-project-id.iam.gserviceaccount.com" # kpt-set: serviceAccount:projects-sa@${management-project-id}.iam.gserviceaccount.com
---
# Grant GCP role Service Usage Admin to GCP SA
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMPolicyMember
metadata:
name: projects-sa-serviceusageadmin-permissions
namespace: config-control # kpt-set: ${management-namespace}
annotations:
cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id}
cnrm.cloud.google.com/ignore-clusterless: "true"
spec:
resourceRef:
apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1
kind: Folder
external: "123456789012" # kpt-set: ${lz-folder-id}
role: roles/serviceusage.serviceUsageAdmin
member: "serviceAccount:projects-sa@management-project-id.iam.gserviceaccount.com" # kpt-set: serviceAccount:projects-sa@${management-project-id}.iam.gserviceaccount.com
---
# Grant GCP role Billing User to GCP SA
# This role cannot be defined at a folder level. It can only be set at the org level.
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMPolicyMember
metadata:
name: projects-sa-billinguser-permissions
namespace: config-control # kpt-set: ${management-namespace}
annotations:
cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id}
cnrm.cloud.google.com/ignore-clusterless: "true"
spec:
resourceRef:
apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1
kind: Organization
external: "123456789012" # kpt-set: ${org-id}
role: roles/billing.user
member: "serviceAccount:projects-sa@management-project-id.iam.gserviceaccount.com" # kpt-set: serviceAccount:projects-sa@${management-project-id}.iam.gserviceaccount.com
---
# K8S SA
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMPartialPolicy
metadata:
name: projects-sa-workload-identity-binding
namespace: config-control # kpt-set: ${management-namespace}
annotations:
cnrm.cloud.google.com/project-id: management-project-id # kpt-set: ${management-project-id}
cnrm.cloud.google.com/ignore-clusterless: "true"
spec:
resourceRef:
name: projects-sa
apiVersion: iam.cnrm.cloud.google.com/v1beta1
kind: IAMServiceAccount
bindings:
- role: roles/iam.workloadIdentityUser
members:
- member: serviceAccount:management-project-id.svc.id.goog[cnrm-system/cnrm-controller-manager-projects] # kpt-set: serviceAccount:${management-project-id}.svc.id.goog[cnrm-system/cnrm-controller-manager-projects]
---
# K8S namespace
apiVersion: v1
kind: Namespace
metadata:
name: projects
annotations:
cnrm.cloud.google.com/ignore-clusterless: "true"
---
# Link GCP SA to K8S namespace
apiVersion: core.cnrm.cloud.google.com/v1beta1
kind: ConfigConnectorContext
metadata:
name: configconnectorcontext.core.cnrm.cloud.google.com
namespace: projects
annotations:
cnrm.cloud.google.com/ignore-clusterless: "true"
cnrm.cloud.google.com/blueprint: 'kpt-pkg'
spec:
googleServiceAccount: projects-sa@management-project-id.iam.gserviceaccount.com # kpt-set: projects-sa@${management-project-id}.iam.gserviceaccount.com
---
# Grant viewer role on the projects namespace to logging K8S SA
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: allow-projects-resource-reference-from-logging
namespace: projects
annotations:
cnrm.cloud.google.com/ignore-clusterless: "true"
roleRef:
name: cnrm-viewer
kind: ClusterRole
apiGroup: rbac.authorization.k8s.io
subjects:
- name: cnrm-controller-manager-logging
namespace: cnrm-system
kind: ServiceAccount
---
# Grant viewer role on the projects namespace to networking K8S SA
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: allow-projects-resource-reference-from-networking
namespace: projects
annotations:
cnrm.cloud.google.com/ignore-clusterless: "true"
roleRef:
name: cnrm-viewer
kind: ClusterRole
apiGroup: rbac.authorization.k8s.io
subjects:
- name: cnrm-controller-manager-networking
namespace: cnrm-system
kind: ServiceAccount
---
# Grant viewer role on the projects namespace to policies K8S SA
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: allow-projects-resource-reference-from-policies
namespace: projects
annotations:
cnrm.cloud.google.com/ignore-clusterless: "true"
roleRef:
name: cnrm-viewer
kind: ClusterRole
apiGroup: rbac.authorization.k8s.io
subjects:
- name: cnrm-controller-manager-policies
namespace: cnrm-system
kind: ServiceAccount