setup/kubernetes/roles/openwhisk-invoker-roles.yaml (34 lines of code) (raw):

--- # Source: openwhisk/templates/invoker-role.yaml # # Licensed to the Apache Software Foundation (ASF) under one or more # contributor license agreements. See the NOTICE file distributed with # this work for additional information regarding copyright ownership. # The ASF licenses this file to You under the Apache License, Version 2.0 # (the "License"); you may not use this file except in compliance with # the License. You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # # When using KubernetesContainerFactory, invoker pods need extensive # permissions to manage pods and deployments. The ability to create # pods can enable privilege escalation attacks, so restrict it to a # ServiceAccount that is only used for the invokers and only defined # when using KubernetesContainerFactory. --- kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata: name: openwhisk-invoker namespace: nuvolaris rules: - apiGroups: ["extensions", "apps"] resources: ["deployments"] verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] - apiGroups: [""] resources: ["pods"] verbs: ["get", "list", "watch", "create", "update", "patch", "delete"] - apiGroups: [""] resources: ["events"] verbs: ["get", "list"] - apiGroups: [""] resources: ["pods/log"] verbs: ["get", "list"] --- kind: RoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: openwhisk-invoker namespace: nuvolaris subjects: - kind: ServiceAccount namespace: "nuvolaris" name: openwhisk-invoker roleRef: kind: Role name: openwhisk-invoker apiGroup: rbac.authorization.k8s.io