rbac-template.yaml 2.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192
  1. apiVersion: template.openshift.io/v1
  2. kind: Template
  3. metadata:
  4. name: template-service-broker-rbac
  5. parameters:
  6. - name: NAMESPACE
  7. value: openshift-template-service-broker
  8. - name: KUBE_SYSTEM
  9. value: kube-system
  10. objects:
  11. # Grant the service account permission to call the TSB
  12. - apiVersion: rbac.authorization.k8s.io/v1beta1
  13. kind: ClusterRoleBinding
  14. metadata:
  15. name: templateservicebroker-client
  16. roleRef:
  17. kind: ClusterRole
  18. name: system:openshift:templateservicebroker-client
  19. subjects:
  20. - kind: ServiceAccount
  21. namespace: ${NAMESPACE}
  22. name: templateservicebroker-client
  23. # to delegate authentication and authorization
  24. - apiVersion: rbac.authorization.k8s.io/v1beta1
  25. kind: ClusterRoleBinding
  26. metadata:
  27. name: auth-delegator-${NAMESPACE}
  28. roleRef:
  29. kind: ClusterRole
  30. name: system:auth-delegator
  31. subjects:
  32. - kind: ServiceAccount
  33. namespace: ${NAMESPACE}
  34. name: apiserver
  35. # to have the template service broker powers
  36. - apiVersion: rbac.authorization.k8s.io/v1beta1
  37. kind: ClusterRoleBinding
  38. metadata:
  39. name: tsb-${NAMESPACE}
  40. roleRef:
  41. kind: ClusterRole
  42. name: system:openshift:controller:template-service-broker
  43. subjects:
  44. - kind: ServiceAccount
  45. namespace: ${NAMESPACE}
  46. name: apiserver
  47. # to read the config for terminating authentication
  48. - apiVersion: rbac.authorization.k8s.io/v1beta1
  49. kind: RoleBinding
  50. metadata:
  51. namespace: ${KUBE_SYSTEM}
  52. name: extension-apiserver-authentication-reader-${NAMESPACE}
  53. roleRef:
  54. kind: Role
  55. name: extension-apiserver-authentication-reader
  56. subjects:
  57. - kind: ServiceAccount
  58. namespace: ${NAMESPACE}
  59. name: apiserver
  60. # allow the kube service catalog's SA to read the static secret defined
  61. # above, which will contain the token for the SA that can call the TSB.
  62. - apiVersion: rbac.authorization.k8s.io/v1beta1
  63. kind: Role
  64. metadata:
  65. name: templateservicebroker-auth-reader
  66. namespace: ${NAMESPACE}
  67. rules:
  68. - apiGroups:
  69. - ""
  70. resourceNames:
  71. - templateservicebroker-client
  72. resources:
  73. - secrets
  74. verbs:
  75. - get
  76. - apiVersion: rbac.authorization.k8s.io/v1beta1
  77. kind: RoleBinding
  78. metadata:
  79. namespace: ${NAMESPACE}
  80. name: templateservicebroker-auth-reader
  81. roleRef:
  82. kind: Role
  83. name: templateservicebroker-auth-reader
  84. subjects:
  85. - kind: ServiceAccount
  86. namespace: kube-service-catalog
  87. name: service-catalog-controller