forked from magneticio/vamp-cloud-installer
-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathbootstrap-policy.yaml
115 lines (104 loc) · 2.57 KB
/
bootstrap-policy.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: vamp-cloud-installer
namespace: default
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: vamp-cloud-installer-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: vamp-cloud-installer
subjects:
- kind: ServiceAccount
name: vamp-cloud-installer
namespace: default
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: vamp-cloud-installer
rules:
- apiGroups: [""]
resources:
- nodes
verbs: ["*"]
# Allowed actions on Pods
- apiGroups: ["", "apps"]
resources:
- pods
verbs: ["create", "watch", "get", "patch", "update", "delete", "list"]
# Allowed actions on Statefulsets and Deployments
- apiGroups: ["apps"]
resources:
- deployments
- statefulsets
verbs: ["*"]
# Allowed actions on Statefulsets and Deployments
- apiGroups: ["extensions"]
resources:
- deployments
- ingresses
- ingresses/finalizers
verbs: ["get", "create", "watch", "get", "patch", "update", "delete", "list"]
# Allowed actions on Services
- apiGroups: [""]
resources:
- services
- services/finalizers
verbs: ["create", "watch", "get", "patch", "update", "delete", "list"]
# Allowed actions on Secrets
- apiGroups: [""]
resources:
- secrets
verbs: ["*"]
# Allowed actions on ConfigMaps
- apiGroups: [""]
resources:
- configmaps
verbs: ["*"]
# Allow all actions on some special subresources
- apiGroups: [""]
resources:
- pods/exec
- pods/log
- serviceaccounts/token
- events
- patch
verbs: ["*"]
# Allow listing Namespaces and ServiceAccounts
- apiGroups: [""]
resources:
- namespaces
- serviceaccounts
verbs: ["create", "watch", "get", "update", "delete", "list", "patch"]
# Allow actions on Roles, RoleBindings, ClusterRoles and ClusterRoleBindings
- apiGroups: ["rbac.authorization.k8s.io"]
resources:
- roles
- rolebindings
- clusterroles
- clusterrolebindings
verbs: ["create", "watch", "get", "update", "delete", "list", "patch"]
# Allow CRDs
- apiGroups: ["apiextensions.k8s.io"]
resources:
- customresourcedefinitions
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
- apiGroups: ["vamp.io"]
resources:
- ingressannotations
- ingressannotations/status
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
- apiGroups: ["projectcontour.io"]
resources: ["httpproxies"]
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
# Allow access to metrics
- apiGroups: ["metrics.k8s.io"]
resources:
- pods
verbs: ["get", "list"]