From: Balazs Szekeres Date: Tue, 24 Sep 2019 13:56:54 +0000 (+0200) Subject: Added new rbac rules. X-Git-Url: https://gerrit.akraino.org/r/gitweb?p=ta%2Fcaas-security.git;a=commitdiff_plain;h=c3fdf94a5e2dc9b501b1e10bc189b16d656bc266 Added new rbac rules. Added storage local static provisioner rbac rule Added dynamic local pv provisioner rbac rule Change-Id: Id4824cee7a8232521127a9b7ce794a3bc3ba6084 Signed-off-by: Balazs Szekeres --- diff --git a/rbac_manifests/dynamic-local-pv-provisioner-rbac-config.yml b/rbac_manifests/dynamic-local-pv-provisioner-rbac-config.yml new file mode 100644 index 0000000..9b6d546 --- /dev/null +++ b/rbac_manifests/dynamic-local-pv-provisioner-rbac-config.yml @@ -0,0 +1,79 @@ +--- +# Copyright 2019 Nokia +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +apiVersion: v1 +kind: ServiceAccount +metadata: + name: dynamic-pv + namespace: kube-system +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: caas:dynamic-pv +rules: +- apiGroups: + - "" + resources: + - persistentvolumeclaims + verbs: + - get + - list + - watch +- apiGroups: + - "" + resources: + - persistentvolumes + verbs: + - get + - list + - watch +- apiGroups: + - "" + resources: + - nodes + verbs: + - get +- apiGroups: + - "" + resources: + - nodes/status + verbs: + - update +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: caas:dynamic-pv +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: caas:dynamic-pv +subjects: +- kind: ServiceAccount + name: dynamic-pv + namespace: kube-system +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: caas:dynamic-pv-psp +subjects: +- kind: ServiceAccount + name: dynamic-pv + namespace: kube-system +roleRef: + kind: ClusterRole + name: caas:infra-psp + apiGroup: rbac.authorization.k8s.io diff --git a/rbac_manifests/storage-local-static-provisioner-rbac-config.yml b/rbac_manifests/storage-local-static-provisioner-rbac-config.yml new file mode 100644 index 0000000..725cad7 --- /dev/null +++ b/rbac_manifests/storage-local-static-provisioner-rbac-config.yml @@ -0,0 +1,55 @@ +--- +# Copyright 2019 Nokia +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +apiVersion: v1 +kind: ServiceAccount +metadata: + name: local-storage-admin + namespace: kube-system +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: caas:local-storage-provisioner-node-clusterrole + namespace: kube-system +rules: +- apiGroups: [""] + resources: ["nodes"] + verbs: ["get"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: caas:local-storage-provisioner-pv-binding +roleRef: + kind: ClusterRole + name: system:persistent-volume-provisioner + apiGroup: rbac.authorization.k8s.io +subjects: +- kind: ServiceAccount + name: local-storage-admin + namespace: kube-system +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: caas:local-storage-provisioner-node-binding +subjects: +- kind: ServiceAccount + name: local-storage-admin + namespace: kube-system +roleRef: + kind: ClusterRole + name: caas:local-storage-provisioner-node-clusterrole + apiGroup: rbac.authorization.k8s.io diff --git a/rpmbuild.spec b/rpmbuild.spec index 78938fd..82510db 100644 --- a/rpmbuild.spec +++ b/rpmbuild.spec @@ -15,7 +15,7 @@ %define COMPONENT security %define RPM_NAME caas-%{COMPONENT} %define RPM_MAJOR_VERSION 1.0.0 -%define RPM_MINOR_VERSION 7 +%define RPM_MINOR_VERSION 8 Name: %{RPM_NAME} Version: %{RPM_MAJOR_VERSION}