@@ -5,64 +5,6 @@ metadata:
55 name : konflux-kite
66 namespace : konflux-kite
77---
8- # Authorize whether or not a user can view issues in a namespace
9- # via impersonation
10- apiVersion : rbac.authorization.k8s.io/v1
11- kind : ClusterRole
12- metadata :
13- name : konflux-kite-authorizer
14- rules :
15- # Impersonate permissions for NS access check
16- - apiGroups : [""]
17- resources : ["users", "groups", "serviceaccounts"]
18- verbs : ["impersonate"]
19- # Access review permissions
20- - apiGroups : ["authentication.k8s.io"]
21- resources : ["subjectaccessreviews"]
22- verbs : ["create"]
23- # Fallback resource check
24- - apiGroups : ["authorization.k8s.io"]
25- resources : ["selfsubjectaccessreviews"]
26- verbs : ["create"]
27- ---
28- apiVersion : rbac.authorization.k8s.io/v1
29- kind : ClusterRoleBinding
30- metadata :
31- name : konflux-kite-authorizer
32- subjects :
33- - kind : ServiceAccount
34- name : konflux-kite
35- namespace : konflux-kite
36- roleRef :
37- apiGroup : rbac.authorization.k8s.io
38- kind : ClusterRole
39- name : konflux-kite-authorizer
40- ---
41- # Be able to read pods in a cluster (used for authorization checks)
42- # EX: If a user can at least view pods in a namespace, they should be able
43- # to retrieve issues for that namespace.
44- apiVersion : rbac.authorization.k8s.io/v1
45- kind : ClusterRole
46- metadata :
47- name : konflux-kite-pod-reader
48- rules :
49- - apiGroups : [""]
50- resources : ["pods"]
51- verbs : ["get", "list"]
52- ---
53- apiVersion : rbac.authorization.k8s.io/v1
54- kind : ClusterRoleBinding
55- metadata :
56- name : konflux-kite-pod-reader
57- subjects :
58- - kind : ServiceAccount
59- name : konflux-kite
60- namespace : konflux-kite
61- roleRef :
62- apiGroup : rbac.authorization.k8s.io
63- kind : ClusterRole
64- name : konflux-kite-pod-reader
65- ---
668# Konflux-UI specific RBAC
679# Needed to view things like DB secrets
6810kind : RoleBinding
0 commit comments