Skip to content

Commit 5b44ffd

Browse files
authored
chore(kite): update RBAC (#9212)
Remove impersonation from RBAC. Signed-off-by: Bryan Ramos <[email protected]>
1 parent 81fa00a commit 5b44ffd

File tree

1 file changed

+0
-58
lines changed

1 file changed

+0
-58
lines changed

components/konflux-kite/base/rbac.yaml

Lines changed: 0 additions & 58 deletions
Original file line numberDiff line numberDiff line change
@@ -5,64 +5,6 @@ metadata:
55
name: konflux-kite
66
namespace: konflux-kite
77
---
8-
# Authorize whether or not a user can view issues in a namespace
9-
# via impersonation
10-
apiVersion: rbac.authorization.k8s.io/v1
11-
kind: ClusterRole
12-
metadata:
13-
name: konflux-kite-authorizer
14-
rules:
15-
# Impersonate permissions for NS access check
16-
- apiGroups: [""]
17-
resources: ["users", "groups", "serviceaccounts"]
18-
verbs: ["impersonate"]
19-
# Access review permissions
20-
- apiGroups: ["authentication.k8s.io"]
21-
resources: ["subjectaccessreviews"]
22-
verbs: ["create"]
23-
# Fallback resource check
24-
- apiGroups: ["authorization.k8s.io"]
25-
resources: ["selfsubjectaccessreviews"]
26-
verbs: ["create"]
27-
---
28-
apiVersion: rbac.authorization.k8s.io/v1
29-
kind: ClusterRoleBinding
30-
metadata:
31-
name: konflux-kite-authorizer
32-
subjects:
33-
- kind: ServiceAccount
34-
name: konflux-kite
35-
namespace: konflux-kite
36-
roleRef:
37-
apiGroup: rbac.authorization.k8s.io
38-
kind: ClusterRole
39-
name: konflux-kite-authorizer
40-
---
41-
# Be able to read pods in a cluster (used for authorization checks)
42-
# EX: If a user can at least view pods in a namespace, they should be able
43-
# to retrieve issues for that namespace.
44-
apiVersion: rbac.authorization.k8s.io/v1
45-
kind: ClusterRole
46-
metadata:
47-
name: konflux-kite-pod-reader
48-
rules:
49-
- apiGroups: [""]
50-
resources: ["pods"]
51-
verbs: ["get", "list"]
52-
---
53-
apiVersion: rbac.authorization.k8s.io/v1
54-
kind: ClusterRoleBinding
55-
metadata:
56-
name: konflux-kite-pod-reader
57-
subjects:
58-
- kind: ServiceAccount
59-
name: konflux-kite
60-
namespace: konflux-kite
61-
roleRef:
62-
apiGroup: rbac.authorization.k8s.io
63-
kind: ClusterRole
64-
name: konflux-kite-pod-reader
65-
---
668
# Konflux-UI specific RBAC
679
# Needed to view things like DB secrets
6810
kind: RoleBinding

0 commit comments

Comments
 (0)