From b304a32a48e14ccc3f179e333a124588700bf1a4 Mon Sep 17 00:00:00 2001 From: AndrewLamb Date: Tue, 11 Apr 2023 17:05:54 +0100 Subject: [SDC] Create Authorization Policies for SDC - Create Authoriation Policies for SDC - Add in initial authorized serviceaccounts for each sub component service Issue-ID: OOM-3127 Change-Id: I6e1ce0173028bf75ae3696b29fae80250731dc94 Signed-off-by: AndrewLamb --- .../sdc-fe/templates/authorizationpolicy.yaml | 17 +++++++++++++++++ kubernetes/sdc/components/sdc-fe/values.yaml | 8 ++++++++ 2 files changed, 25 insertions(+) create mode 100644 kubernetes/sdc/components/sdc-fe/templates/authorizationpolicy.yaml (limited to 'kubernetes/sdc/components/sdc-fe') diff --git a/kubernetes/sdc/components/sdc-fe/templates/authorizationpolicy.yaml b/kubernetes/sdc/components/sdc-fe/templates/authorizationpolicy.yaml new file mode 100644 index 0000000000..7158c0263f --- /dev/null +++ b/kubernetes/sdc/components/sdc-fe/templates/authorizationpolicy.yaml @@ -0,0 +1,17 @@ +{{/* +# Copyright © 2023 Nordix Foundation +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +*/}} + +{{ include "common.authorizationPolicy" . }} \ No newline at end of file diff --git a/kubernetes/sdc/components/sdc-fe/values.yaml b/kubernetes/sdc/components/sdc-fe/values.yaml index ca8b42a0ff..62987370d5 100644 --- a/kubernetes/sdc/components/sdc-fe/values.yaml +++ b/kubernetes/sdc/components/sdc-fe/values.yaml @@ -108,6 +108,14 @@ ingress: config: ssl: "redirect" +serviceMesh: + authorizationPolicy: + authorizedPrincipals: + - serviceAccount: consul-read + - serviceAccount: consul-server-read + - serviceAccount: istio-ingress + namespace: istio-ingress + # Resource Limit flavor -By Default using small flavor: small # Segregation for Different environment (Small and Large) -- cgit 1.2.3-korg