aboutsummaryrefslogtreecommitdiffstats
path: root/kubernetes/authentication/templates/authorizationpolicy.yaml
blob: abd40725dab2db5f6e8565fe6892a242d561b7fa (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
{{/*
# Copyright © 2024 Tata Communication Limited (TCL), Deutsche Telekom AG
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#       http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
*/}}
{{- if .Values.ingressAuthentication.enabled }}
---
{{- $dot := . }}
{{- range $index, $realm := .Values.realmSettings }}
{{-   range $key, $accessRole := $realm.accessControl.accessRoles }}
{{-     range $index, $role := get $realm.accessControl.accessRoles $key }}
apiVersion: security.istio.io/v1
kind: AuthorizationPolicy
metadata:
  name: {{ $key }}-{{ $role.name }}-jwt
  namespace: istio-ingress
spec:
  action: ALLOW
  rules:
  - to:
    - operation:
        hosts:
        - {{ include "ingress.config.host" (dict "dot" $dot "baseaddr" $role.servicePrefix) }}
        methods:
        {{- range $role.methodsAllowed }}
        - {{ . }}
        {{- end }}
    when:
    - key: request.auth.claims[onap_roles]
      values:
      - {{ $role.name }}
  selector:
    matchLabels:
      istio: ingress
---
{{-     end }}
{{-   end }}
{{- end }}
apiVersion: security.istio.io/v1
kind: AuthorizationPolicy
metadata:
  name: {{ .Release.Name }}-custom-action
  namespace: istio-ingress
spec:
  action: CUSTOM
  provider:
    name: oauth2-proxy
  rules:
  - to:
    - operation:
        notHosts:
          {{- if .Values.ingressAuthentication.exceptions }}
          {{- range $index, $url := .Values.ingressAuthentication.exceptions }}
          - {{ tpl $url $dot }}
          {{- end }}
          {{- end }}
  selector:
    matchLabels:
      istio: ingress
---
apiVersion: security.istio.io/v1
kind: AuthorizationPolicy
metadata:
  name: {{ .Release.Name }}-allowed-exceptions
  namespace: istio-ingress
spec:
  action: ALLOW
  rules:
  - to:
    - operation:
        hosts:
          {{- if .Values.ingressAuthentication.exceptions }}
          {{- range $index, $url := .Values.ingressAuthentication.exceptions }}
          - {{ tpl $url $dot }}
          {{- end }}
          {{- end }}
  selector:
    matchLabels:
      istio: ingress
{{- end }}