-
Notifications
You must be signed in to change notification settings - Fork 80
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
EXPLORE: Argo RBAC #40
Comments
How do we want to configure roles/permissions inside of Argo? How do we want to utilize Argo projects? |
Should we be following some of @sabre1041's OpenShift Blog about integrating to the RBAC provided by OCP? https://www.openshift.com/blog/openshift-authentication-integration-with-argocd |
@oybed - FYI |
FYI .. for now it is too open (intentionally ! so we can figure out the right model) in the argo CR we set:
See: https://argoproj.github.io/argo-cd/operator-manual/rbac/ and the service account is bound to this cluster admin role now, there are multiple problems to solve here:
also linked to - #56 |
There's really 2 aspects of RBAC that needs to be considered:
I'd argue that #1 is a nice to have for dev env., but less important the closer to production you get (yes, some level of read-only access is nice to have). As an example - for OMP we have chosen to do everything through Argo for all environments beyond dev and hence only grant read-only for users - even to the OpenShift clusters. |
hi @oybed, just to add to add to this discussion, for (2) https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/rbac.md so, you can create and map arbitrary roles/users/groups/system users - in the argocd configmap to openshift argocd service accounts only need cluster read at minimum, not write (in this UJ repo we explicitly set this role as too open, but it needs refining or a mechanism to refine in bootstrap for different environments)
We could also consider adding this to the _templated() argo project function, to restrict what argocd projects can do:
|
@eformat thx for sharing and certainly some good stuff to dig in on. Thanks for the links - I'll take a closer look as time allows. However, at first glance it looks to be quite a bit of plumbing and structure needed to avoid for it to go sideways - a.k.a.: not as simple as for example the openshift-applier whereas it runs with the permissions you as a user have, or said differently running as Anyway - good stuff to explore and see what can be iterated on. |
yeah 4 sure ... i also was just chatting to @springdo about argocd managing
other argocd's ..
with that pattern, you may have multiple argocd's deployed within or across
clusters, with varying degrees of config applied.
i like that pattern ..
…On Tue, 21 Apr 2020 at 10:17, Øystein Bedin ***@***.***> wrote:
@eformat <https://github.com/eformat> thx for sharing and certainly some
good stuff to dig in on. Thanks for the links - I'll take a closer look as
time allows.
However, at first glance it looks to be quite a bit of plumbing and
structure needed to avoid for it to go sideways - a.k.a.: not as simple as
for example the openshift-applier whereas it runs with the permissions you
as a user have, or said differently running as oc --as=<user>.
Anyway - good stuff to explore and see what can be iterated on.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#40 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAFN7IEYIVIP67N3O2H75WTRNTQ2NANCNFSM4LSASZVA>
.
|
also see master -> child argocd addition now using argocd project in the master argocd .. means we can control what namespaces and cluster resources are whitelisted for that instance as a whole we could/should also consider arocd projects in the child argocd - eventhough that is controlled by a product team .. probably good practice for namespace control ? |
Explore how to support OCP and / OR Kube esp for Argo RBAC
The text was updated successfully, but these errors were encountered: