-
Notifications
You must be signed in to change notification settings - Fork 2k
fix(argo-workflows): Add access to be able to see pod information #3192
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
fix(argo-workflows): Add access to be able to see pod information #3192
Conversation
b3d457d to
8e64586
Compare
|
I'll repeat my comment from #3191 I have concerns with this. Upstream does not include these permissions in their aggregate-to-* roles/clusterroles. So this should be addressed upstream first. I asked around the Workflows team and these roles are intended for kubectl users. So someone who is This is hopefully emphasised by the fact that these aggregated roles are in the However, the argo server should be using the argo-server role/cluster role, which does already have these permissions anyway, so this PR shouldn't be required. |
Signed-off-by: Yorick <yorickdevries@live.com>
Signed-off-by: Yorick <yorickdevries@live.com>
Signed-off-by: Yorick <yorickdevries@live.com>
47f62ad to
b6b42ce
Compare
|
@tico24 Thanks for the clarification. From the helm charts it wasn't clear where these aggregate roles were meant for. I am using the |
|
I actually don't know... which is a bit embarrassing. There doesn't seem to be anything in the codebase. The implication appears to be that you are supposed to roll your own. Hopefully one of the other helm team members knows. |
|
@tico24 Ok, I'd gladly hear whether they know more how to tackle this SSO role. And if nothing exists yet is it something that could be added to the helm chart? |
|
Potentially but I think you'd struggle to make it nicely templatable. Unrelated, but I have hopefully helped to clarify why aggregateRoles exist in this PR: #3193 |
|
I agree with @tico24 - these roles are not intended to be used that way. Their purpose is to have their permissions to be aggregated into the You should create a specific role for the SSO principal and give it the permissions required to see and change the workflows to the degree your users require. Here is a suggested set of permissions: rules:
- apiGroups:
- ""
resources:
- pods
- pods/log
verbs:
- get
- list
- watch
- apiGroups:
- ""
resources:
- pods
verbs:
- delete
- apiGroups:
- argoproj.io
resources:
- workflows
verbs:
- create
- get
- list
- watch
- update
- patch
- delete
- apiGroups:
- argoproj.io
resources:
- cronworkflows
- workfloweventbindings
- workflowtemplates
verbs:
- get
- list
- watchYou using the |
According to https://argo-workflows.readthedocs.io/en/latest/security/#ui-access UI users need access to pod(logs) to be properly displayed and updated in the argo workflows UI.
In this PR I added these to the view / edit / admin aggregate roles:
Replaces PR here: #3191
Checklist: