-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(argo-workflows): Add access to be able to see pod information #3192
base: main
Are you sure you want to change the base?
fix(argo-workflows): Add access to be able to see pod information #3192
Conversation
b3d457d
to
8e64586
Compare
I'll repeat my comment from #3191 I have concerns with this. Upstream does not include these permissions in their aggregate-to-* roles/clusterroles. So this should be addressed upstream first. I asked around the Workflows team and these roles are intended for kubectl users. So someone who is This is hopefully emphasised by the fact that these aggregated roles are in the However, the argo server should be using the argo-server role/cluster role, which does already have these permissions anyway, so this PR shouldn't be required. |
Signed-off-by: Yorick <[email protected]>
Signed-off-by: Yorick <[email protected]>
Signed-off-by: Yorick <[email protected]>
47f62ad
to
b6b42ce
Compare
@tico24 Thanks for the clarification. From the helm charts it wasn't clear where these aggregate roles were meant for. I am using the |
I actually don't know... which is a bit embarrassing. There doesn't seem to be anything in the codebase. The implication appears to be that you are supposed to roll your own. Hopefully one of the other helm team members knows. |
@tico24 Ok, I'd gladly hear whether they know more how to tackle this SSO role. And if nothing exists yet is it something that could be added to the helm chart? |
Potentially but I think you'd struggle to make it nicely templatable. Unrelated, but I have hopefully helped to clarify why aggregateRoles exist in this PR: #3193 |
According to https://argo-workflows.readthedocs.io/en/latest/security/#ui-access UI users need access to pod(logs) to be properly displayed and updated in the argo workflows UI.
In this PR I added these to the view / edit / admin aggregate roles:
Replaces PR here: #3191
Checklist: