Skip to content

Commit c8d6f3a

Browse files
authored
RHIDP-6217: Updates in Topology RBAC permissions (#1081)
1 parent f657d5f commit c8d6f3a

File tree

2 files changed

+47
-4
lines changed

2 files changed

+47
-4
lines changed

modules/authorization/ref-rbac-permission-policies.adoc

Lines changed: 44 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -183,6 +183,16 @@ Kubernetes permissions::
183183
|Policy
184184
|Description
185185

186+
|`kubernetes.clusters.read`
187+
|
188+
|`read`
189+
|Allows a user to read Kubernetes cluster details under the `/clusters` path
190+
191+
|`kubernetes.resources.read`
192+
|
193+
|`read`
194+
|Allows a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
195+
186196
|`kubernetes.proxy`
187197
|
188198
|`use`
@@ -241,13 +251,45 @@ Topology permissions::
241251
|Policy
242252
|Description
243253

244-
|`topology.view.read`
254+
|`kubernetes.clusters.read`
245255
|
246256
|`read`
247-
|Allows a user or role to view the topology plugin
257+
|Allows a user to read Kubernetes cluster details under the `/clusters` path
258+
259+
|`kubernetes.resources.read`
260+
|
261+
|`read`
262+
|Allows a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
248263

249264
|`kubernetes.proxy`
250265
|
251266
|`use`
252267
|Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
253268
|===
269+
270+
271+
Tekton permissions::
272+
273+
.Tekton permissions
274+
[cols="15%,25%,15%,45%", frame="all", options="header"]
275+
|===
276+
|Name
277+
|Resource type
278+
|Policy
279+
|Description
280+
281+
|`kubernetes.clusters.read`
282+
|
283+
|`read`
284+
|Allows a user to read Kubernetes cluster details under the `/clusters` path
285+
286+
|`kubernetes.resources.read`
287+
|
288+
|`read`
289+
|Allows a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
290+
291+
|`kubernetes.proxy`
292+
|
293+
|`use`
294+
|Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
295+
|===

modules/dynamic-plugins/proc-enable-users-to-use-topology-plugin.adoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33

44
The Topology plugin is defining additional permissions. When link:{authorization-book-url}[{authorization-book-title}] is enabled, to enable users to use the Topology plugin, grant them:
55

6-
* The `topology.view.read` `read` permission to view the Topology panel.
6+
* The `kubernetes.clusters.read` and `kubernetes.resources.read`, `read` permissions to view the Topology panel.
77
* The `kubernetes.proxy` `use` permission to view the pod logs.
88
* The `catalog-entity` `read` permission to view the {product} software catalog items.
99

@@ -16,7 +16,8 @@ The Topology plugin is defining additional permissions. When link:{authorization
1616
[source]
1717
----
1818
g, user:default/<YOUR_USERNAME>, role:default/topology-viewer
19-
p, role:default/topology-viewer, topology.view.read, read, allow <1>
19+
p, role:default/topology-viewer, kubernetes.clusters.read, read, allow <1>
20+
p, role:default/topology-viewer, kubernetes.resources.read, read, allow <1>
2021
p, role:default/topology-viewer, kubernetes.proxy, use, allow <2>
2122
p, role:default/topology-viewer, catalog-entity, read, allow <3>
2223
----

0 commit comments

Comments
 (0)