You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/modules/ROOT/pages/02-argocd-rbac.adoc
+16-18Lines changed: 16 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -162,7 +162,7 @@ spec:
162
162
----
163
163
164
164
Note the `default` Project has no restrictions associated with it, Applications using this Project can deploy any resource, namespace or cluster
165
-
that Argo CD itself has access to. However no permissions have been defined here either which means that unless we have permissions
165
+
that Argo CD itself has access to. Also note that no permissions have been defined here either which means that unless we have permissions
166
166
defined in the Global RBAC, which we already checked, we cannot deploy any Applications with the `default` project.
167
167
168
168
[NOTE]
@@ -175,7 +175,7 @@ Since we don't want to use the `default` Project, we will create a new Project t
175
175
[.console-input]
176
176
[source,sh,subs="attributes",role=execute]
177
177
----
178
-
sed "s/%USERNUM%/{usernum}/" ~/workshop/content/modules/ROOT/examples/rbac/appproject.yaml | sed "s/%USERNUM%\//{usernum}\//" | oc apply -n user{usernum}-argocd -f -
178
+
sed "s/%USERNUM%/{usernum}/" ~/workshop/content/modules/ROOT/examples/rbac/appproject.yaml | oc apply -n user{usernum}-argocd -f -
179
179
----
180
180
181
181
Now view the AppProject we just created:
@@ -197,7 +197,7 @@ spec:
197
197
clusterResourceBlacklist: <1>
198
198
- group: '*'
199
199
kind: '*'
200
-
description: Team2's' Project <2>
200
+
description: Team{usernum}'s Project <2>
201
201
destinations: <3>
202
202
- namespace: {user}-dev
203
203
server: https://kubernetes.default.svc
@@ -233,7 +233,7 @@ spec:
233
233
234
234
Review the items defined by the `workshop` AppProject:
235
235
236
-
<1> First all cluster scoped resources, i.e. resources that don't have a namespace such as ClusterRole. This prevents users from deploying cluster level resources
236
+
<1> First deny all cluster scoped resources, i.e. resources that don't have a namespace such as ClusterRole. This prevents users from deploying cluster level resources like ClusterRole
237
237
<2> We define a friendly description for the project
238
238
<3> The destinations that Applications that belong to this AppProject are permitted to deploy resources. Specifically we permit the `{user}-dev`, `{user}-stage` and `{user}-prod` namespaces in the local cluster Kubernetes server `https://kubernetes.default.svc`. We could wildcard the namespaces with a single destination using `{user}-*`, however we do not want to have `{user}-argocd` as a valid destination.
239
239
<4> Certain namespace scoped resources that are typically the purview of the platform team are blacklisted
@@ -257,30 +257,30 @@ Now let's focus on the RBAC defined in the `workshop` Project that we created:
0 commit comments