Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 9 additions & 0 deletions authorization/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# authorization

> [!IMPORTANT]
> Before adding a new group or rolebinding to the cluster, you **must** reach out to the cluster admins on Slack first (handle: `rhdh-cluster-admins`).

> [!NOTE]
> Adding your username to one of the `Group`s managed by this ArgoCD application does **not** create your username or grant access to the cluster. You must already have an internal SSO login in order for these role bindings to take effect.

Membership in the `redhat-ai-dev-users` `Group` on the cluster grants cluster-wide `edit` permissions. Additional permissions can be configured via additional `Group` and `RoleBinding` resources.
7 changes: 7 additions & 0 deletions authorization/kustomization.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- redhat-ai-dev-edit.yaml
- redhat-ai-dev-edit-users.yaml
- redhat-ai-dev-view.yaml
- redhat-ai-dev-view-users.yaml
17 changes: 17 additions & 0 deletions authorization/redhat-ai-dev-edit-users.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
# This group provides cluster-wide edit access on the redhat-ai-dev team OpenShift cluster.
# This does *not* create your user on the cluster, you **must** have an internal SSO account to log on
kind: Group
apiVersion: user.openshift.io/v1
metadata:
name: redhat-ai-dev-edit-users
users:
- bwilcock
- jdubrick
- mfaisal
- yangcao
- mvaldron
- tpetkos
- gmontero
- jrichter
- karthik
- eyuen
12 changes: 12 additions & 0 deletions authorization/redhat-ai-dev-edit.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: redhat-ai-dev-edit
subjects:
- kind: Group
apiGroup: rbac.authorization.k8s.io
name: redhat-ai-dev-users
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: edit
6 changes: 6 additions & 0 deletions authorization/redhat-ai-dev-view-users.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
# This group provides cluster-wide view access on the redhat-ai-dev team OpenShift cluster.
# This does *not* create your user on the cluster, you **must** have an internal SSO account to log on
kind: Group
apiVersion: user.openshift.io/v1
metadata:
name: redhat-ai-dev-view-users
12 changes: 12 additions & 0 deletions authorization/redhat-ai-dev-view.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: redhat-ai-dev-view
subjects:
- kind: Group
apiGroup: rbac.authorization.k8s.io
name: redhat-ai-dev-users
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: view