Skip to content

Commit 4b09ea3

Browse files
authored
Merge pull request #121 from vshn/rbac/ocp_managed
Add docs for new RBAC feature to access the instance namespace
2 parents 6235088 + c1e7666 commit 4b09ea3

File tree

5 files changed

+161
-6
lines changed

5 files changed

+161
-6
lines changed

docs/modules/ROOT/pages/vshn-managed/keycloak/security.adoc

Lines changed: 32 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,35 @@ spec:
2323
----
2424

2525
<1> List of namespaces to be allowed to access Keycloak
26-
<2> Allows access to Keycloak from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
26+
<2> Allows access to Keycloak from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
27+
28+
== Namespace RBAC
29+
30+
On APPUiO Cloud, every member of the same organization to which the claim namespace belongs to has limited access to the namespace for debugging and port-fowarding.
31+
32+
On APPUiO Managed, we don't have this construct and no RBAC rules are deployed by default.
33+
34+
However, it is possible to specify a list of `Groups` or `Users`that should have that limited access to the namespace.
35+
This can be done using the two fields `allowedGroups` and `allowedUsers`:
36+
37+
[source,yaml]
38+
----
39+
apiVersion: vshn.appcat.vshn.io/v1
40+
kind: VSHNKeycloak
41+
metadata:
42+
name: keycloak-app1-prod
43+
namespace: prod-app
44+
spec:
45+
parameters:
46+
security:
47+
allowedGroups: # <1>
48+
- my-dev-engineers
49+
- my-support-engineers
50+
allowedGroups: # <2>
51+
- my-special-user
52+
writeConnectionSecretToRef:
53+
name: keycloak-creds-connection
54+
----
55+
56+
<1> List of groups to be allowed limited access to the Keycloak namespace
57+
<2> List of users to be allowed limited access to the Keycloak namespace

docs/modules/ROOT/pages/vshn-managed/mariadb/security.adoc

Lines changed: 32 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,35 @@ spec:
2323
----
2424

2525
<1> List of namespaces to be allowed to access MariaDB
26-
<2> Allows access to MariaDB from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
26+
<2> Allows access to MariaDB from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
27+
28+
== Namespace RBAC
29+
30+
On APPUiO Cloud, every member of the same organization to which the claim namespace belongs to has limited access to the namespace for debugging and port-fowarding.
31+
32+
On APPUiO Managed, we don't have this construct and no RBAC rules are deployed by default.
33+
34+
However, it is possible to specify a list of `Groups` or `Users`that should have that limited access to the namespace.
35+
This can be done using the two fields `allowedGroups` and `allowedUsers`:
36+
37+
[source,yaml]
38+
----
39+
apiVersion: vshn.appcat.vshn.io/v1
40+
kind: VSHNMariaDB
41+
metadata:
42+
name: mariadb-app1-prod
43+
namespace: prod-app
44+
spec:
45+
parameters:
46+
security:
47+
allowedGroups: # <1>
48+
- my-dev-engineers
49+
- my-support-engineers
50+
allowedGroups: # <2>
51+
- my-special-user
52+
writeConnectionSecretToRef:
53+
name: mariadb-creds-connection
54+
----
55+
56+
<1> List of groups to be allowed limited access to the MariaDB namespace
57+
<2> List of users to be allowed limited access to the MariaDB namespace

docs/modules/ROOT/pages/vshn-managed/nextcloud/security.adoc

Lines changed: 33 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ To access Nextcloud from other namespaces the service must be configured.
88
[source,yaml]
99
----
1010
apiVersion: vshn.appcat.vshn.io/v1
11-
kind: VSHNKNextcloud
11+
kind: VSHNNextcloud
1212
metadata:
1313
name: nextcloud-app1-prod
1414
namespace: prod-app
@@ -23,4 +23,35 @@ spec:
2323
----
2424

2525
<1> List of namespaces to be allowed to access Nextcloud
26-
<2> Allows access to Nextcloud from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
26+
<2> Allows access to Nextcloud from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
27+
28+
== Namespace RBAC
29+
30+
On APPUiO Cloud, every member of the same organization to which the claim namespace belongs to has limited access to the namespace for debugging and port-fowarding.
31+
32+
On APPUiO Managed, we don't have this construct and no RBAC rules are deployed by default.
33+
34+
However, it is possible to specify a list of `Groups` or `Users`that should have that limited access to the namespace.
35+
This can be done using the two fields `allowedGroups` and `allowedUsers`:
36+
37+
[source,yaml]
38+
----
39+
apiVersion: vshn.appcat.vshn.io/v1
40+
kind: VSHNNextcloud
41+
metadata:
42+
name: nextcloud-app1-prod
43+
namespace: prod-app
44+
spec:
45+
parameters:
46+
security:
47+
allowedGroups: # <1>
48+
- my-dev-engineers
49+
- my-support-engineers
50+
allowedGroups: # <2>
51+
- my-special-user
52+
writeConnectionSecretToRef:
53+
name: nextcloud-creds-connection
54+
----
55+
56+
<1> List of groups to be allowed limited access to the Nextcloud namespace
57+
<2> List of users to be allowed limited access to the Nextcloud namespace

docs/modules/ROOT/pages/vshn-managed/postgresql/security.adoc

Lines changed: 32 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,35 @@ spec:
2323
----
2424

2525
<1> List of namespaces to be allowed to access PostgreSQL
26-
<2> Allows access to PostgreSQL from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
26+
<2> Allows access to PostgreSQL from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
27+
28+
== Namespace RBAC
29+
30+
On APPUiO Cloud, every member of the same organization to which the claim namespace belongs to has limited access to the namespace for debugging and port-fowarding.
31+
32+
On APPUiO Managed, we don't have this construct and no RBAC rules are deployed by default.
33+
34+
However, it is possible to specify a list of `Groups` or `Users`that should have that limited access to the namespace.
35+
This can be done using the two fields `allowedGroups` and `allowedUsers`:
36+
37+
[source,yaml]
38+
----
39+
apiVersion: vshn.appcat.vshn.io/v1
40+
kind: VSHNPostgreSQL
41+
metadata:
42+
name: postgres-app1-prod
43+
namespace: prod-app
44+
spec:
45+
parameters:
46+
security:
47+
allowedGroups: # <1>
48+
- my-dev-engineers
49+
- my-support-engineers
50+
allowedGroups: # <2>
51+
- my-special-user
52+
writeConnectionSecretToRef:
53+
name: postgres-creds-connection
54+
----
55+
56+
<1> List of groups to be allowed limited access to the PostgreSQL namespace
57+
<2> List of users to be allowed limited access to the PostgreSQL namespace

docs/modules/ROOT/pages/vshn-managed/redis/security.adoc

Lines changed: 32 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,35 @@ spec:
2323
----
2424

2525
<1> List of namespaces to be allowed to access Redis
26-
<2> Allows access to Redis from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
26+
<2> Allows access to Redis from any namespace in the cluster. Supersedes `allowedNamespaces` if true.
27+
28+
== Namespace RBAC
29+
30+
On APPUiO Cloud, every member of the same organization to which the claim namespace belongs to has limited access to the namespace for debugging and port-fowarding.
31+
32+
On APPUiO Managed, we don't have this construct and no RBAC rules are deployed by default.
33+
34+
However, it is possible to specify a list of `Groups` or `Users`that should have that limited access to the namespace.
35+
This can be done using the two fields `allowedGroups` and `allowedUsers`:
36+
37+
[source,yaml]
38+
----
39+
apiVersion: vshn.appcat.vshn.io/v1
40+
kind: VSHNRedis
41+
metadata:
42+
name: redis-app1-prod
43+
namespace: prod-app
44+
spec:
45+
parameters:
46+
security:
47+
allowedGroups: # <1>
48+
- my-dev-engineers
49+
- my-support-engineers
50+
allowedGroups: # <2>
51+
- my-special-user
52+
writeConnectionSecretToRef:
53+
name: redis-creds-connection
54+
----
55+
56+
<1> List of groups to be allowed limited access to the Redis namespace
57+
<2> List of users to be allowed limited access to the Redis namespace

0 commit comments

Comments
 (0)