Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RBAC in managed openshifts #15

Open
robbybrodie opened this issue Jan 4, 2023 · 0 comments
Open

RBAC in managed openshifts #15

robbybrodie opened this issue Jan 4, 2023 · 0 comments

Comments

@robbybrodie
Copy link

robbybrodie commented Jan 4, 2023

I've only tested this on ROKS (Managed OpenShift) in IBM cloud. ArgoCD 2.5.4 installed via Red HatOpenShift GitOps 1.7.0 Operator

When you install the OpenShift GitOps Operator, if on ROKS, whilst you can login to ArgoCD via the route or via the button in the app launcher and clicking the "Login via OpenShift" button on the right hand pane, you cannot create a new app in ArgoCD because the SSO account doesn't have admin rights. it isn't part of system:cluster-admins

Case 1:

the default ArgoCD RBAC contained in the the CM resource argocd-rbac-cm that is created when the instance is installed has RBAC such as this
rbac:
policy: |
g, system:cluster-admins, role:admin
g, cluster-admins, role:admin
scopes: '[groups]'

However, the user account you are using is not part of system:cluster-admins, and in IBM cloud ROKS, cluster-admins does not exist.

to make this work in the In the case of the default installation of argoCD I created a new group called cluster-admins and placed my account in that group

Case 2

in a non default ArgoCD (one where the user instructs the Operator to create a new argoCD instance the default RBAC appears to be
rbac:
policy: |
g, system:cluster-admins, role:admin
scopes: '[groups]'

However, the user account you are using is not part of system:cluster-admins,
to make this work I changed the RBAC to look as follows

rbac:
policy: |
g, system:cluster-admins, role:admin
g, cluster-admins, role:admin
scopes: '[groups]'

and then I ensured I have a. group created a called cluster-admins and have placed my account was placed in that group.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant