Skip to main content
Version: 0.25.0

Authorization Enterprise

caution

This feature is in alpha and certain aspects will change

We're very excited for people to use this feature. However, please note that changes in the API, behaviour and security will evolve. The feature is suitable to use in controlled testing environments.

This section provides a recommended way to configure RBAC in the context of pipelines. It is oriented to the journey that you expect your users to have.

View pipelines

In order to view pipelines, users would need to have read access to the pipeline resource and the underlying application resources.

An example of configuration to achieve this purpose could be seen below with pipeline-reader role and search-pipeline-reader role-binding to allow a group search-developer to access pipeline resources within search namespace.

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: pipeline-reader
rules:
- apiGroups: [ "pipelines.weave.works" ]
resources: [ "pipelines" ]
verbs: [ "get", "list", "watch"]
- apiGroups: ["helm.toolkit.fluxcd.io"]
resources: [ "helmreleases" ]
verbs: [ "get", "list", "watch"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: search-pipeline-reader
namespace: search
subjects:
- kind: Group
name: search-developer
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole
name: pipeline-reader
apiGroup: rbac.authorization.k8s.io