Skip to main content
Version: 0.38.0

Anonymous Access

Important

Alone, this is an insecure method of securing your dashboard.

It is designed to be used with other external authentication systems like auth proxies.

Configuring Anonymous access

Set the following values in the Helm Chart:

#
additionalArgs:
- --insecure-no-authentication-user=gitops-test-user
#

The value of the --insecure-no-authentication-user flag is the kubernetes User to be impersonated to make requests into the cluster.

When this flag is set all other authentication methods (e.g. those specified via --auth-methods) are disabled.

No login screen will be displayed when accessing the dashboard.

Example ClusterRole

You can bind the user provided to a ClusterRole with a ClusterRoleBinding.

---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: minimum-weavegitops-role
rules:
- apiGroups: [""]
resources: ["secrets","pods","events"]
verbs: ["get","list"]
- apiGroups: ["apps"]
resources: ["deployments", "replicasets"]
verbs: ["get","list"]
- apiGroups: ["kustomize.toolkit.fluxcd.io"]
resources: ["kustomizations"]
verbs: ["get","list"]
- apiGroups: ["helm.toolkit.fluxcd.io"]
resources: ["helmreleases"]
verbs: ["get","list"]
- apiGroups: ["source.toolkit.fluxcd.io"]
resources: ["*"]
verbs: ["get","list"]
- apiGroups: [""]
resources: ["events"]
verbs: ["get","list","watch"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: gitops-test-user-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: minimum-weavegitops-role
subjects:
- kind: User
name: gitops-test-user

This would allow access to any resource.