Skip to content

Commit 955d0ad

Browse files
committed
Update values-aks-dev.yaml to disable RBAC plugin in Helm chart
1 parent 6b0db5c commit 955d0ad

7 files changed

Lines changed: 1707 additions & 1 deletion

File tree

deploy/helm/rhdh/README.md

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
# RHDH Helm Configuration (AKS Dev)
2+
3+
This folder is the source of truth for RHDH RBAC and app configuration used in AKS dev deployments.
4+
5+
## Files
6+
7+
- `values-aks-dev.yaml`: RHDH Helm values (auth, permissions, plugins, catalog, branding)
8+
- `rbac-policies-configmap.yaml`: File-based RBAC policies (`rbac-policies.csv`)
9+
10+
## Important RBAC Behavior
11+
12+
RHDH roles loaded from `rbac-policies.csv` are configuration-managed.
13+
14+
- You can view them in the RBAC UI.
15+
- Editing those roles in UI is blocked by design.
16+
- To change role permissions or user/group mapping, edit `rbac-policies-configmap.yaml`.
17+
18+
If RBAC UI shows `source does not match originating role ... CONFIGURATION`, update this file instead of using UI edit.
19+
20+
## Apply Changes
21+
22+
1. Apply RBAC ConfigMap:
23+
24+
```bash
25+
kubectl apply -f deploy/helm/rhdh/rbac-policies-configmap.yaml
26+
```
27+
28+
1. Apply updated RHDH values through your Helm/GitOps flow.
29+
30+
2. Restart RHDH deployment if needed to refresh loaded configuration:
31+
32+
```bash
33+
kubectl -n rhdh rollout restart deploy/rhdh-developer-hub
34+
kubectl -n rhdh rollout status deploy/rhdh-developer-hub --timeout=300s
35+
```
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
apiVersion: v1
2+
kind: ConfigMap
3+
metadata:
4+
name: rbac-policies
5+
namespace: rhdh
6+
data:
7+
rbac-policies.csv: |
8+
p, role:default/admin, catalog-entity, read, allow
9+
p, role:default/admin, catalog-entity, update, allow
10+
p, role:default/admin, catalog-entity, delete, allow
11+
p, role:default/admin, catalog.entity.create, create, allow
12+
p, role:default/admin, catalog.location.read, read, allow
13+
p, role:default/admin, catalog.location.create, create, allow
14+
p, role:default/admin, catalog.location.delete, delete, allow
15+
p, role:default/admin, scaffolder-template, read, allow
16+
p, role:default/admin, scaffolder-action, use, allow
17+
p, role:default/admin, scaffolder.task.create, create, allow
18+
p, role:default/admin, scaffolder.task.read, read, allow
19+
p, role:default/admin, scaffolder.task.cancel, use, allow
20+
p, role:default/admin, scaffolder.template.management, use, allow
21+
p, role:default/admin, bulk-import, read, allow
22+
p, role:default/admin, bulk-import, create, allow
23+
p, role:default/admin, bulk-import, delete, allow
24+
p, role:default/admin, policy-entity, read, allow
25+
p, role:default/admin, policy-entity, create, allow
26+
p, role:default/admin, policy-entity, update, allow
27+
p, role:default/admin, policy-entity, delete, allow
28+
p, role:default/admin, kubernetes.proxy, use, allow
29+
p, role:default/admin, notification.entity, read, allow
30+
p, role:default/admin, notification.entity, create, allow
31+
p, role:default/admin, notification.entity, update, allow
32+
p, role:default/developer, catalog-entity, read, allow
33+
p, role:default/developer, catalog.entity.create, create, allow
34+
p, role:default/developer, catalog.location.read, read, allow
35+
p, role:default/developer, catalog.location.create, create, allow
36+
p, role:default/developer, scaffolder-template, read, allow
37+
p, role:default/developer, scaffolder-action, use, allow
38+
p, role:default/developer, scaffolder.task.create, create, allow
39+
p, role:default/developer, scaffolder.task.read, read, allow
40+
p, role:default/developer, kubernetes.proxy, use, allow
41+
p, role:default/developer, notification.entity, read, allow
42+
p, role:default/developer, notification.entity, update, allow
43+
g, user:default/paulanunes85, role:default/admin
44+
g, group:default/platform-team, role:default/admin
45+
g, group:default/platform-engineering, role:default/admin

deploy/helm/rhdh/values-aks-dev.yaml

Lines changed: 29 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -214,8 +214,36 @@ upstream:
214214
- type: url
215215
target: https://github.com/3horizons/agentic-devops-platform/blob/main/backstage/catalog-info.yaml
216216

217+
argocd:
218+
appLocatorMethods:
219+
- type: config
220+
instances:
221+
- name: local
222+
url: https://argocd.3horizons.ai
223+
217224
permission:
218-
enabled: false
225+
enabled: true
226+
rbac:
227+
admin:
228+
users:
229+
- name: user:default/paulanunes85
230+
superAdminRole: true
231+
policies-csv-file: /opt/app-root/src/rbac-policies.csv
232+
pluginsWithPermission:
233+
- catalog
234+
- scaffolder
235+
- permission
236+
- kubernetes
237+
- bulk-import
238+
- notification
239+
policyFileReload: true
240+
241+
dynamicPlugins:
242+
frontend:
243+
default.main-menu-items:
244+
menuItems:
245+
default.create:
246+
title: Create
219247

220248
postgresql:
221249
enabled: false

0 commit comments

Comments
 (0)