Skip to content

Commit

Permalink
Merge branch 'master' of github.com:argoproj/argo-cd into fix-19314
Browse files Browse the repository at this point in the history
Signed-off-by: Matthew Bennett <[email protected]>
  • Loading branch information
mtbennett-godaddy committed Jan 10, 2025
2 parents a8098f2 + 1645d57 commit e03feff
Show file tree
Hide file tree
Showing 2 changed files with 8 additions and 4 deletions.
6 changes: 5 additions & 1 deletion docs/operator-manual/project.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,12 +14,16 @@ spec:
sourceRepos:
- '*'

# Only permit applications to deploy to the guestbook namespace in the same cluster
# Only permit applications to deploy to the 'guestbook' namespace or any namespace starting with 'guestbook-' in the same cluster
# Destination clusters can be identified by 'server', 'name', or both.
destinations:
- namespace: guestbook
server: https://kubernetes.default.svc
name: in-cluster
# Destinations also allow wildcard globbing
- namespace: guestbook-*
server: https://kubernetes.default.svc
name: in-cluster

# Deny all cluster-scoped resources from being created, except for Namespace
clusterResourceWhitelist:
Expand Down
6 changes: 3 additions & 3 deletions docs/user-guide/projects.md
Original file line number Diff line number Diff line change
Expand Up @@ -123,7 +123,7 @@ argocd app set guestbook-default --project myproject
## Project Roles
Projects include a feature called roles that can be used to determine who and what can be done applications associated with the project. As an example, it can be used to give a CI pipeline a restricted set of permissions allowing sync operations on a single app (but not change its source or destination).
Projects include a feature called roles that can be used to determine who and what can be done to the applications associated with the project. As an example, it can be used to give a CI pipeline a restricted set of permissions allowing sync operations on a single app (but not change its source or destination).
Projects can have multiple roles, and those roles can have different access granted to them. These permissions are called policies which follows the same [RBAC pattern used in Argo CD configuration](../operator-manual/rbac.md). They are stored within the role as a list of policy strings. A role's policy can only grant access to that role. Users are associated with roles based on the groups list. Consider the hypothetical AppProject definition below:
Expand All @@ -135,10 +135,10 @@ metadata:
spec:
...
roles:
- description: some-role
- name: admin
description: some-role
groups:
- some-user
name: admin
policies:
- p, proj:sample-test-project:some-role, applications, *, *, allow
...
Expand Down

0 comments on commit e03feff

Please sign in to comment.