VelaUX RBAC
The RBAC feature enabled restriction of access to VelaUX resources. The UI and API could strict permission verification. We designed platform-scope roles and project-scope roles, Each role can be bound to a set of permission policies, and users can obtain corresponding permissions when they are bound to the role.
Built-in permission policies
A permission policy consists of resources、action and effect, there are some built-in permission policies, including:
* Cluster Management (resource:[cluster:*/*] action:* effect:allow scope:platform)
* Project Management (resource:[project:*] action:* effect:allow scope:platform)
* Addon Management (resource:[addon:*,addonRegistry:*] action:* effect:allow scope:platform)
* Target Management (resource:[target:*,cluster:*/namespace:*] action:* effect:allow scope:platform)
* User Management (resource:[user:*] action:* effect:allow scope:platform)
* Platform Role Management (resource:[role:*, permission:*] action:* effect:allow scope:platform)
* Admin (resource:[*:*] action:* effect:allow scope:platform)
* Project Read (resource:[project:{projectName}] action:detail effect:allow scope:project)
* App Management (resource:[project:{projectName}/application:*/*, definition:* ] action:* effect:allow scope:platform)
* Environment Management (resource:[project:{projectName}/environment:*] action:* effect:allow scope:platform)
* Role Management (resource:[project:{projectName}/role:*,project:{projectName}/projectUser:*,project:{projectName}/permission:*] action:* effect:allow scope:project)
Currently, built-in permission policies cover all resources. It is conceivable that these permissions can be flexibly customized, we will provide the API and UI page to manage the custom permission.