-
-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Team permissions by workspace #1498
Comments
+1 This is definitely needed. Looking to move our Enterprise from TFC to Terrakube and this is going to be a major pain point in convincing teams to adopt it. |
+1 |
Hi @alfespa17 ! Sorry to bother you but, would you have an ETA for when do you think this will be available ? It appears to be really needed for us to manage our privileges :) Regards ! |
great ! thank you ! |
Hi @alfespa17 ! I also got a new idea, do you think it would be possible to allow teams to trigger only specific templates ? For instance, dev teams could only be able to trigger Plan template however, DevOps team have privilege to trigger any template ? WDYT ? |
Hmmm I'm not sure to follow your point ? Templates are set at organization level. Currently you can give rights to allow to run jobs on templates from UI but you can't for instance open plans from UI to devs and prevent them to run destroy template at the same time ? |
If for a certain (workspace,team) tuple the operation (plan/apply/destroy/...) is not allowed, the template containing that specific operation could either:
Does this clarify what I meant? |
Hmmm yep I get this part, but this is currently not possible to do that right ? Unless I missed smth |
yep, not possible right now, but from my POV is an improvement to your new idea 👇
I mean, once the Team permissions by workspace are implemented, what you said about allowing templates should be a consequence because templates rely on steps running operations, which rely on Team permissions by workspace |
Oh yeah sure ! Agreed ! |
Not sure if I understand correctly, something like this to only allow certain teams to trigger the template? onlyAllowToExecuteUsing:
- Team1
- Team2
flow:
- type: "terraformPlan"
step: 100
- type: "terraformApply"
step: 200 |
Could do the trick ! But it should be reflected (I mean you should not be able to trigger from UI then) and editable from the UI perhaps (with a similar interface to the current one for team privileges) ? Or we can store template privilege in the DB instead ? It would avoid having to modify templates ? |
The above was just an idea, it could be saved into the database too, or maybe add some reference in the workspace that is only allowed to run certain templates You also need to consider that allowing to run certain templates will only work with VCS workspaces, the CLI driven workflow in some way is |
Hmmmm if we think about it I think we should be able to:
By default no permission are specified and if left empty the workspace is free to access for everyone to perform any action. Let me know your thoughts ? Dunno if it's good idea !
No issue ! we only use VCS workspaces ! |
Sorry to bother you guys, but if this template-permissions topic is not related to both teams and workspaces at the same time (the tuple I mentioned before), I'm afraid this discussion doesn't belong here |
Yeah maybe you can create a new issue to discuss it |
I think I got the team permission by workspace working, I still need to test it a little bit more but maybe I can merge the changes in the following days |
Provider support was added here: |
Feature description 💡
Currently TFC allows to set different permissions for different teams per each workspace. In this way, a team can be admin (or have write permissions, without fully admin) on some workspaces where the team is owner, while at the same have only read permissions on other workspaces where they're not owners. So to recap:
Anything else?
It would be awesome to make the permissions more granular. Instead of just read/write, I would like to have read/write/admin. In fact, it would be even better to be able to customize every action possible (I mean, manage a workspace implies many actions that are all allowed at the same time when the manage permission is enabled), so with just read/write for each action we could define different roles that could achieve the read/write/admin and even more combinations.
The text was updated successfully, but these errors were encountered: