Skip to content

Commit

Permalink
fix(ocm): update ocm frontend plugin readme (#1611)
Browse files Browse the repository at this point in the history
  • Loading branch information
debsmita1 authored May 6, 2024
1 parent e73b7bc commit 9960cc0
Show file tree
Hide file tree
Showing 3 changed files with 15 additions and 2 deletions.
2 changes: 1 addition & 1 deletion plugins/ocm-backend/src/helpers/parser.ts
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ export const parseUpdateInfo = (clusterInfo: ManagedClusterInfo) => {
available: true,
version,
url: versionAvailableUpdates[availableUpdates.indexOf(version as string)]
.url,
?.url,
},
};
};
Expand Down
8 changes: 7 additions & 1 deletion plugins/ocm/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ If you are interested in Resource discovery and do not want any of the front-end

#### Prerequisites

- OCM is deployed and configured on a Kubernetes cluster.
- OCM is [deployed and configured](https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.10/html/install/installing#doc-wrapper) on a Kubernetes cluster.
- [Kubernetes plugin for Backstage](https://backstage.io/docs/features/kubernetes) is installed and configured (Optional)
- On the target Hub clusters please create a `ServiceAccount` and grant it the following `ClusterRole`:

Expand Down Expand Up @@ -419,6 +419,12 @@ The OCM plugin integrates your Backstage instance with multi-cluster engines and

- Your Backstage application is installed and running.
- You have installed the OCM plugin. For the installation process, see [Installation](#installation).
- If RBAC permission framework is enabled, ensure adding the following permission policies in an external permission policies configuration file named `rbac-policy.csv` to allow the rbac admins or your desired user(s)/group(s) to access the ocm backend plugin:

```csv rbac-policy.csv
p, role:default/rbac_admin, ocm.entity.read, read, allow
p, role:default/rbac_admin, ocm.cluster.read, read, allow
```

#### Procedure

Expand Down
7 changes: 7 additions & 0 deletions plugins/rbac-backend/docs/permissions.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,3 +59,10 @@ When defining a permission for the RBAC Backend plugin to consume, follow these
| scaffolder.action.execute | scaffolder-action | | Allows the execution of an action from a template | scaffolder.template.parameter.read, scaffolder.template.step.read |
| scaffolder.template.parameter.read | scaffolder-template | read | Allows the user to read parameters of a template | scaffolder.template.step.read |
| scaffolder.template.step.read | scaffolder-template | read | Allows the user to read steps of a template | scaffolder.template.paramater.read |
## OCM
| Name | Resource Type | Policy | Description | Requirements |
| ---------------- | ------------- | ------ | ----------------------------------------------------------------- | ------------ |
| ocm.entity.read | | read | Allows the user to read from the ocm plugin | X |
| ocm.cluster.read | | read | Allows the user to read the cluster information in the ocm plugin | X |

0 comments on commit 9960cc0

Please sign in to comment.