@@ -203,8 +203,12 @@ These are the Application scope actions that can be allowed or denied via the ac
203
203
- Uninstalling plugins `uninstall`
204
204
- Full access `admin`
205
205
- Managing Runners
206
- - Read Access to All Runner configuration `read`
207
- - Full Admin access to All Runner Configuration `admin`
206
+ - Read Runner configuration details. `read`
207
+ - Create new Runner entries. `create`
208
+ - Update existing Runner entries. `update`
209
+ - Delete Runner entries. `delete`
210
+ - Execute the ping command to check Runner status. `ping`
211
+ - Regenerate a new credential package for a Runner. `regenerate_credentials`
208
212
209
213
The following table summarizes the generic and specific resources and the
210
214
actions you can restrict in the application scope :
@@ -231,8 +235,12 @@ actions you can restrict in the application scope:
231
235
| " | " | none | `install` | Install plugins |
232
236
| " | " | none | `uninstall` | Uninstall plugins |
233
237
| " | " | none | `admin` | Full access |
234
- | " | `runner` | none | `read` | Read Access to Runners |
235
- | " | " | none | `admin` | Full access to manage Runners |
238
+ | " | `runner` | none | `read` | Read Runner setup/configuration details |
239
+ | " | " |none | `create` | Create new Runner entries |
240
+ | " | " |none | `update` | Update existing Runner entries |
241
+ | " | " |none | `delete` | Delete Runner entries |
242
+ | " | " |none | `ping` | Execute the ping command to check Runner status |
243
+ | " | " |none | `regenerate_credentials` | Regenerate a new credential package for a Runner|
236
244
237
245
Table : Application scope generic type actions
238
246
@@ -257,15 +265,6 @@ Table: Application scope generic type actions
257
265
| " | " | `read` | Read files and list directories in the storage facility |
258
266
| " | " | `delete` | Delete files in the storage facility |
259
267
| `apitoken` | "username","roles" | `create` | Create an API Token with specified roles or username |
260
- | `runner` | "username","roles" | `read` | Read Runner setup/configuration details |
261
- | " | " | `create` | Create new Runner entries |
262
- | " | " | `update` | Update existing Runner entries |
263
- | " | " | `delete` | Delete Runner entries |
264
- | " | " | `ping` | Execute the ping command to check Runner status |
265
- | " | " | `regenerate_credentials`| Regenerate a new credential package for a Runner |
266
-
267
-
268
-
269
268
270
269
---
271
270
@@ -392,6 +391,12 @@ actions you can restrict in the project scope:
392
391
| " | " | `update` | Update access |
393
392
| " | " | `delete` | Delete access |
394
393
| " | " | `post` | Post to webhook access |
394
+ | " | `runner` | `read` | Read Runner setup/configuration details |
395
+ | " | " | `create` | Create new Runner entries |
396
+ | " | " | `update` | Update existing Runner entries |
397
+ | " | " | `delete` | Delete Runner entries |
398
+ | " | " | `ping` | Execute the ping command to check Runner status |
399
+ | " | " | `regenerate_credentials` | Regenerate a new credential package for a Runner|
395
400
396
401
Type Properties Actions Description
397
402
@@ -419,6 +424,12 @@ Type Properties Actions Description
419
424
| " | | `view_history` | View job executions history |
420
425
| `node` | "rundeck_server", "nodename", ... | `read` | View the node in the UI (see [Node resource properties](#node-resource-properties)) |
421
426
| " | | `run` | Run jobs/adhoc on the node |
427
+ | `runner` | "name", "id", "tags" | `read` | Read Runner Listing |
428
+ | " | | `create` | Create new Runner entries |
429
+ | " | | `update` | Update existing Runner entries |
430
+ | " | | `delete` | Delete Runner entries |
431
+ | " | | `ping` | Execute the ping command to check Runner status |
432
+ | " | | `admin` | Full access to manage Runners |
422
433
423
434
424
435
_Note_ : see [Node resource properties](#node-resource-properties) for more node resource properties for authorization.
0 commit comments