Skip to content

Commit 922467f

Browse files
committed
Update admin access documentation for GitHub organization membership
- Clarify that admin access is granted through perl-irc GitHub Organization membership - No separate Tailscale account required for users - Explain how GitHub-based access control works with Tailscale integration - Distinguish between user access and maintainer-only secrets management - Add access levels for different GitHub organization roles
1 parent 7d6c59a commit 922467f

File tree

1 file changed

+24
-10
lines changed

1 file changed

+24
-10
lines changed

docs/admin-access-procedures.md

Lines changed: 24 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -21,15 +21,15 @@ The Magnet IRC Network uses Tailscale for secure administrative access to IRC se
2121

2222
## Prerequisites
2323

24-
### Tailscale Account Setup
25-
1. Create a Tailscale account at https://tailscale.com
26-
2. Generate ephemeral auth keys at https://login.tailscale.com/admin/settings/keys
27-
3. Configure auth key settings:
28-
-**Ephemeral**: Devices automatically removed when offline
29-
-**Pre-approved**: Skip manual device approval (optional)
30-
- ⏱️ **90-day expiration**: Set reasonable expiration time
31-
32-
### GitHub Repository Secrets Configuration
24+
### GitHub Organization Membership
25+
Administrative access to the Magnet IRC Network is granted through membership in the **perl-irc GitHub Organization**. No separate Tailscale account is required.
26+
27+
**To gain admin access:**
28+
1. Request membership in the perl-irc GitHub Organization
29+
2. Once approved, you'll automatically have SSH access to all IRC infrastructure
30+
3. Admin access is managed through GitHub Teams and repository permissions
31+
32+
### Infrastructure Secrets Configuration (Maintainers Only)
3333
Set both Fly.io API token and Tailscale auth key as GitHub repository secrets for CI/CD deployment:
3434

3535
```bash
@@ -52,6 +52,20 @@ FLY_TOKEN="fo1_xxxxxxxxxxxxxxxxxxxxxx"
5252

5353
**Note**: The GitHub Actions workflow will automatically set these as Fly.io secrets during deployment.
5454

55+
## How GitHub-Based Access Works
56+
57+
The IRC infrastructure uses GitHub organization membership for access control:
58+
59+
1. **Tailscale Integration**: The perl-irc organization's Tailscale network is configured to allow SSH access to organization members
60+
2. **Automatic Access**: No manual device approval or separate Tailscale account required
61+
3. **GitHub Teams**: Access levels can be managed through GitHub Teams within the organization
62+
4. **SSH Keys**: Your GitHub SSH keys are automatically trusted for infrastructure access
63+
64+
### Access Levels
65+
- **perl-irc Members**: SSH access to all IRC servers and services
66+
- **Repository Maintainers**: Additional access to secrets management and deployment controls
67+
- **Organization Owners**: Full administrative access to infrastructure and Tailscale network
68+
5569
## Administrative Access Methods
5670

5771
### Method 1: Direct SSH via Tailscale (Recommended)
@@ -160,7 +174,7 @@ ssh root@magnet-9rl 'cat /proc/cpuinfo | grep flags'
160174

161175
## Security Procedures
162176

163-
### Auth Key Management
177+
### Auth Key Management (Maintainers Only)
164178

165179
#### Key Rotation (Recommended: 90 days)
166180
```bash

0 commit comments

Comments
 (0)