-
Task
-
Resolution: Done
-
Normal
-
ACM 2.14.0
-
Product / Portfolio Work
-
6
-
False
-
-
False
-
-
-
None
Note: Doc team updates the current version of the documentation and the
two previous versions (n-2), but we address *only high-priority, or
customer-reported issues* for -2 releases in support.
Describe the changes in the doc and link to your dev story:
1. - [X] Mandatory: Add the required version to the Fix version/s field.
2. - [X] Mandatory: Choose the type of documentation change or review.
- [ ] We need to update to an existing topic
- [X] We need to add a new document to an existing section
- [ ] We need a whole new section; this is a function not
documented before and doesn't belong in any current section
- [ ] We need an Operator Advisory review and approval
- [ ] We need a z-Stream (Errata) Advisory and Release note for
MCE and/or ACM
3. - [X] Mandatory: Find the link to where the documentation update
should go and add it to the recommended changes. You can either use the
published doc or the staged repo for this step:
Note: As the feature and doc is understood, this recommendation may
change. If this is new documentation, link to the section where you think
it should be placed.
Customer Portal published version
https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.12
Doc staged repo within the ACM Workspace:
https://github.com/stolostron/rhacm-docs
This task is related to https://issues.redhat.com/browse/ACM-19607. Once ACM-19607 is done please add this doc below it.
Creating a ClusterPermission referencing multiple subjects
To create a ClusterPermission resource referencing multiple subjects, you can use the `subjects` field. With this feature, you can binding to multiple subjects instead of one subject at a time.
Example YAML:
apiVersion: rbac.open-cluster-management.io/v1alpha1
kind: ClusterPermission
metadata:
name: clusterpermission-users-groups
spec:
roleBindings:
- namespace: default
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: argocd-application-controller-users-1
subjects:
- namespace: openshift-gitops
kind: ServiceAccount
name: sa-sample-existing
- apiGroup: rbac.authorization.k8s.io
kind: User
name: argo-users1
- name: kubevirt-rb-cluster1-users1
namespace: kube-system
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: argocd-application-controller-users-2
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: users1
- apiGroup: rbac.authorization.k8s.io
kind: User
name: users2
clusterRoleBinding:
name: crb-cluster1-argo-app-con-groups
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: argocd-application-controller-3
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: Group
name: groups1
- apiGroup: rbac.authorization.k8s.io
kind: Group
name: groups2
4. - [X] Mandatory for GA content:
- [ ] Add steps, the diff, known issue, and/or other important
conceptual information in the following space:
- [ ] *Add Required access level *(example, *Cluster
Administrator*) for the user to complete the task:
- [ ] Add verification at the end of the task, how does the user
verify success (a command to run or a result to see?)
- [X] Add link to dev story here: https://issues.redhat.com/browse/ACM-19099
5. - [ ] Mandatory for bugs: What is the diff? Clearly define what the
problem is, what the change is, and link to the current documentation. Only
use this for a documentation bug.
- documents
-
ACM-19099 Enhance ClusterPermission to support PLURAL: Users & Groups
-
- Closed
-