-
Sub-task
-
Resolution: Done
-
Major
-
None
-
Product / Portfolio Work
-
False
-
-
False
-
-
-
VMMgmt - Train-31
If a ClusterPermission like this is added
apiVersion: rbac.open-cluster-management.io/v1alpha1
kind: ClusterPermission
metadata:
name: clusterpermission-existing-role-sample
namespace: open-cluster-management
spec:
roleBindings:
- namespace: default
roleRef:
name: argocd-application-controller-1
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
subjects:
- name: sa-sample-existing
apiGroup: rbac.authorization.k8s.io
kind: User
- name: user1
apiGroup: rbac.authorization.k8s.io
kind: User
- namespace: default
roleRef:
name: argocd-application-controller-2
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
subjects:
- name: sa-sample-existing
apiGroup: rbac.authorization.k8s.io
kind: User
- name: user1
apiGroup: rbac.authorization.k8s.io
kind: User
- namespace: kube-system
roleRef:
name: argocd-application-controller-1
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
subjects:
- name: sa-sample-existing
apiGroup: rbac.authorization.k8s.io
kind: User
- name: user1
apiGroup: rbac.authorization.k8s.io
kind: User
- namespace: kube-system
roleRef:
name: argocd-application-controller-2
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
subjects:
- name: sa-sample-existing
apiGroup: rbac.authorization.k8s.io
kind: User
- name: user1
apiGroup: rbac.authorization.k8s.io
kind: User
clusterRoleBinding:
roleRef:
name: argocd-application-controller-3
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
subjects:
- name: group1
apiGroup: rbac.authorization.k8s.io
kind: User