Uploaded image for project: 'Red Hat Advanced Cluster Management'
  1. Red Hat Advanced Cluster Management
  2. ACM-20640 RBAC UI Implementation [2.15] - multiple sub tasks
  3. ACM-21240

Bug Fix for RBAC for VMs - Error displaying roleBindings and clusterRoleBinding

XMLWordPrintable

    • VMMgmt - Train-31

      If a ClusterPermission like this is added

      apiVersion: rbac.open-cluster-management.io/v1alpha1
      kind: ClusterPermission
      metadata:
        name: clusterpermission-existing-role-sample
        namespace: open-cluster-management
      spec:
        roleBindings:
          - namespace: default
            roleRef:
              name: argocd-application-controller-1
              apiGroup: rbac.authorization.k8s.io
              kind: ClusterRole
            subjects:
              - name: sa-sample-existing
                apiGroup: rbac.authorization.k8s.io
                kind: User
              - name: user1
                apiGroup: rbac.authorization.k8s.io
                kind: User
          - namespace: default
            roleRef:
              name: argocd-application-controller-2
              apiGroup: rbac.authorization.k8s.io
              kind: ClusterRole
            subjects:
              - name: sa-sample-existing
                apiGroup: rbac.authorization.k8s.io
                kind: User
              - name: user1
                apiGroup: rbac.authorization.k8s.io
                kind: User
          - namespace: kube-system
            roleRef:
              name: argocd-application-controller-1
              apiGroup: rbac.authorization.k8s.io
              kind: ClusterRole
            subjects:
              - name: sa-sample-existing
                apiGroup: rbac.authorization.k8s.io
                kind: User
              - name: user1
                apiGroup: rbac.authorization.k8s.io
                kind: User
          - namespace: kube-system
            roleRef:
              name: argocd-application-controller-2
              apiGroup: rbac.authorization.k8s.io
              kind: ClusterRole
            subjects:
              - name: sa-sample-existing
                apiGroup: rbac.authorization.k8s.io
                kind: User
              - name: user1
                apiGroup: rbac.authorization.k8s.io
                kind: User
        clusterRoleBinding:
          roleRef:
            name: argocd-application-controller-3
            apiGroup: rbac.authorization.k8s.io
            kind: ClusterRole
          subjects:
            - name: group1
              apiGroup: rbac.authorization.k8s.io
              kind: User
      

      this is shown

        1. screenshot-1.png
          250 kB
          Enrique Mingorance Cano

              rh-ee-obazylie Oksana Bazylieva
              rh-ee-obazylie Oksana Bazylieva
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: