-
Sub-task
-
Resolution: Done
-
Major
-
None
-
Product / Portfolio Work
-
False
-
-
False
-
-
-
VMMgmt - Train-31
If a ClusterPermission like this is added
apiVersion: rbac.open-cluster-management.io/v1alpha1 kind: ClusterPermission metadata: name: clusterpermission-existing-role-sample namespace: open-cluster-management spec: roleBindings: - namespace: default roleRef: name: argocd-application-controller-1 apiGroup: rbac.authorization.k8s.io kind: ClusterRole subjects: - name: sa-sample-existing apiGroup: rbac.authorization.k8s.io kind: User - name: user1 apiGroup: rbac.authorization.k8s.io kind: User - namespace: default roleRef: name: argocd-application-controller-2 apiGroup: rbac.authorization.k8s.io kind: ClusterRole subjects: - name: sa-sample-existing apiGroup: rbac.authorization.k8s.io kind: User - name: user1 apiGroup: rbac.authorization.k8s.io kind: User - namespace: kube-system roleRef: name: argocd-application-controller-1 apiGroup: rbac.authorization.k8s.io kind: ClusterRole subjects: - name: sa-sample-existing apiGroup: rbac.authorization.k8s.io kind: User - name: user1 apiGroup: rbac.authorization.k8s.io kind: User - namespace: kube-system roleRef: name: argocd-application-controller-2 apiGroup: rbac.authorization.k8s.io kind: ClusterRole subjects: - name: sa-sample-existing apiGroup: rbac.authorization.k8s.io kind: User - name: user1 apiGroup: rbac.authorization.k8s.io kind: User clusterRoleBinding: roleRef: name: argocd-application-controller-3 apiGroup: rbac.authorization.k8s.io kind: ClusterRole subjects: - name: group1 apiGroup: rbac.authorization.k8s.io kind: User