-
Notifications
You must be signed in to change notification settings - Fork 4.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update our kubelet (and other) certs for RBAC #1231
Comments
https://docs.google.com/document/d/1PqI--ql3LQsA69fEvRq1nQWgiIoE5Dyftja5Um9ML7Q/edit and https://github.com/kubernetes/kubernetes.github.io/pull/2360/files is documentation in progress for the roles and default bindings available to deployers. deployers can either set up credentials for control plane components to match the default bindings, or they can bind roles themselves... either way works. currently, the expected users/groups to pick up permissions automatically are:
kubernetes/kubernetes#40021 is tracking remaining roles that need development, some of which will have default bindings as well. |
I believe this work (if not completed already) will enable the |
Looks like the Kubelet certs are in the format of |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/lifecycle frozen |
We need to do the equivalent of https://github.com/kubernetes/kubernetes/pull/39020/commits
And check for any other changes
The text was updated successfully, but these errors were encountered: