Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 17 for service_account (0.16 sec)

  1. CHANGELOG/CHANGELOG-1.27.md

    secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.
    
    **Note**: This only impacts the cluster if the ServiceAccount admission plugin is used (most cluster should have this on by default as recommended in https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#serviceaccount), the `kubernetes.io/enforce-mountable-secrets` annotation...
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Jul 17 07:48:22 UTC 2024
    - 466.3K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.6.md

    * `v1beta1` RoleBinding/ClusterRoleBinding subjects changed `apiVersion` to `apiGroup` to fully-qualify a subject. ServiceAccount subjects default to an apiGroup of `""`, User and Group subjects default to an apiGroup of `"rbac.authorization.k8s.io"`. ([#41184](https://github.com/kubernetes/kubernetes/pull/41184), [@liggitt](https://github.com/liggitt))
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu Dec 24 02:28:26 UTC 2020
    - 304K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.29.md

      - [Important Security Information](#important-security-information-1)
        - [CVE-2024-3177: Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin](#cve-2024-3177-bypassing-mountable-secrets-policy-imposed-by-the-serviceaccount-admission-plugin)
      - [Changes by Kind](#changes-by-kind-6)
        - [Feature](#feature-4)
        - [Bug or Regression](#bug-or-regression-6)
      - [Dependencies](#dependencies-6)
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Oct 23 04:37:31 UTC 2024
    - 375.1K bytes
    - Viewed (1)
  4. CHANGELOG/CHANGELOG-1.7.md

    * `kubectl create rolebinding` and `kubectl create clusterrolebinding` invocations must be updated to  specify multiple subjects as repeated  `--user`, `--group`, or `--serviceaccount` arguments instead of comma-separated arguments to a single `--user`, `--group`, or `--serviceaccount`.  E.g. `--user=x,y` must become `--user x --user y`  ([#43903](https://github.com/kubernetes/kubernetes/pull/43903), [@xilabao](https://github.com/xilabao))
    
    
    ### kubeadm
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 308.7K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.24.md

    secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.
    
    **Note**: This only impacts the cluster if the ServiceAccount admission plugin is used (most cluster should have this on by default as recommended in https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#serviceaccount), the `kubernetes.io/enforce-mountable-secrets` annotation...
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu Aug 24 00:02:43 UTC 2023
    - 473.4K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.8.md

      objects generated from files, for example with `--from-file`.
    
    - `kubectl run` can set a service account name in the generated pod
      spec with the `--serviceaccount` flag.
    
    - `kubectl proxy` now correctly handles the `exec`, `attach`, and
      `portforward` commands.  You must pass `--disable-filter` to the command to allow these commands.
    
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Tue Feb 20 15:45:02 UTC 2024
    - 312.2K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.25.md

    secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.
    
    **Note**: This only impacts the cluster if the ServiceAccount admission plugin is used (most cluster should have this on by default as recommended in https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#serviceaccount), the `kubernetes.io/enforce-mountable-secrets` annotation...
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Mon May 06 09:23:20 UTC 2024
    - 419.1K bytes
    - Viewed (0)
  8. CHANGELOG/CHANGELOG-1.28.md

      - [Important Security Information](#important-security-information-1)
        - [CVE-2024-3177: Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin](#cve-2024-3177-bypassing-mountable-secrets-policy-imposed-by-the-serviceaccount-admission-plugin)
      - [Changes by Kind](#changes-by-kind-6)
        - [Feature](#feature-4)
        - [Bug or Regression](#bug-or-regression-6)
      - [Dependencies](#dependencies-6)
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Oct 23 04:34:59 UTC 2024
    - 456.9K bytes
    - Viewed (0)
  9. CHANGELOG/CHANGELOG-1.26.md

    secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.
    
    **Note**: This only impacts the cluster if the ServiceAccount admission plugin is used (most cluster should have this on by default as recommended in https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#serviceaccount), the `kubernetes.io/enforce-mountable-secrets` annotation...
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu Mar 14 16:24:51 UTC 2024
    - 425.7K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.31.md

    - Allowed creating ServiceAccount tokens bound to Node objects.
      This allows users to bind a service account token's validity to a named Node object, similar to Pod bound tokens.
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Oct 23 12:18:32 UTC 2024
    - 315.4K bytes
    - Viewed (0)
Back to top