- Sort Score
- Result 10 results
- Languages All
Results 1 - 4 of 4 for ServiceAccount (0.06 sec)
-
CHANGELOG/CHANGELOG-1.28.md
- [Important Security Information](#important-security-information-1) - [CVE-2024-3177: Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin](#cve-2024-3177-bypassing-mountable-secrets-policy-imposed-by-the-serviceaccount-admission-plugin) - [Changes by Kind](#changes-by-kind-6) - [Feature](#feature-4) - [Bug or Regression](#bug-or-regression-6) - [Dependencies](#dependencies-6)Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Fri Sep 05 03:47:18 UTC 2025 - 456.9K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.31.md
- Allowed creating ServiceAccount tokens bound to Node objects. This allows users to bind a service account token's validity to a named Node object, similar to Pod bound tokens.
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Nov 12 11:33:21 UTC 2025 - 451.9K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.32.md
- ServiceAccount metadata.annotations[kubernetes.io/enforce-mountable-secrets]: deprecated since v1.32; no removal deadline. Prefer separate namespaces to isolate access to mounted secrets. ([#128396](https://github.com/kubernetes/kubernetes/pull/128396), [@r...
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Tue Dec 16 18:27:41 UTC 2025 - 448.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.34.md
- Updated the `v1` credential provider configuration to include the `tokenAttributes.cacheType` field. This field is required and must be set to either `ServiceAccount` or `Token` when configuring a provider that uses a service account to fetch registry credentials. ([#132617](https://github.com/kubernetes/kubernetes/pull/132617), [@aramase](https://github.com/aramase)) [SIG Auth, Node and Testing]
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Dec 10 01:13:50 UTC 2025 - 333.3K bytes - Viewed (1)