Skip to content

Commit be7f7d1

Browse files
committed
add note about deleting bindings
Signed-off-by: Anish Ramasekar <[email protected]>
1 parent bed3f57 commit be7f7d1

File tree

1 file changed

+2
-1
lines changed
  • keps/sig-auth/4412-projected-service-account-tokens-for-kubelet-image-credential-providers

1 file changed

+2
-1
lines changed

keps/sig-auth/4412-projected-service-account-tokens-for-kubelet-image-credential-providers/README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -943,7 +943,8 @@ Steps to disable the feature:
943943
3. Restart the kubelet.
944944

945945
These steps need to be performed on all nodes in the cluster.
946-
After restarting the kubelet on all nodes, remove the allowed audiences for which the kubelet is allowed to generate service account tokens for image pulls in KAS by removing the previous `ClusterRole` or `Role` with the `request-serviceaccounts-token-audience` verb.
946+
After restarting the kubelet on all nodes, remove the allowed audiences for which the kubelet is allowed to generate service account tokens for image pulls in KAS by
947+
removing the previous `ClusterRole` or `Role` with the `request-serviceaccounts-token-audience` verb, along with the corresponding `ClusterRoleBinding` or `RoleBinding` that binds the role to the kubelet.
947948

948949
###### What happens if we reenable the feature if it was previously rolled back?
949950

0 commit comments

Comments
 (0)