You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/reference/access-authn-authz/rbac.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -891,6 +891,7 @@ rules:
891
891
- apiGroups: ["rbac.authorization.k8s.io"]
892
892
resources: ["clusterroles"]
893
893
verbs: ["bind"]
894
+
# omit resourceNames to allow binding any ClusterRole
894
895
resourceNames: ["admin","edit","view"]
895
896
---
896
897
apiVersion: rbac.authorization.k8s.io/v1
@@ -908,8 +909,6 @@ subjects:
908
909
name: user-1
909
910
```
910
911
911
-
Note that - as with any RBAC verb - you may omit `resourceNames` to allow `user-1` to grant other users _any_ ClusterRole in the namespace `user-1-namespace`.
912
-
913
912
When bootstrapping the first roles and role bindings, it is necessary for the initial user to grant permissions they do not yet have.
0 commit comments