You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Make example service account output match 1.24+ output with auto-generated tokens omitted
* Prefer `kubectl create token` as token creation mechanism
Copy file name to clipboardExpand all lines: content/en/docs/tasks/configure-pod-container/configure-service-account.md
-8Lines changed: 0 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,12 +115,8 @@ metadata:
115
115
namespace: default
116
116
resourceVersion: "272500"
117
117
uid: 721ab723-13bc-11e5-aec2-42010af0021e
118
-
secrets:
119
-
- name: build-robot-token-bvbk5
120
118
```
121
119
122
-
then you will see that a token has automatically been created and is referenced by the service account.
123
-
124
120
You may use authorization plugins to [set permissions on service accounts](/docs/reference/access-authn-authz/rbac/#service-account-permissions).
125
121
126
122
To use a non-default service account, set the `spec.serviceAccountName`
@@ -233,8 +229,6 @@ metadata:
233
229
namespace: default
234
230
resourceVersion: "243024"
235
231
uid: 052fb0f4-3d50-11e5-b066-42010af0d7b6
236
-
secrets:
237
-
- name: default-token-uudge
238
232
```
239
233
240
234
Using your editor of choice (for example `vi`), open the `sa.yaml` file, delete line with key `resourceVersion`, add lines with `imagePullSecrets:` and save.
0 commit comments