Skip to content

Commit d99127d

Browse files
authored
Merge pull request #40557 from Zhuzhenghao/rbac
Cleanup page rbac
2 parents 47d961a + c1f4c5c commit d99127d

File tree

1 file changed

+4
-4
lines changed
  • content/en/docs/reference/access-authn-authz

1 file changed

+4
-4
lines changed

content/en/docs/reference/access-authn-authz/rbac.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -929,8 +929,8 @@ to a role that grants that permission. To allow a user to create/update role bin
929929

930930
1. Grant them a role that allows them to create/update RoleBinding or ClusterRoleBinding objects, as desired.
931931
2. Grant them permissions needed to bind a particular role:
932-
* implicitly, by giving them the permissions contained in the role.
933-
* explicitly, by giving them permission to perform the `bind` verb on the particular Role (or ClusterRole).
932+
* implicitly, by giving them the permissions contained in the role.
933+
* explicitly, by giving them permission to perform the `bind` verb on the particular Role (or ClusterRole).
934934

935935
For example, this ClusterRole and RoleBinding would allow `user-1` to grant other users the `admin`, `edit`, and `view` roles in the namespace `user-1-namespace`:
936936

@@ -1105,7 +1105,7 @@ Examples:
11051105

11061106
* Test applying a manifest file of RBAC objects, displaying changes that would be made:
11071107

1108-
```
1108+
```shell
11091109
kubectl auth reconcile -f my-rbac-rules.yaml --dry-run=client
11101110
```
11111111

@@ -1260,7 +1260,7 @@ Here are two approaches for managing this transition:
12601260
Run both the RBAC and ABAC authorizers, and specify a policy file that contains
12611261
the [legacy ABAC policy](/docs/reference/access-authn-authz/abac/#policy-file-format):
12621262

1263-
```
1263+
```shell
12641264
--authorization-mode=...,RBAC,ABAC --authorization-policy-file=mypolicy.json
12651265
```
12661266

0 commit comments

Comments
 (0)