Skip to content

Commit f6496b0

Browse files
authored
Clarify that bind verb does not require resourceNames
This may be intuitive for most, but the existing phrasing read to me as if `bind` were a special-case verb that _required_ me to explicitly state which Roles or ClusterRoles it should apply to. > You can only create/update a role binding if you […] or if you have > been authorized to perform the bind verb on the referenced role. > Grant them permissions needed to bind a particular role […] > explicitly, by giving them permission to perform the bind verb on the > particular Role (or ClusterRole).
1 parent 5ecdaee commit f6496b0

File tree

1 file changed

+2
-0
lines changed
  • content/en/docs/reference/access-authn-authz

1 file changed

+2
-0
lines changed

content/en/docs/reference/access-authn-authz/rbac.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -908,6 +908,8 @@ subjects:
908908
name: user-1
909909
```
910910

911+
Note that - as with any RBAC verb - you may omit `resourceNames` to allow `user-1` to grant other users _any_ ClusterRole in the namespace `user-1-namespace`.
912+
911913
When bootstrapping the first roles and role bindings, it is necessary for the initial user to grant permissions they do not yet have.
912914
To bootstrap initial roles and role bindings:
913915

0 commit comments

Comments
 (0)