Merge pull request #1888 from CaoShuFeng/roleRef

[authorization] update doc about roleRef
reviewable/pr1873/r1^2
devin-donnelly 2016-12-21 15:20:44 -08:00 committed by GitHub
commit d427b0e2e4
1 changed files with 5 additions and 6 deletions

View File

@ -299,9 +299,8 @@ subjects:
name: jane name: jane
roleRef: roleRef:
kind: Role kind: Role
namespace: default
name: pod-reader name: pod-reader
apiVersion: rbac.authorization.k8s.io/v1alpha1 apiGroup: rbac.authorization.k8s.io
``` ```
`RoleBindings` may also refer to a `ClusterRole`. However, a `RoleBinding` that `RoleBindings` may also refer to a `ClusterRole`. However, a `RoleBinding` that
@ -326,7 +325,7 @@ subjects:
roleRef: roleRef:
kind: ClusterRole kind: ClusterRole
name: secret-reader name: secret-reader
apiVersion: rbac.authorization.k8s.io/v1alpha1 apiGroup: rbac.authorization.k8s.io
``` ```
Finally a `ClusterRoleBinding` may be used to grant permissions in all Finally a `ClusterRoleBinding` may be used to grant permissions in all
@ -338,14 +337,14 @@ namespaces. The following `ClusterRoleBinding` allows any user in the group
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1alpha1 apiVersion: rbac.authorization.k8s.io/v1alpha1
metadata: metadata:
name: read-secrets name: read-secrets-global
subjects: subjects:
- kind: Group # May be "User", "Group" or "ServiceAccount" - kind: Group # May be "User", "Group" or "ServiceAccount"
name: manager name: manager
roleRef: roleRef:
kind: ClusterRole kind: ClusterRole
name: secret-reader  name: secret-reader
apiVersion: rbac.authorization.k8s.io/v1alpha1 apiGroup: rbac.authorization.k8s.io
``` ```
### Referring to Resources ### Referring to Resources