Skip to content

Commit c6d6a64

Browse files
authored
Merge pull request #87965 from bergerhoffer/OCPBUGS-43809
OCPBUGS#43809: Clarifying what's created for each service account
2 parents 330a51f + 55d6994 commit c6d6a64

File tree

4 files changed

+13
-19
lines changed

4 files changed

+13
-19
lines changed

authentication/understanding-and-creating-service-accounts.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@ toc::[]
88

99
include::modules/service-accounts-overview.adoc[leveloffset=+1]
1010

11+
include::modules/service-account-auto-secret-removed.adoc[leveloffset=+2]
12+
1113
// include::modules/service-accounts-enabling-authentication.adoc[leveloffset=+1]
1214

1315
include::modules/service-accounts-creating.adoc[leveloffset=+1]

modules/service-accounts-creating.adoc

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,9 @@ $ oc get sa
2222
[source,terminal]
2323
----
2424
NAME SECRETS AGE
25-
builder 2 2d
26-
default 2 2d
27-
deployer 2 2d
25+
builder 1 2d
26+
default 1 2d
27+
deployer 1 2d
2828
----
2929

3030
. To create a new service account in the current project:
@@ -67,10 +67,10 @@ $ oc describe sa robot
6767
----
6868
Name: robot
6969
Namespace: project1
70-
Labels: <none>
71-
Annotations: <none>
70+
Labels: <none>
71+
Annotations: openshift.io/internal-registry-pull-secret-ref: robot-dockercfg-qzbhb
7272
Image pull secrets: robot-dockercfg-qzbhb
7373
Mountable secrets: robot-dockercfg-qzbhb
74-
Tokens: robot-token-f4khf
74+
Tokens: <none>
7575
Events: <none>
7676
----

modules/service-accounts-granting-roles.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
// * authentication/using-service-accounts.adoc
44

55
[id="service-accounts-granting-roles_{context}"]
6-
= Examples of granting roles to service accounts
6+
= Granting roles to service accounts
77

88
You can grant roles to service accounts in the same way that you grant roles
99
to a regular user account.

modules/service-accounts-overview.adoc

Lines changed: 4 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,12 @@ When you use the {product-title} CLI or web console, your API token
1515
authenticates you to the API. You can associate a component with a service account
1616
so that they can access the API without using a regular user's credentials.
1717
ifdef::openshift-online,openshift-origin,openshift-enterprise,openshift-webscale[]
18+
1819
For example, service accounts can allow:
1920

20-
* Replication controllers to make API calls to create or delete pods.
21-
* Applications inside containers to make API calls for discovery purposes.
22-
* External applications to make API calls for monitoring or integration purposes.
21+
* Replication controllers to make API calls to create or delete pods
22+
* Applications inside containers to make API calls for discovery purposes
23+
* External applications to make API calls for monitoring or integration purposes
2324
endif::[]
2425
2526
Each service account's user name is derived from its project and name:
@@ -45,12 +46,3 @@ Every service account is also a member of two groups:
4546
specified project.
4647

4748
|===
48-
49-
Each service account automatically contains two secrets:
50-
51-
* An API token
52-
* Credentials for the OpenShift Container Registry
53-
54-
The generated API token and registry credentials do not expire, but you can
55-
revoke them by deleting the secret. When you delete the secret, a new one is
56-
automatically generated to take its place.

0 commit comments

Comments
 (0)