-
Notifications
You must be signed in to change notification settings - Fork 39.7k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Allow setting service account with kubectl run #46318
Allow setting service account with kubectl run #46318
Conversation
@kubernetes/sig-cli-pr-reviews |
@k8s-bot pull-kubernetes-e2e-kops-aws test this |
I had expected |
it's too close to |
@fabianofranz PTAL |
/lgtm |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: fabianofranz, liggitt No associated issue. Update pull-request body to add a reference to an issue, or get approval with The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:
You can indicate your approval by writing |
/retest |
1 similar comment
/retest |
/retest |
4 similar comments
/retest |
/retest |
/retest |
/retest |
a6418eb
to
e8f2879
Compare
rebased |
flake on stage push-build.sh |
Automatic merge from submit-queue |
As more containers need to make use of the API, and more clusters are RBAC-enabled, which service account is used to run a particular container becomes more important.
This adds support to existing generators for setting the service account name in the pod spec.
related to #45147