2019-05-01 21:11:23 +00:00
|
|
|
---
|
|
|
|
layout: api
|
|
|
|
page_title: ACL Binding Rules - HTTP API
|
2020-04-13 18:40:26 +00:00
|
|
|
sidebar_title: Binding Rules
|
2020-04-07 18:55:19 +00:00
|
|
|
description: The /acl/binding-rule endpoints manage Consul's ACL Binding Rules.
|
2019-05-01 21:11:23 +00:00
|
|
|
---
|
|
|
|
|
|
|
|
# ACL Binding Rule HTTP API
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
-> **1.5.0+:** The binding rule APIs are available in Consul versions 1.5.0 and newer.
|
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
The `/acl/binding-rule` endpoints [create](#create-a-binding-rule),
|
|
|
|
[read](#read-a-binding-rule), [update](#update-a-binding-rule),
|
2020-04-06 20:27:35 +00:00
|
|
|
[list](#list-binding-rules) and [delete](#delete-a-binding-rule) ACL binding
|
2019-05-01 21:11:23 +00:00
|
|
|
rules in Consul.
|
|
|
|
|
|
|
|
For more information on how to setup ACLs, please see
|
|
|
|
the [ACL Guide](https://learn.hashicorp.com/consul/advanced/day-1-operations/production-acls).
|
|
|
|
|
|
|
|
## Create a Binding Rule
|
|
|
|
|
|
|
|
This endpoint creates a new ACL binding rule.
|
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
| Method | Path | Produces |
|
|
|
|
| ------ | ------------------- | ------------------ |
|
|
|
|
| `PUT` | `/acl/binding-rule` | `application/json` |
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
2020-04-09 23:46:54 +00:00
|
|
|
[blocking queries](/api/features/blocking),
|
|
|
|
[consistency modes](/api/features/consistency),
|
|
|
|
[agent caching](/api/features/caching), and
|
2020-04-09 23:20:00 +00:00
|
|
|
[required ACLs](/api#authentication).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
|
|
|
| ---------------- | ----------------- | ------------- | ------------ |
|
|
|
|
| `NO` | `none` | `none` | `acl:write` |
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
- `Description` `(string: "")` - Free form human readable description of the binding rule.
|
|
|
|
|
|
|
|
- `AuthMethod` `(string: <required>)` - The name of the auth method that this
|
|
|
|
rule applies to. This field is immutable.
|
|
|
|
|
|
|
|
- `Selector` `(string: "")` - Specifies the expression used to match this rule
|
|
|
|
against valid identities returned from an auth method validation. If empty
|
2020-04-06 20:27:35 +00:00
|
|
|
this binding rule matches all valid identities returned from the auth method. For example:
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
```text
|
|
|
|
serviceaccount.namespace==default and serviceaccount.name!=vault
|
|
|
|
```
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
- `BindType` `(string: <required>)` - Specifies the way the binding rule
|
2020-04-06 20:27:35 +00:00
|
|
|
affects a token created at login.
|
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
- `BindType=service` - The computed bind name value is used as an
|
|
|
|
`ACLServiceIdentity.ServiceName` field in the token that is created.
|
|
|
|
|
|
|
|
```json
|
|
|
|
{ ...other fields...
|
|
|
|
"ServiceIdentities": [
|
|
|
|
{ "ServiceName": "<computed BindName>" }
|
|
|
|
]
|
|
|
|
}
|
|
|
|
```
|
2020-06-16 16:54:27 +00:00
|
|
|
|
|
|
|
- `BindType=node` - The computed bind name value is used as an
|
|
|
|
`ACLNodeIdentity.NodeName` field in the token that is created.
|
|
|
|
|
|
|
|
```json
|
|
|
|
{ ...other fields...
|
|
|
|
"NodeIdentities": [
|
|
|
|
{ "NodeName": "<computed BindName>", "Datacenter": "<local datacenter>" }
|
|
|
|
]
|
|
|
|
}
|
|
|
|
```
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
- `BindType=role` - The computed bind name value is used as a `RoleLink.Name`
|
|
|
|
field in the token that is created. This binding rule will only apply if a
|
|
|
|
role with the given name exists at login-time. If it does not then this
|
|
|
|
rule is ignored.
|
|
|
|
|
|
|
|
```json
|
|
|
|
{ ...other fields...
|
|
|
|
"Roles": [
|
|
|
|
{ "Name": "<computed BindName>" }
|
|
|
|
]
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
- `BindName` `(string: <required>)` - The name to bind to a token at
|
2020-04-06 20:27:35 +00:00
|
|
|
login-time. What it binds to can be adjusted with different values of the
|
2019-05-01 21:11:23 +00:00
|
|
|
`BindType` field. This can either be a plain string or lightly templated
|
|
|
|
using [HIL syntax](https://github.com/hashicorp/hil) to interpolate the same
|
|
|
|
values that are usable by the `Selector` syntax. For example:
|
2020-04-06 20:27:35 +00:00
|
|
|
|
|
|
|
```text
|
|
|
|
prefixed-${serviceaccount.name}
|
|
|
|
```
|
|
|
|
|
2020-04-23 22:13:18 +00:00
|
|
|
- `Namespace` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace to
|
2019-12-06 16:14:56 +00:00
|
|
|
create the binding rule. If not provided in the JSON body, the value of
|
2020-04-06 20:27:35 +00:00
|
|
|
the `ns` URL query parameter or in the `X-Consul-Namespace` header will be used.
|
|
|
|
If not provided at all, the namespace will be inherited from the request's ACL
|
2019-12-20 16:52:50 +00:00
|
|
|
token or will default to the `default` namespace. Added in Consul 1.7.0.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
### Sample Payload
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
"Description": "example rule",
|
|
|
|
"AuthMethod": "minikube",
|
|
|
|
"Selector": "serviceaccount.namespace==default",
|
|
|
|
"BindType": "service",
|
|
|
|
"BindName": "{{ serviceaccount.name }}"
|
2019-05-01 21:11:23 +00:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2019-05-01 21:11:23 +00:00
|
|
|
$ curl -X PUT \
|
|
|
|
--data @payload.json \
|
|
|
|
http://127.0.0.1:8500/v1/acl/binding-rule
|
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
"ID": "000ed53c-e2d3-e7e6-31a5-c19bc3518a3d",
|
|
|
|
"Description": "example rule",
|
|
|
|
"AuthMethod": "minikube",
|
|
|
|
"Selector": "serviceaccount.namespace==default",
|
|
|
|
"BindType": "service",
|
|
|
|
"BindName": "{{ serviceaccount.name }}",
|
|
|
|
"CreateIndex": 17,
|
|
|
|
"ModifyIndex": 17
|
2019-05-01 21:11:23 +00:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
## Read a Binding Rule
|
|
|
|
|
|
|
|
This endpoint reads an ACL binding rule with the given ID. If no
|
|
|
|
binding rule exists with the given ID, a 404 is returned instead of a 200
|
|
|
|
response.
|
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
| Method | Path | Produces |
|
|
|
|
| ------ | ----------------------- | ------------------ |
|
|
|
|
| `GET` | `/acl/binding-rule/:id` | `application/json` |
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
2020-04-09 23:46:54 +00:00
|
|
|
[blocking queries](/api/features/blocking),
|
|
|
|
[consistency modes](/api/features/consistency),
|
|
|
|
[agent caching](/api/features/caching), and
|
2020-04-09 23:20:00 +00:00
|
|
|
[required ACLs](/api#authentication).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
|
|
|
| ---------------- | ----------------- | ------------- | ------------ |
|
|
|
|
| `YES` | `all` | `none` | `acl:read` |
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
- `id` `(string: <required>)` - Specifies the UUID of the ACL binding rule
|
|
|
|
to read. This is required and is specified as part of the URL path.
|
2020-04-06 20:27:35 +00:00
|
|
|
|
2020-04-23 22:13:18 +00:00
|
|
|
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace to lookup
|
2020-04-06 20:27:35 +00:00
|
|
|
the binding rule. This value can be specified as the `ns` URL query
|
2019-12-10 21:04:24 +00:00
|
|
|
parameter or the `X-Consul-Namespace` header. If not provided by either,
|
2019-12-20 16:52:50 +00:00
|
|
|
the namespace will be inherited from the request's ACL token or will default
|
|
|
|
to the `default` namespace. Added in Consul 1.7.0.
|
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
### Sample Request
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2019-05-01 21:11:23 +00:00
|
|
|
$ curl -X GET http://127.0.0.1:8500/v1/acl/binding-rule/000ed53c-e2d3-e7e6-31a5-c19bc3518a3d
|
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
"ID": "000ed53c-e2d3-e7e6-31a5-c19bc3518a3d",
|
|
|
|
"Description": "example rule",
|
|
|
|
"AuthMethod": "minikube",
|
|
|
|
"Selector": "serviceaccount.namespace==default",
|
|
|
|
"BindType": "service",
|
|
|
|
"BindName": "{{ serviceaccount.name }}",
|
|
|
|
"CreateIndex": 17,
|
|
|
|
"ModifyIndex": 17
|
2019-05-01 21:11:23 +00:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
## Update a Binding Rule
|
|
|
|
|
|
|
|
This endpoint updates an existing ACL binding rule.
|
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
| Method | Path | Produces |
|
|
|
|
| ------ | ----------------------- | ------------------ |
|
|
|
|
| `PUT` | `/acl/binding-rule/:id` | `application/json` |
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
2020-04-09 23:46:54 +00:00
|
|
|
[blocking queries](/api/features/blocking),
|
|
|
|
[consistency modes](/api/features/consistency),
|
|
|
|
[agent caching](/api/features/caching), and
|
2020-04-09 23:20:00 +00:00
|
|
|
[required ACLs](/api#authentication).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
|
|
|
| ---------------- | ----------------- | ------------- | ------------ |
|
|
|
|
| `NO` | `none` | `none` | `acl:write` |
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
- `ID` `(string: <required>)` - Specifies the ID of the binding rule to update.
|
|
|
|
This is required in the URL path but may also be specified in the JSON body.
|
|
|
|
If specified in both places then they must match exactly.
|
|
|
|
|
|
|
|
- `Description` `(string: "")` - Free form human readable description of the binding rule.
|
|
|
|
|
|
|
|
- `AuthMethod` `(string: <required>)` - Specifies the name of the auth
|
|
|
|
method that this rule applies to. This field is immutable so if present in
|
|
|
|
the body then it must match the existing value. If not present then the value
|
|
|
|
will be filled in by Consul.
|
|
|
|
|
|
|
|
- `Selector` `(string: "")` - Specifies the expression used to match this rule
|
|
|
|
against valid identities returned from an auth method validation. If empty
|
2020-04-06 20:27:35 +00:00
|
|
|
this binding rule matches all valid identities returned from the auth method. For example:
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
```text
|
|
|
|
serviceaccount.namespace==default and serviceaccount.name!=vault
|
|
|
|
```
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
- `BindType` `(string: <required>)` - Specifies the way the binding rule
|
2020-04-06 20:27:35 +00:00
|
|
|
affects a token created at login.
|
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
- `BindType=service` - The computed bind name value is used as an
|
|
|
|
`ACLServiceIdentity.ServiceName` field in the token that is created.
|
|
|
|
|
|
|
|
```json
|
|
|
|
{ ...other fields...
|
|
|
|
"ServiceIdentities": [
|
|
|
|
{ "ServiceName": "<computed BindName>" }
|
|
|
|
]
|
|
|
|
}
|
|
|
|
```
|
2020-06-16 16:54:27 +00:00
|
|
|
|
|
|
|
- `BindType=node` - The computed bind name value is used as an
|
|
|
|
`ACLNodeIdentity.NodeName` field in the token that is created.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-06-16 16:54:27 +00:00
|
|
|
```json
|
|
|
|
{ ...other fields...
|
|
|
|
"NodeIdentities": [
|
|
|
|
{ "NodeName": "<computed BindName>", "Datacenter": "<local datacenter>" }
|
|
|
|
]
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
- `BindType=role` - The computed bind name value is used as a `RoleLink.Name`
|
|
|
|
field in the token that is created. This binding rule will only apply if a
|
|
|
|
role with the given name exists at login-time. If it does not then this
|
|
|
|
rule is ignored.
|
|
|
|
|
|
|
|
```json
|
|
|
|
{ ...other fields...
|
|
|
|
"Roles": [
|
|
|
|
{ "Name": "<computed BindName>" }
|
|
|
|
]
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
- `BindName` `(string: <required>)` - The name to bind to a token at
|
2020-04-06 20:27:35 +00:00
|
|
|
login-time. What it binds to can be adjusted with different values of the
|
2019-05-01 21:11:23 +00:00
|
|
|
`BindType` field. This can either be a plain string or lightly templated
|
|
|
|
using [HIL syntax](https://github.com/hashicorp/hil) to interpolate the same
|
|
|
|
values that are usable by the `Selector` syntax. For example:
|
2020-04-06 20:27:35 +00:00
|
|
|
|
|
|
|
```text
|
|
|
|
prefixed-${serviceaccount.name}
|
|
|
|
```
|
|
|
|
|
2020-04-23 22:13:18 +00:00
|
|
|
- `Namespace` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of
|
2019-12-06 16:14:56 +00:00
|
|
|
the binding rule to update. If not provided in the JSON body, the value of
|
2020-04-06 20:27:35 +00:00
|
|
|
the `ns` URL query parameter or in the `X-Consul-Namespace` header will be used.
|
|
|
|
If not provided at all, the namespace will be inherited from the request's ACL
|
2019-12-20 16:52:50 +00:00
|
|
|
token or will default to the `default` namespace. Added in Consul 1.7.0.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
### Sample Payload
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
"Description": "updated rule",
|
|
|
|
"Selector": "serviceaccount.namespace=dev",
|
|
|
|
"BindType": "role",
|
|
|
|
"BindName": "{{ serviceaccount.name }}"
|
2019-05-01 21:11:23 +00:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2019-05-01 21:11:23 +00:00
|
|
|
$ curl -X PUT \
|
|
|
|
--data @payload.json \
|
|
|
|
http://127.0.0.1:8500/v1/acl/binding-rule/000ed53c-e2d3-e7e6-31a5-c19bc3518a3d
|
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
"ID": "000ed53c-e2d3-e7e6-31a5-c19bc3518a3d",
|
|
|
|
"Description": "updated rule",
|
|
|
|
"AuthMethod": "minikube",
|
|
|
|
"Selector": "serviceaccount.namespace=dev",
|
|
|
|
"BindType": "role",
|
|
|
|
"BindName": "{{ serviceaccount.name }}",
|
|
|
|
"CreateIndex": 17,
|
|
|
|
"ModifyIndex": 18
|
2019-05-01 21:11:23 +00:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
## Delete a Binding Rule
|
|
|
|
|
|
|
|
This endpoint deletes an ACL binding rule.
|
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
| Method | Path | Produces |
|
|
|
|
| -------- | ----------------------- | ------------------ |
|
|
|
|
| `DELETE` | `/acl/binding-rule/:id` | `application/json` |
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
Even though the return type is application/json, the value is either true or
|
|
|
|
false indicating whether the delete succeeded.
|
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
2020-04-09 23:46:54 +00:00
|
|
|
[blocking queries](/api/features/blocking),
|
|
|
|
[consistency modes](/api/features/consistency),
|
|
|
|
[agent caching](/api/features/caching), and
|
2020-04-09 23:20:00 +00:00
|
|
|
[required ACLs](/api#authentication).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
|
|
|
| ---------------- | ----------------- | ------------- | ------------ |
|
|
|
|
| `NO` | `none` | `none` | `acl:write` |
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
- `id` `(string: <required>)` - Specifies the UUID of the ACL binding rule to
|
|
|
|
delete. This is required and is specified as part of the URL path.
|
2020-04-06 20:27:35 +00:00
|
|
|
|
2020-04-23 22:13:18 +00:00
|
|
|
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of the
|
2020-04-06 20:27:35 +00:00
|
|
|
binding rule to delete. This value can be specified as the `ns` URL query
|
2019-12-10 21:04:24 +00:00
|
|
|
parameter or the `X-Consul-Namespace` header. If not provided by either,
|
2019-12-20 16:52:50 +00:00
|
|
|
the namespace will be inherited from the request's ACL token or will default
|
|
|
|
to the `default` namespace. Added in Consul 1.7.0.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2019-05-01 21:11:23 +00:00
|
|
|
$ curl -X DELETE \
|
|
|
|
http://127.0.0.1:8500/v1/acl/binding-rule/000ed53c-e2d3-e7e6-31a5-c19bc3518a3d
|
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Response
|
2020-04-06 20:27:35 +00:00
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
```json
|
|
|
|
true
|
|
|
|
```
|
|
|
|
|
|
|
|
## List Binding Rules
|
|
|
|
|
|
|
|
This endpoint lists all the ACL binding rules.
|
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
| Method | Path | Produces |
|
|
|
|
| ------ | -------------------- | ------------------ |
|
|
|
|
| `GET` | `/acl/binding-rules` | `application/json` |
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
2020-04-09 23:46:54 +00:00
|
|
|
[blocking queries](/api/features/blocking),
|
|
|
|
[consistency modes](/api/features/consistency),
|
|
|
|
[agent caching](/api/features/caching), and
|
2020-04-09 23:20:00 +00:00
|
|
|
[required ACLs](/api#authentication).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
|
|
|
| ---------------- | ----------------- | ------------- | ------------ |
|
|
|
|
| `YES` | `all` | `none` | `acl:read` |
|
|
|
|
|
|
|
|
## Parameters
|
|
|
|
|
|
|
|
- `authmethod` `(string: "")` - Filters the binding rule list to those binding
|
|
|
|
rules that are linked with the specific named auth method.
|
2020-04-06 20:27:35 +00:00
|
|
|
|
2020-04-23 22:13:18 +00:00
|
|
|
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace to list
|
2020-04-06 20:27:35 +00:00
|
|
|
the binding rules for. This value can be specified as the `ns` URL query
|
2019-12-10 21:04:24 +00:00
|
|
|
parameter or the `X-Consul-Namespace` header. If not provided by either,
|
2019-12-20 16:52:50 +00:00
|
|
|
the namespace will be inherited from the request's ACL token or will default
|
2020-04-06 20:27:35 +00:00
|
|
|
to the `default` namespace. The namespace may be specified as '\*' and then
|
2019-12-20 16:52:50 +00:00
|
|
|
results will be returned for all namespaces. Added in Consul 1.7.0.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
## Sample Request
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2019-05-01 21:11:23 +00:00
|
|
|
$ curl -X GET http://127.0.0.1:8500/v1/acl/binding-rules
|
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
```json
|
|
|
|
[
|
2020-04-06 20:27:35 +00:00
|
|
|
{
|
|
|
|
"ID": "000ed53c-e2d3-e7e6-31a5-c19bc3518a3d",
|
|
|
|
"Description": "example 1",
|
|
|
|
"AuthMethod": "minikube-1",
|
|
|
|
"BindType": "service",
|
|
|
|
"BindName": "k8s-{{ serviceaccount.name }}",
|
|
|
|
"CreateIndex": 17,
|
|
|
|
"ModifyIndex": 17
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"ID": "b4f0a0a3-69f2-7a4f-6bef-326034ace9fa",
|
|
|
|
"Description": "example 2",
|
|
|
|
"AuthMethod": "minikube-2",
|
2020-06-16 16:54:27 +00:00
|
|
|
"BindType": "service",
|
2020-04-06 20:27:35 +00:00
|
|
|
"Selector": "serviceaccount.namespace==default",
|
|
|
|
"BindName": "k8s-{{ serviceaccount.name }}",
|
|
|
|
"CreateIndex": 18,
|
|
|
|
"ModifyIndex": 18
|
|
|
|
}
|
2019-05-01 21:11:23 +00:00
|
|
|
]
|
|
|
|
```
|