You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -161,19 +124,22 @@ $ curl -X GET <your-server-url>/api
161
124
"apiVersion": "v1",
162
125
"metadata": {},
163
126
"status": "Failure",
164
-
"message": "Unauthorized",
165
-
"reason": "Unauthorized",
166
-
"code": 401
127
+
"message": "forbidden: User \"system:anonymous\" cannot get path \"/api/\"",
128
+
"reason": "Forbidden",
129
+
"details": {},
130
+
"code": 403
167
131
}
168
132
```
169
133
170
-
9. Authorize with the API
134
+
7. Authorize with the API
171
135
172
136
- See [Using RBAC Authorization | Kubernetes](https://kubernetes.io/docs/reference/access-authn-authz/rbac/)
173
137
174
138
- On the minikube host:
175
139
1. Create a service account, `ClusterRoleBinding`, and token
176
140
141
+
- We create a service account called remote-dev that we will authenticate as
142
+
- We then create a `ClusterRoleBinding` referencing the `cluster-admin` role (created by default which provides full access to everything in the cluster) and bind the remote-dev account we just created to it
0 commit comments