- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 63 for roleRef (0.11 sec)
-
cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap_test.go
name: "ClusterRoleBindings already exists", client: newMockClusterRoleBinddingClientForTest(t, &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: constants.NodeKubeletBootstrap, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: constants.NodeBootstrapperClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 04:16:31 UTC 2023 - 8.1K bytes - Viewed (0) -
cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap.go
return apiclient.CreateOrUpdateClusterRoleBinding(client, &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: constants.NodeKubeletBootstrap, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: constants.NodeBootstrapperClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Oct 15 10:49:52 UTC 2023 - 4.2K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1/generated.proto
// Subjects holds references to the objects the role applies to. // +optional repeated Subject subjects = 2; // RoleRef can only reference a ClusterRole in the global namespace. // If the RoleRef cannot be resolved, the Authorizer must return an error. optional RoleRef roleRef = 3; } // ClusterRoleBindingList is a collection of ClusterRoleBindings message ClusterRoleBindingList { // Standard object's metadata.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 7.6K bytes - Viewed (0) -
pkg/registry/rbac/clusterrolebinding/policybased/storage.go
clusterRoleBinding := obj.(*rbac.ClusterRoleBinding) if rbacregistry.BindingAuthorized(ctx, clusterRoleBinding.RoleRef, metav1.NamespaceNone, s.authorizer) { return s.StandardStorage.Create(ctx, obj, createValidation, options) } v1RoleRef := rbacv1.RoleRef{} err := rbacv1helpers.Convert_rbac_RoleRef_To_v1_RoleRef(&clusterRoleBinding.RoleRef, &v1RoleRef, nil) if err != nil { return nil, err }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 4.9K bytes - Viewed (0) -
pkg/apis/rbac/types.go
// Subjects holds references to the objects the role applies to. Subjects []Subject // RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace. // If the RoleRef cannot be resolved, the Authorizer must return an error. // This field is immutable. RoleRef RoleRef } // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 24 20:35:20 UTC 2023 - 7.8K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1alpha1/generated.proto
// Subjects holds references to the objects the role applies to. // +optional repeated Subject subjects = 2; // RoleRef can only reference a ClusterRole in the global namespace. // If the RoleRef cannot be resolved, the Authorizer must return an error. optional RoleRef roleRef = 3; } // ClusterRoleBindingList is a collection of ClusterRoleBindings.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8.5K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1beta1/generated.proto
// Subjects holds references to the objects the role applies to. // +optional repeated Subject subjects = 2; // RoleRef can only reference a ClusterRole in the global namespace. // If the RoleRef cannot be resolved, the Authorizer must return an error. optional RoleRef roleRef = 3; } // ClusterRoleBindingList is a collection of ClusterRoleBindings.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8.6K bytes - Viewed (0) -
pkg/registry/rbac/rolebinding/policybased/storage.go
} roleBinding := obj.(*rbac.RoleBinding) if rbacregistry.BindingAuthorized(ctx, roleBinding.RoleRef, namespace, s.authorizer) { return s.StandardStorage.Create(ctx, obj, createValidation, options) } v1RoleRef := rbacv1.RoleRef{} err := rbacv1helpers.Convert_rbac_RoleRef_To_v1_RoleRef(&roleBinding.RoleRef, &v1RoleRef, nil) if err != nil { return nil, err }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 5.5K bytes - Viewed (0) -
cluster/addons/cloud-controller-manager/cloud-node-controller-binding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: labels: addonmanager.kubernetes.io/mode: Reconcile name: system::leader-locking-cloud-controller-manager namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system::leader-locking-cloud-controller-manager subjects: - kind: ServiceAccount name: cloud-controller-manager namespace: kube-system ---
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 03 17:38:23 UTC 2022 - 1.2K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/generated.proto
// +optional // +listType=atomic repeated Subject subjects = 2; // RoleRef can only reference a ClusterRole in the global namespace. // If the RoleRef cannot be resolved, the Authorizer must return an error. // This field is immutable. optional RoleRef roleRef = 3; } // ClusterRoleBindingList is a collection of ClusterRoleBindings message ClusterRoleBindingList {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 15:34:11 UTC 2024 - 7.9K bytes - Viewed (0)