- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 17 for roleRef (0.13 sec)
-
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml
annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:attachdetach-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:attachdetach-controller subjects: - kind: ServiceAccount name: attachdetach-controller namespace: kube-system
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 16.9K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/types.go
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"` // RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace. // If the RoleRef cannot be resolved, the Authorizer must return an error. // This field is immutable. RoleRef RoleRef `json:"roleRef" protobuf:"bytes,3,opt,name=roleRef"` } // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 23 17:42:49 UTC 2024 - 10.7K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1alpha1/types.go
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"` // RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace. // If the RoleRef cannot be resolved, the Authorizer must return an error. RoleRef RoleRef `json:"roleRef" protobuf:"bytes,3,opt,name=roleRef"` } // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 22:49:19 UTC 2024 - 11.2K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1beta1/types.go
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"` // RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace. // If the RoleRef cannot be resolved, the Authorizer must return an error. RoleRef RoleRef `json:"roleRef" protobuf:"bytes,3,opt,name=roleRef"` } // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 22:49:19 UTC 2024 - 13.1K bytes - Viewed (0) -
samples/addons/kiali.yaml
app.kubernetes.io/name: kiali app.kubernetes.io/instance: kiali version: "v1.85.0" app.kubernetes.io/version: "v1.85.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/part-of: "kiali" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: kiali subjects: - kind: ServiceAccount name: kiali namespace: istio-system ... ---
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 12 18:57:35 UTC 2024 - 10.6K bytes - Viewed (0) -
samples/security/spire/spire-quickstart.yaml
kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: spire-server-cluster-role-binding subjects: - kind: ServiceAccount name: spire-server namespace: spire roleRef: kind: ClusterRole name: spire-server-cluster-role apiGroup: rbac.authorization.k8s.io --- # Role for the SPIRE server. kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Oct 12 16:12:42 UTC 2023 - 32.2K bytes - Viewed (0) -
operator/cmd/mesh/test-util_test.go
func checkRoleBindingsReferenceRoles(g *WithT, objs *ObjectSet) { for _, o := range objs.kind(name2.RoleBindingStr).objSlice { ou := o.Unstructured() rrname := mustGetValueAtPath(g, ou, "roleRef.name") mustGetRole(g, objs, rrname.(string)) } } // checkClusterRoleBindingsReferenceRoles fails if any RoleBinding in objs references a Role that isn't found in objs.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Oct 31 14:48:28 UTC 2023 - 15.3K bytes - Viewed (0) -
tests/integration/security/egress_sidecar_tls_origination_test.go
resources: - secrets verbs: - list ` rolebinding := ` apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: allow-list-secrets-to-{{ .ServiceAccount }} roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: allow-list-secrets subjects: - kind: ServiceAccount name: {{ .ServiceAccount }} namespace: {{ .Namespace }} `
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 08 22:02:59 UTC 2024 - 10.4K bytes - Viewed (0) -
samples/addons/prometheus.yaml
app.kubernetes.io/managed-by: Helm app.kubernetes.io/part-of: prometheus name: prometheus subjects: - kind: ServiceAccount name: prometheus namespace: istio-system roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: prometheus --- # Source: prometheus/templates/service.yaml apiVersion: v1 kind: Service metadata: labels:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 12 18:57:35 UTC 2024 - 16.2K bytes - Viewed (0) -
cmd/kubeadm/app/phases/kubeconfig/kubeconfig.go
crbExists bool clusterRoleBinding = &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: kubeadmconstants.ClusterAdminsGroupAndClusterRoleBinding, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: "cluster-admin", }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 07 17:04:18 UTC 2024 - 27K bytes - Viewed (0)