Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 5 of 5 for RoleRef (0.26 sec)

  1. staging/src/k8s.io/api/rbac/v1/types.go

    	Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
    
    	// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
    	// If the RoleRef cannot be resolved, the Authorizer must return an error.
    	// This field is immutable.
    	RoleRef RoleRef `json:"roleRef" protobuf:"bytes,3,opt,name=roleRef"`
    }
    
    // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 23 17:42:49 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  2. samples/addons/kiali.yaml

        app.kubernetes.io/name: kiali
        app.kubernetes.io/instance: kiali
        version: "v1.85.0"
        app.kubernetes.io/version: "v1.85.0"
        app.kubernetes.io/managed-by: Helm
        app.kubernetes.io/part-of: "kiali"
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: kiali
    subjects:
    - kind: ServiceAccount
      name: kiali
      namespace: istio-system
    ...
    ---
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 12 18:57:35 UTC 2024
    - 10.6K bytes
    - Viewed (0)
  3. samples/addons/prometheus.yaml

        app.kubernetes.io/managed-by: Helm
        app.kubernetes.io/part-of: prometheus
      name: prometheus
    subjects:
      - kind: ServiceAccount
        name: prometheus
        namespace: istio-system
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: prometheus
    ---
    # Source: prometheus/templates/service.yaml
    apiVersion: v1
    kind: Service
    metadata:
      labels:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 12 18:57:35 UTC 2024
    - 16.2K bytes
    - Viewed (0)
  4. cmd/kubeadm/app/phases/kubeconfig/kubeconfig.go

    		crbExists          bool
    		clusterRoleBinding = &rbac.ClusterRoleBinding{
    			ObjectMeta: metav1.ObjectMeta{
    				Name: kubeadmconstants.ClusterAdminsGroupAndClusterRoleBinding,
    			},
    			RoleRef: rbac.RoleRef{
    				APIGroup: rbac.GroupName,
    				Kind:     "ClusterRole",
    				Name:     "cluster-admin",
    			},
    			Subjects: []rbac.Subject{
    				{
    					Kind: rbac.GroupKind,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Jun 07 17:04:18 UTC 2024
    - 27K bytes
    - Viewed (0)
  5. cmd/kubeadm/app/phases/addons/dns/dns_test.go

      - discovery.k8s.io
      resources:
      - endpointslices
      verbs:
      - list
      - watch
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: system:coredns
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:coredns
    subjects:
    - kind: ServiceAccount
      name: coredns
      namespace: kube-system
    ---
    apiVersion: v1
    kind: ServiceAccount
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 11 10:21:20 UTC 2024
    - 41.7K bytes
    - Viewed (0)
Back to top