Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 10 for RoleRef (0.26 sec)

  1. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml

        annotations:
          rbac.authorization.kubernetes.io/autoupdate: "true"
        creationTimestamp: null
        labels:
          kubernetes.io/bootstrapping: rbac-defaults
        name: system:controller:attachdetach-controller
      roleRef:
        apiGroup: rbac.authorization.k8s.io
        kind: ClusterRole
        name: system:controller:attachdetach-controller
      subjects:
      - kind: ServiceAccount
        name: attachdetach-controller
        namespace: kube-system
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Mar 06 00:00:21 UTC 2024
    - 16.9K bytes
    - Viewed (0)
  2. staging/src/k8s.io/api/rbac/v1/types.go

    	Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
    
    	// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
    	// If the RoleRef cannot be resolved, the Authorizer must return an error.
    	// This field is immutable.
    	RoleRef RoleRef `json:"roleRef" protobuf:"bytes,3,opt,name=roleRef"`
    }
    
    // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 23 17:42:49 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  3. staging/src/k8s.io/api/rbac/v1alpha1/types.go

    	Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
    
    	// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
    	// If the RoleRef cannot be resolved, the Authorizer must return an error.
    	RoleRef RoleRef `json:"roleRef" protobuf:"bytes,3,opt,name=roleRef"`
    }
    
    // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 22:49:19 UTC 2024
    - 11.2K bytes
    - Viewed (0)
  4. staging/src/k8s.io/api/rbac/v1beta1/types.go

    	Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
    
    	// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
    	// If the RoleRef cannot be resolved, the Authorizer must return an error.
    	RoleRef RoleRef `json:"roleRef" protobuf:"bytes,3,opt,name=roleRef"`
    }
    
    // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 22:49:19 UTC 2024
    - 13.1K bytes
    - Viewed (0)
  5. samples/addons/kiali.yaml

        app.kubernetes.io/name: kiali
        app.kubernetes.io/instance: kiali
        version: "v1.85.0"
        app.kubernetes.io/version: "v1.85.0"
        app.kubernetes.io/managed-by: Helm
        app.kubernetes.io/part-of: "kiali"
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: kiali
    subjects:
    - kind: ServiceAccount
      name: kiali
      namespace: istio-system
    ...
    ---
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 12 18:57:35 UTC 2024
    - 10.6K bytes
    - Viewed (0)
  6. tests/integration/security/egress_sidecar_tls_origination_test.go

      resources:
      - secrets
      verbs:
      - list
    `
    
    	rolebinding := `
    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: allow-list-secrets-to-{{ .ServiceAccount }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: allow-list-secrets
    subjects:
    - kind: ServiceAccount
      name: {{ .ServiceAccount }}
      namespace: {{ .Namespace }}
    `
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Apr 08 22:02:59 UTC 2024
    - 10.4K bytes
    - Viewed (0)
  7. samples/addons/prometheus.yaml

        app.kubernetes.io/managed-by: Helm
        app.kubernetes.io/part-of: prometheus
      name: prometheus
    subjects:
      - kind: ServiceAccount
        name: prometheus
        namespace: istio-system
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: prometheus
    ---
    # Source: prometheus/templates/service.yaml
    apiVersion: v1
    kind: Service
    metadata:
      labels:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 12 18:57:35 UTC 2024
    - 16.2K bytes
    - Viewed (0)
  8. cmd/kubeadm/app/phases/kubeconfig/kubeconfig.go

    		crbExists          bool
    		clusterRoleBinding = &rbac.ClusterRoleBinding{
    			ObjectMeta: metav1.ObjectMeta{
    				Name: kubeadmconstants.ClusterAdminsGroupAndClusterRoleBinding,
    			},
    			RoleRef: rbac.RoleRef{
    				APIGroup: rbac.GroupName,
    				Kind:     "ClusterRole",
    				Name:     "cluster-admin",
    			},
    			Subjects: []rbac.Subject{
    				{
    					Kind: rbac.GroupKind,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Jun 07 17:04:18 UTC 2024
    - 27K bytes
    - Viewed (0)
  9. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go

    		// This leaves the binding, but with an empty set of subjects, so that tightening reconciliation can remove the subject.
    		{
    			ObjectMeta: metav1.ObjectMeta{Name: systemNodeRoleName},
    			RoleRef:    rbacv1.RoleRef{APIGroup: rbacv1.GroupName, Kind: "ClusterRole", Name: systemNodeRoleName},
    		},
    	}
    
    	// Allow all in-cluster workloads (via their service accounts) to read the OIDC discovery endpoints.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 34.4K bytes
    - Viewed (0)
  10. cmd/kubeadm/app/phases/addons/dns/dns_test.go

      - discovery.k8s.io
      resources:
      - endpointslices
      verbs:
      - list
      - watch
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: system:coredns
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:coredns
    subjects:
    - kind: ServiceAccount
      name: coredns
      namespace: kube-system
    ---
    apiVersion: v1
    kind: ServiceAccount
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 11 10:21:20 UTC 2024
    - 41.7K bytes
    - Viewed (0)
Back to top