- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 10 for clusterrolebindings (0.24 sec)
-
common-protos/k8s.io/api/rbac/v1beta1/generated.proto
// +optional optional AggregationRule aggregationRule = 3; } // ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, // and adds who information via Subject. // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBinding, and will no longer be served in v1.22. message ClusterRoleBinding { // Standard object's metadata. // +optional
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8.6K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1alpha1/generated.proto
} // ClusterRoleBindingList is a collection of ClusterRoleBindings. // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBindings, and will no longer be served in v1.22. message ClusterRoleBindingList { // Standard object's metadata. // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; // Items is a list of ClusterRoleBindings repeated ClusterRoleBinding items = 2; }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8.5K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1/generated.proto
optional RoleRef roleRef = 3; } // ClusterRoleBindingList is a collection of ClusterRoleBindings message ClusterRoleBindingList { // Standard object's metadata. // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; // Items is a list of ClusterRoleBindings repeated ClusterRoleBinding items = 2; } // ClusterRoleList is a collection of ClusterRoles message ClusterRoleList {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 7.6K bytes - Viewed (0) -
istioctl/pkg/precheck/precheck.go
}, { group: "rbac.authorization.k8s.io", version: "v1", resource: "clusterroles", }, { group: "rbac.authorization.k8s.io", version: "v1", resource: "clusterrolebindings", }, { group: "apiextensions.k8s.io", version: "v1", resource: "customresourcedefinitions", }, { namespace: istioNamespace, group: "rbac.authorization.k8s.io",
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Oct 24 02:31:32 UTC 2024 - 15.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.8.md
- Added RBAC reconcile commands with `kubectl auth reconcile -f FILE`. When passed a file which contains RBAC roles, rolebindings, clusterroles, or clusterrolebindings, this command computes covers and adds the missing rules. The logic required to properly apply RBAC permissions is more complicated than a JSON merge because you have to compute logical covers operations between
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Feb 20 15:45:02 UTC 2024 - 312.2K bytes - Viewed (0) -
cni/README.md
- `istio-cni-config` configmap with CNI plugin config to add to CNI plugin chained config - creates service-account `istio-cni` with `ClusterRoleBinding` to allow gets on pods' info and delete/modifications for recovery. - `install-cni` container - copies `istio-cni` and `istio-iptables` to `/opt/cni/bin`
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Jul 17 23:10:17 UTC 2024 - 10.5K bytes - Viewed (0) -
istioctl/pkg/multicluster/remote_secret_test.go
mustFindObject(t, objs, "istio-reader-service-account", "ServiceAccount") mustFindObject(t, objs, "istio-reader-clusterrole-istio-system", "ClusterRole") mustFindObject(t, objs, "istio-reader-clusterrole-istio-system", "ClusterRoleBinding") } func mustFindObject(t test.Failer, objs []manifest.Manifest, name, kind string) { t.Helper() var obj *manifest.Manifest for _, o := range objs { if o.GetKind() == kind && o.GetName() == name {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Oct 24 17:36:49 UTC 2024 - 20.7K bytes - Viewed (0) -
common/scripts/metallb-native.yaml
kind: Role name: pod-lister subjects: - kind: ServiceAccount name: speaker namespace: metallb-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: app: metallb name: metallb-system:controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: metallb-system:controller subjects:
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Feb 23 23:56:31 UTC 2024 - 63.9K bytes - Viewed (0) -
istioctl/pkg/multicluster/remote_secret.go
if mf.Component != component.BaseComponentName && mf.Component != component.PilotComponentName { continue } for _, m := range mf.Manifests { if m.GetKind() == "ClusterRole" || m.GetKind() == "ClusterRoleBinding" { included = append(included, m.Content) } if m.GetKind() == "ServiceAccount" && m.GetName() == "istio-reader-service-account" { included = append(included, m.Content) } } }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Aug 15 16:31:46 UTC 2024 - 23.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.29.md
- Kubeadm: do not exit with an error if the "super-admin.conf" cannot create a ClusterRoleBinding for the "cluster-admin" user, due to the ClusterRoleBInding already existing. ([#125821](https://github.com/kubernetes/kubernetes/pull/125821), [@neolit123](https://github.com/neolit123)) [SIG Cluster Lifecycle]
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Oct 23 04:37:31 UTC 2024 - 375.1K bytes - Viewed (1)