- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 11 for clusterroles (0.19 sec)
-
common-protos/k8s.io/api/rbac/v1beta1/generated.proto
} // ClusterRoleList is a collection of ClusterRoles. // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoles, and will no longer be served in v1.22. message ClusterRoleList { // Standard object's metadata. // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; // Items is a list of ClusterRoles repeated ClusterRole items = 2; }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8.6K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1alpha1/generated.proto
} // ClusterRoleList is a collection of ClusterRoles. // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoles, and will no longer be served in v1.22. message ClusterRoleList { // Standard object's metadata. // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; // Items is a list of ClusterRoles repeated ClusterRole items = 2; }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8.5K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1/generated.proto
option go_package = "k8s.io/api/rbac/v1"; // AggregationRule describes how to locate ClusterRoles to aggregate into the ClusterRole message AggregationRule { // ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules. // If any of the selectors match, then the ClusterRole's permissions will be added // +optional
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 7.6K bytes - Viewed (0) -
istioctl/pkg/precheck/precheck.go
version string resource string }{ { version: "v1", resource: "namespaces", }, { group: "rbac.authorization.k8s.io", version: "v1", resource: "clusterroles", }, { group: "rbac.authorization.k8s.io", version: "v1", resource: "clusterrolebindings", }, { group: "apiextensions.k8s.io", version: "v1",
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Oct 24 02:31:32 UTC 2024 - 15.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.8.md
* The API Server now automatically creates RBAC ClusterRoles for CSR approving. ([#49284](https://github.com/kubernetes/kubernetes/pull/49284), [@luxas](https://github.com/luxas)) * Each deployment method should bind users/groups to the ClusterRoles if they are using this feature.
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Feb 20 15:45:02 UTC 2024 - 312.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.32.md
- Removed unneeded permissions for system:controller:persistent-volume-binder and system:controller:expand-controller clusterroles ([#125995](https://github.com/kubernetes/kubernetes/pull/125995), [@carlory](https://github.com/carlory)) [SIG Auth and Storage]
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Oct 29 20:17:52 UTC 2024 - 121.6K bytes - Viewed (0) -
istioctl/pkg/multicluster/remote_secret_test.go
if err != nil { t.Fatal(err) } mustFindObject(t, objs, "istio-reader-service-account", "ServiceAccount") mustFindObject(t, objs, "istio-reader-clusterrole-istio-system", "ClusterRole") mustFindObject(t, objs, "istio-reader-clusterrole-istio-system", "ClusterRoleBinding") } func mustFindObject(t test.Failer, objs []manifest.Manifest, name, kind string) { t.Helper() var obj *manifest.Manifest
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Oct 24 17:36:49 UTC 2024 - 20.7K bytes - Viewed (0) -
common/scripts/metallb-native.yaml
- list - watch - apiGroups: - metallb.io resources: - communities verbs: - get - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: labels: app: metallb name: metallb-system:controller rules: - apiGroups: - "" resources: - services - namespaces verbs: - get - list
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Feb 23 23:56:31 UTC 2024 - 63.9K bytes - Viewed (0) -
istioctl/pkg/multicluster/remote_secret.go
for _, mf := range mfs { if mf.Component != component.BaseComponentName && mf.Component != component.PilotComponentName { continue } for _, m := range mf.Manifests { if m.GetKind() == "ClusterRole" || m.GetKind() == "ClusterRoleBinding" { included = append(included, m.Content) } if m.GetKind() == "ServiceAccount" && m.GetName() == "istio-reader-service-account" { included = append(included, m.Content)
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Aug 15 16:31:46 UTC 2024 - 23.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.29.md
- The `horizontalpodautoscaling` and `clusterrole-aggregation` controllers now assume the `autoscaling/v1` and `rbac.authorization.k8s.io/v1` APIs are available. If you disable those APIs and do not want to run those controllers, exclude them by passing `--controllers=-horizontalpodautoscaling` or `--controllers=-clusterrole-aggregation` to `kube-controller-manager`. ([#117977](https://github.com/kubernetes/kubernetes/pull/117977),...
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Oct 23 04:37:31 UTC 2024 - 375.1K bytes - Viewed (1)