Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 14 for clusterrolebindings (0.1 sec)

  1. common-protos/k8s.io/api/rbac/v1beta1/generated.proto

      // +optional
      optional AggregationRule aggregationRule = 3;
    }
    
    // ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace,
    // and adds who information via Subject.
    // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBinding, and will no longer be served in v1.22.
    message ClusterRoleBinding {
      // Standard object's metadata.
      // +optional
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 8.6K bytes
    - Viewed (0)
  2. common-protos/k8s.io/api/rbac/v1alpha1/generated.proto

    }
    
    // ClusterRoleBindingList is a collection of ClusterRoleBindings.
    // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBindings, and will no longer be served in v1.22.
    message ClusterRoleBindingList {
      // Standard object's metadata.
      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
    
      // Items is a list of ClusterRoleBindings
      repeated ClusterRoleBinding items = 2;
    }
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 8.5K bytes
    - Viewed (0)
  3. common-protos/k8s.io/api/rbac/v1/generated.proto

      optional RoleRef roleRef = 3;
    }
    
    // ClusterRoleBindingList is a collection of ClusterRoleBindings
    message ClusterRoleBindingList {
      // Standard object's metadata.
      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
    
      // Items is a list of ClusterRoleBindings
      repeated ClusterRoleBinding items = 2;
    }
    
    // ClusterRoleList is a collection of ClusterRoles
    message ClusterRoleList {
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 7.6K bytes
    - Viewed (0)
  4. istioctl/pkg/precheck/precheck.go

    		},
    		{
    			group:    "rbac.authorization.k8s.io",
    			version:  "v1",
    			resource: "clusterroles",
    		},
    		{
    			group:    "rbac.authorization.k8s.io",
    			version:  "v1",
    			resource: "clusterrolebindings",
    		},
    		{
    			group:    "apiextensions.k8s.io",
    			version:  "v1",
    			resource: "customresourcedefinitions",
    		},
    		{
    			namespace: istioNamespace,
    			group:     "rbac.authorization.k8s.io",
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Oct 24 02:31:32 UTC 2024
    - 15.3K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.8.md

    - Added RBAC reconcile commands with `kubectl auth reconcile -f FILE`. When
      passed a file which contains RBAC roles, rolebindings, clusterroles, or
      clusterrolebindings, this command computes covers and adds the missing rules.
      The logic required to properly apply RBAC permissions is more complicated
      than a JSON merge because you have to compute logical covers operations between
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Tue Feb 20 15:45:02 UTC 2024
    - 312.2K bytes
    - Viewed (0)
  6. cni/README.md

        - `istio-cni-config` configmap with CNI plugin config to add to CNI plugin chained config
        - creates service-account `istio-cni` with `ClusterRoleBinding` to allow gets on pods' info and delete/modifications for recovery.
    
    - `install-cni` container
        - copies `istio-cni` and `istio-iptables` to `/opt/cni/bin`
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Jul 17 23:10:17 UTC 2024
    - 10.5K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.10.md

    [@caesarxuchao](https://github.com/caesarxuchao))
    
    * Using kubectl gcp auth plugin with a Google Service Account to authenticate to a cluster now additionally requests a token with the  "userinfo.email" scope. This way, users can write ClusterRoleBindings/RoleBindings with the email address of the service account directly. (This is a breaking change if the numeric uniqueIDs of the Google service accounts were being used in RBAC role bindings. The behavior can be overridden by explicitly specifying...
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 341.8K bytes
    - Viewed (0)
  8. istioctl/pkg/multicluster/remote_secret_test.go

    	mustFindObject(t, objs, "istio-reader-service-account", "ServiceAccount")
    	mustFindObject(t, objs, "istio-reader-clusterrole-istio-system", "ClusterRole")
    	mustFindObject(t, objs, "istio-reader-clusterrole-istio-system", "ClusterRoleBinding")
    }
    
    func mustFindObject(t test.Failer, objs []manifest.Manifest, name, kind string) {
    	t.Helper()
    	var obj *manifest.Manifest
    	for _, o := range objs {
    		if o.GetKind() == kind && o.GetName() == name {
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Oct 24 17:36:49 UTC 2024
    - 20.7K bytes
    - Viewed (0)
  9. common/scripts/metallb-native.yaml

      kind: Role
      name: pod-lister
    subjects:
    - kind: ServiceAccount
      name: speaker
      namespace: metallb-system
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        app: metallb
      name: metallb-system:controller
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: metallb-system:controller
    subjects:
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Fri Feb 23 23:56:31 UTC 2024
    - 63.9K bytes
    - Viewed (0)
  10. istioctl/pkg/multicluster/remote_secret.go

    		if mf.Component != component.BaseComponentName && mf.Component != component.PilotComponentName {
    			continue
    		}
    		for _, m := range mf.Manifests {
    			if m.GetKind() == "ClusterRole" || m.GetKind() == "ClusterRoleBinding" {
    				included = append(included, m.Content)
    			}
    			if m.GetKind() == "ServiceAccount" && m.GetName() == "istio-reader-service-account" {
    				included = append(included, m.Content)
    			}
    		}
    	}
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Aug 15 16:31:46 UTC 2024
    - 23.3K bytes
    - Viewed (0)
Back to top