- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 20 for clusterrolebindings (0.19 sec)
-
common-protos/k8s.io/api/rbac/v1beta1/generated.proto
// +optional optional AggregationRule aggregationRule = 3; } // ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, // and adds who information via Subject. // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBinding, and will no longer be served in v1.22. message ClusterRoleBinding { // Standard object's metadata. // +optional
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8.6K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1alpha1/generated.proto
} // ClusterRoleBindingList is a collection of ClusterRoleBindings. // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBindings, and will no longer be served in v1.22. message ClusterRoleBindingList { // Standard object's metadata. // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; // Items is a list of ClusterRoleBindings repeated ClusterRoleBinding items = 2; }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8.5K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1/generated.proto
optional RoleRef roleRef = 3; } // ClusterRoleBindingList is a collection of ClusterRoleBindings message ClusterRoleBindingList { // Standard object's metadata. // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; // Items is a list of ClusterRoleBindings repeated ClusterRoleBinding items = 2; } // ClusterRoleList is a collection of ClusterRoles message ClusterRoleList {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 7.6K bytes - Viewed (0) -
istioctl/pkg/precheck/precheck.go
}, { group: "rbac.authorization.k8s.io", version: "v1", resource: "clusterroles", }, { group: "rbac.authorization.k8s.io", version: "v1", resource: "clusterrolebindings", }, { group: "apiextensions.k8s.io", version: "v1", resource: "customresourcedefinitions", }, { namespace: istioNamespace, group: "rbac.authorization.k8s.io",
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Oct 24 02:31:32 UTC 2024 - 15.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.8.md
- Added RBAC reconcile commands with `kubectl auth reconcile -f FILE`. When passed a file which contains RBAC roles, rolebindings, clusterroles, or clusterrolebindings, this command computes covers and adds the missing rules. The logic required to properly apply RBAC permissions is more complicated than a JSON merge because you have to compute logical covers operations between
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Feb 20 15:45:02 UTC 2024 - 312.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.9.md
* RBAC objects are now stored in etcd in v1 format. After upgrading to 1.9, ensure all RBAC objects (Roles, RoleBindings, ClusterRoles, ClusterRoleBindings) are at v1. v1alpha1 support is deprecated and will be removed in a future release. ([#52950](https://github.com/kubernetes/kubernetes/pull/52950),[ @liggitt](https://github.com/liggitt)) ### **Cluster Lifecycle**
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Nov 16 10:46:27 UTC 2021 - 313.7K bytes - Viewed (0) -
cni/README.md
- `istio-cni-config` configmap with CNI plugin config to add to CNI plugin chained config - creates service-account `istio-cni` with `ClusterRoleBinding` to allow gets on pods' info and delete/modifications for recovery. - `install-cni` container - copies `istio-cni` and `istio-iptables` to `/opt/cni/bin`
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Jul 17 23:10:17 UTC 2024 - 10.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.10.md
[@caesarxuchao](https://github.com/caesarxuchao)) * Using kubectl gcp auth plugin with a Google Service Account to authenticate to a cluster now additionally requests a token with the "userinfo.email" scope. This way, users can write ClusterRoleBindings/RoleBindings with the email address of the service account directly. (This is a breaking change if the numeric uniqueIDs of the Google service accounts were being used in RBAC role bindings. The behavior can be overridden by explicitly specifying...
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 341.8K bytes - Viewed (0) -
istioctl/pkg/multicluster/remote_secret_test.go
mustFindObject(t, objs, "istio-reader-service-account", "ServiceAccount") mustFindObject(t, objs, "istio-reader-clusterrole-istio-system", "ClusterRole") mustFindObject(t, objs, "istio-reader-clusterrole-istio-system", "ClusterRoleBinding") } func mustFindObject(t test.Failer, objs []manifest.Manifest, name, kind string) { t.Helper() var obj *manifest.Manifest for _, o := range objs { if o.GetKind() == kind && o.GetName() == name {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Oct 24 17:36:49 UTC 2024 - 20.7K bytes - Viewed (0) -
common/scripts/metallb-native.yaml
kind: Role name: pod-lister subjects: - kind: ServiceAccount name: speaker namespace: metallb-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: app: metallb name: metallb-system:controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: metallb-system:controller subjects:
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Feb 23 23:56:31 UTC 2024 - 63.9K bytes - Viewed (0)