- Sort Score
- Result 10 results
- Languages All
Results 41 - 47 of 47 for clusterrolebinings (0.26 sec)
-
cluster/addons/dns/coredns/coredns.yaml.base
- namespaces verbs: - list - watch - apiGroups: - discovery.k8s.io resources: - endpointslices verbs: - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" labels: kubernetes.io/bootstrapping: rbac-defaults addonmanager.kubernetes.io/mode: EnsureExists name: system:coredns
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 23:50:49 UTC 2023 - 4.9K bytes - Viewed (0) -
cluster/addons/dns/coredns/coredns.yaml.in
- namespaces verbs: - list - watch - apiGroups: - discovery.k8s.io resources: - endpointslices verbs: - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" labels: kubernetes.io/bootstrapping: rbac-defaults addonmanager.kubernetes.io/mode: EnsureExists name: system:coredns
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 23:50:49 UTC 2023 - 4.9K bytes - Viewed (0) -
cluster/addons/dns/coredns/coredns.yaml.sed
- namespaces verbs: - list - watch - apiGroups: - discovery.k8s.io resources: - endpointslices verbs: - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" labels: kubernetes.io/bootstrapping: rbac-defaults addonmanager.kubernetes.io/mode: EnsureExists name: system:coredns
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 23:50:49 UTC 2023 - 4.9K bytes - Viewed (0) -
operator/pkg/name/name.go
) // Kubernetes Kind strings. const ( CRDStr = "CustomResourceDefinition" ClusterRoleStr = "ClusterRole" ClusterRoleBindingStr = "ClusterRoleBinding" CMStr = "ConfigMap" DaemonSetStr = "DaemonSet" DeploymentStr = "Deployment" EndpointStr = "Endpoints"
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue May 14 19:23:44 UTC 2024 - 7.9K bytes - Viewed (0) -
pkg/kubeapiserver/authorizer/config.go
&rbac.ClusterRoleGetter{Lister: config.VersionedInformerFactory.Rbac().V1().ClusterRoles().Lister()}, &rbac.ClusterRoleBindingLister{Lister: config.VersionedInformerFactory.Rbac().V1().ClusterRoleBindings().Lister()}, ) } } // Require all non-webhook authorizer types to remain specified in the file on reload seenTypes.Delete(authzconfig.TypeWebhook) r.requireNonWebhookTypes = seenTypes
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 07 21:22:55 UTC 2024 - 8K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/proxy/proxy.go
var err error sa := &v1.ServiceAccount{ ObjectMeta: metav1.ObjectMeta{ Name: KubeProxyServiceAccountName, Namespace: metav1.NamespaceSystem, }, } crb := &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: constants.KubeProxyClusterRoleBindingName, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "ClusterRole",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 26 13:23:44 UTC 2023 - 8.1K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/proxy/proxy_test.go
apiVersion: v1 kind: ServiceAccount metadata: creationTimestamp: null name: kube-proxy namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: creationTimestamp: null name: kubeadm:node-proxier roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-proxier subjects: - kind: ServiceAccount
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 8.7K bytes - Viewed (0)