Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 47 of 47 for clusterrolebinings (0.26 sec)

  1. cluster/addons/dns/coredns/coredns.yaml.base

      - namespaces
      verbs:
      - list
      - watch
    - apiGroups:
      - discovery.k8s.io
      resources:
      - endpointslices
      verbs:
      - list
      - watch
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      annotations:
        rbac.authorization.kubernetes.io/autoupdate: "true"
      labels:
        kubernetes.io/bootstrapping: rbac-defaults
        addonmanager.kubernetes.io/mode: EnsureExists
      name: system:coredns
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Oct 18 23:50:49 UTC 2023
    - 4.9K bytes
    - Viewed (0)
  2. cluster/addons/dns/coredns/coredns.yaml.in

      - namespaces
      verbs:
      - list
      - watch
    - apiGroups:
      - discovery.k8s.io
      resources:
      - endpointslices
      verbs:
      - list
      - watch
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      annotations:
        rbac.authorization.kubernetes.io/autoupdate: "true"
      labels:
        kubernetes.io/bootstrapping: rbac-defaults
        addonmanager.kubernetes.io/mode: EnsureExists
      name: system:coredns
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Oct 18 23:50:49 UTC 2023
    - 4.9K bytes
    - Viewed (0)
  3. cluster/addons/dns/coredns/coredns.yaml.sed

      - namespaces
      verbs:
      - list
      - watch
    - apiGroups:
      - discovery.k8s.io
      resources:
      - endpointslices
      verbs:
      - list
      - watch
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      annotations:
        rbac.authorization.kubernetes.io/autoupdate: "true"
      labels:
        kubernetes.io/bootstrapping: rbac-defaults
        addonmanager.kubernetes.io/mode: EnsureExists
      name: system:coredns
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Oct 18 23:50:49 UTC 2023
    - 4.9K bytes
    - Viewed (0)
  4. operator/pkg/name/name.go

    )
    
    // Kubernetes Kind strings.
    const (
    	CRDStr                            = "CustomResourceDefinition"
    	ClusterRoleStr                    = "ClusterRole"
    	ClusterRoleBindingStr             = "ClusterRoleBinding"
    	CMStr                             = "ConfigMap"
    	DaemonSetStr                      = "DaemonSet"
    	DeploymentStr                     = "Deployment"
    	EndpointStr                       = "Endpoints"
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue May 14 19:23:44 UTC 2024
    - 7.9K bytes
    - Viewed (0)
  5. pkg/kubeapiserver/authorizer/config.go

    				&rbac.ClusterRoleGetter{Lister: config.VersionedInformerFactory.Rbac().V1().ClusterRoles().Lister()},
    				&rbac.ClusterRoleBindingLister{Lister: config.VersionedInformerFactory.Rbac().V1().ClusterRoleBindings().Lister()},
    			)
    		}
    	}
    
    	// Require all non-webhook authorizer types to remain specified in the file on reload
    	seenTypes.Delete(authzconfig.TypeWebhook)
    	r.requireNonWebhookTypes = seenTypes
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 07 21:22:55 UTC 2024
    - 8K bytes
    - Viewed (0)
  6. cmd/kubeadm/app/phases/addons/proxy/proxy.go

    	var err error
    
    	sa := &v1.ServiceAccount{
    		ObjectMeta: metav1.ObjectMeta{
    			Name:      KubeProxyServiceAccountName,
    			Namespace: metav1.NamespaceSystem,
    		},
    	}
    
    	crb := &rbac.ClusterRoleBinding{
    		ObjectMeta: metav1.ObjectMeta{
    			Name: constants.KubeProxyClusterRoleBindingName,
    		},
    		RoleRef: rbac.RoleRef{
    			APIGroup: rbac.GroupName,
    			Kind:     "ClusterRole",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Sep 26 13:23:44 UTC 2023
    - 8.1K bytes
    - Viewed (0)
  7. cmd/kubeadm/app/phases/addons/proxy/proxy_test.go

    apiVersion: v1
    kind: ServiceAccount
    metadata:
      creationTimestamp: null
      name: kube-proxy
      namespace: kube-system
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      creationTimestamp: null
      name: kubeadm:node-proxier
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node-proxier
    subjects:
    - kind: ServiceAccount
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Feb 18 11:14:32 UTC 2024
    - 8.7K bytes
    - Viewed (0)
Back to top