- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 68 for clusterrolebinings (0.24 sec)
-
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go
} func TestBootstrapClusterRoleBindings(t *testing.T) { list := &api.List{} names := sets.NewString() roleBindings := map[string]runtime.Object{} bootstrapRoleBindings := bootstrappolicy.ClusterRoleBindings() for i := range bootstrapRoleBindings { role := bootstrapRoleBindings[i] names.Insert(role.Name) roleBindings[role.Name] = &role } for _, name := range names.List() {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:45:31 UTC 2023 - 9.5K bytes - Viewed (0) -
pkg/apis/rbac/v1alpha1/helpers.go
// out in a literal. type ClusterRoleBindingBuilder struct { ClusterRoleBinding rbacv1alpha1.ClusterRoleBinding `protobuf:"bytes,1,opt,name=clusterRoleBinding"` } func (r *ClusterRoleBindingBuilder) Groups(groups ...string) *ClusterRoleBindingBuilder { for _, group := range groups { r.ClusterRoleBinding.Subjects = append(r.ClusterRoleBinding.Subjects, rbacv1alpha1.Subject{Kind: rbacv1alpha1.GroupKind, Name: group}) } return r
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 4.4K bytes - Viewed (0) -
pkg/apis/rbac/v1beta1/helpers.go
// out in a literal. type ClusterRoleBindingBuilder struct { ClusterRoleBinding rbacv1beta1.ClusterRoleBinding `protobuf:"bytes,1,opt,name=clusterRoleBinding"` } func (r *ClusterRoleBindingBuilder) Groups(groups ...string) *ClusterRoleBindingBuilder { for _, group := range groups { r.ClusterRoleBinding.Subjects = append(r.ClusterRoleBinding.Subjects, rbacv1beta1.Subject{Kind: rbacv1beta1.GroupKind, Name: group}) } return r
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 4.4K bytes - Viewed (0) -
pkg/apis/rbac/v1/helpers.go
// out in a literal. type ClusterRoleBindingBuilder struct { ClusterRoleBinding rbacv1.ClusterRoleBinding `protobuf:"bytes,1,opt,name=clusterRoleBinding"` } func NewClusterBinding(clusterRoleName string) *ClusterRoleBindingBuilder { return &ClusterRoleBindingBuilder{ ClusterRoleBinding: rbacv1.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{Name: clusterRoleName}, RoleRef: rbacv1.RoleRef{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 7.4K bytes - Viewed (0) -
pkg/registry/rbac/validation/rule_test.go
{Kind: rbacv1.GroupKind, Name: "group1"}, }, RoleRef: rbacv1.RoleRef{APIGroup: rbacv1.GroupName, Kind: "Role", Name: "readthings"}, }, }, clusterRoleBindings: []*rbacv1.ClusterRoleBinding{ { Subjects: []rbacv1.Subject{ {Kind: rbacv1.UserKind, Name: "admin"}, {Kind: rbacv1.GroupKind, Name: "admin"}, },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 7.9K bytes - Viewed (0) -
cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap.go
fmt.Println("[bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials") return apiclient.CreateOrUpdateClusterRoleBinding(client, &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: constants.NodeKubeletBootstrap, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "ClusterRole",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Oct 15 10:49:52 UTC 2023 - 4.2K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/audit/policy/reader_test.go
users: ["tim"] userGroups: ["testers", "developers"] verbs: ["patch", "delete", "create"] resources: - group: "" - group: "rbac.authorization.k8s.io" resources: ["clusterroles", "clusterrolebindings"] namespaces: ["default", "kube-system"] - level: Metadata ` const policyWithNoVersionOrKind = ` rules: - level: None nonResourceURLs: - /healthz* - /version
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 4.2K bytes - Viewed (0) -
cluster/addons/cloud-controller-manager/cloud-node-controller-binding.yaml
name: system::leader-locking-cloud-controller-manager subjects: - kind: ServiceAccount name: cloud-controller-manager namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: addonmanager.kubernetes.io/mode: Reconcile name: system:cloud-controller-manager roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 03 17:38:23 UTC 2022 - 1.2K bytes - Viewed (0) -
cmd/kubeadm/app/util/apiclient/dryrunclient_test.go
[dryrun] Resource name: "kubernetes" `), }, { name: "action GET on clusterrolebindings", action: core.NewRootGetAction(schema.GroupVersionResource{Group: rbac.GroupName, Version: rbac.SchemeGroupVersion.Version, Resource: "clusterrolebindings"}, "system:node"), expectedBytes: []byte(`[dryrun] Would perform action GET on resource "clusterrolebindings" in API group "rbac.authorization.k8s.io/v1" [dryrun] Resource name: "system:node" `),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Dec 21 09:49:59 UTC 2022 - 4.5K bytes - Viewed (0) -
releasenotes/notes/manifest-base-cleanup.yaml
| `ClusterRole istiod` | `ClusterRole istiod-clusterrole` | | `ClusterRole istiod-reader` | `ClusterRole istio-reader-clusterrole` | | `ClusterRoleBinding istiod` | `ClusterRoleBinding istiod-clusterrole` | | `Role istiod` | `Role istiod` | | `RoleBinding istiod` | `RoleBinding istiod` |
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jul 27 04:26:43 UTC 2023 - 1.7K bytes - Viewed (0)