- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 63 for roleRef (0.21 sec)
-
staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1beta1.RoleBinding.json
} ] }, "subjects": [ { "kind": "kindValue", "apiGroup": "apiGroupValue", "name": "nameValue", "namespace": "namespaceValue" } ], "roleRef": { "apiGroup": "apiGroupValue", "kind": "kindValue", "name": "nameValue" }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 08:52:25 UTC 2024 - 1.4K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/v1.29.0/rbac.authorization.k8s.io.v1.ClusterRoleBinding.yaml
blockOwnerDeletion: true controller: true kind: kindValue name: nameValue uid: uidValue resourceVersion: resourceVersionValue selfLink: selfLinkValue uid: uidValue roleRef: apiGroup: apiGroupValue kind: kindValue name: nameValue subjects: - apiGroup: apiGroupValue kind: kindValue name: nameValue
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Dec 15 04:12:07 UTC 2023 - 1K bytes - Viewed (0) -
cmd/kubeadm/app/phases/uploadconfig/uploadconfig.go
return apiclient.CreateOrUpdateRoleBinding(client, &rbac.RoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: NodesKubeadmConfigClusterRoleName, Namespace: metav1.NamespaceSystem, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "Role", Name: NodesKubeadmConfigClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jul 04 07:20:43 UTC 2023 - 4.4K bytes - Viewed (0) -
cmd/kubeadm/app/phases/bootstraptoken/clusterinfo/clusterinfo_test.go
ObjectMeta: metav1.ObjectMeta{ Name: BootstrapSignerClusterRoleName, Namespace: metav1.NamespacePublic, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "Role", Name: BootstrapSignerClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.UserKind, Name: user.Anonymous, },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 5.3K bytes - Viewed (0) -
cmd/kubeadm/app/phases/kubelet/config.go
return apiclient.CreateOrUpdateRoleBinding(client, &rbac.RoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: kubeadmconstants.KubeletBaseConfigMapRole, Namespace: metav1.NamespaceSystem, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "Role", Name: kubeadmconstants.KubeletBaseConfigMapRole, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Feb 02 12:34:30 UTC 2024 - 5.9K bytes - Viewed (0) -
cluster/addons/node-problem-detector/npd.yaml
--- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: npd-binding labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-problem-detector subjects: - kind: ServiceAccount name: node-problem-detector namespace: kube-system --- apiVersion: apps/v1
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 30 04:14:02 UTC 2024 - 2.6K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/proxy/proxy_test.go
name: kube-proxy namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: creationTimestamp: null name: kubeadm:node-proxier roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-proxier subjects: - kind: ServiceAccount name: kube-proxy namespace: kube-system ---
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 8.7K bytes - Viewed (0) -
cluster/addons/dns/coredns/coredns.yaml.base
metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" labels: kubernetes.io/bootstrapping: rbac-defaults addonmanager.kubernetes.io/mode: EnsureExists name: system:coredns roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:coredns subjects: - kind: ServiceAccount name: coredns namespace: kube-system --- apiVersion: v1 kind: ConfigMap metadata:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 23:50:49 UTC 2023 - 4.9K bytes - Viewed (0) -
cluster/addons/dns/coredns/coredns.yaml.in
metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" labels: kubernetes.io/bootstrapping: rbac-defaults addonmanager.kubernetes.io/mode: EnsureExists name: system:coredns roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:coredns subjects: - kind: ServiceAccount name: coredns namespace: kube-system --- apiVersion: v1 kind: ConfigMap metadata:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 23:50:49 UTC 2023 - 4.9K bytes - Viewed (0) -
operator/cmd/mesh/testdata/operator/output/operator-init.yaml
--- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: istio-operator subjects: - kind: ServiceAccount name: istio-operator namespace: operator-test-namespace roleRef: kind: ClusterRole name: istio-operator apiGroup: rbac.authorization.k8s.io --- --- apiVersion: apps/v1 kind: Deployment metadata: namespace: operator-test-namespace
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 5.3K bytes - Viewed (0)