- Sort Score
- Result 10 results
- Languages All
Results 21 - 28 of 28 for clusterrolebinings (0.31 sec)
-
staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1.ClusterRoleBinding.pb
SataQiu <******@****.***> 1713430345 +0800
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 08:52:25 UTC 2024 - 512 bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1beta1.ClusterRoleBinding.pb
SataQiu <******@****.***> 1713430345 +0800
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 08:52:25 UTC 2024 - 517 bytes - Viewed (0) -
pkg/controlplane/storageversionhashdata/data.go
"node.k8s.io/v1/runtimeclasses": "WQTu1GL3T2Q=", "policy/v1/poddisruptionbudgets": "EVWiDmWqyJw=", "rbac.authorization.k8s.io/v1/clusterrolebindings": "48tpQ8gZHFc=", "rbac.authorization.k8s.io/v1/clusterroles": "bYE5ZWDrJ44=", "rbac.authorization.k8s.io/v1/rolebindings": "eGsCzGH6b1g=",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 29 20:14:51 UTC 2024 - 4.9K bytes - Viewed (0) -
prow/lib.sh
export KUBECONFIG="${context}" kubectl delete ns istio-system-multi --ignore-not-found kubectl delete clusterrolebinding istio-multi-test --ignore-not-found kubectl create ns istio-system-multi kubectl create sa istio-multi-test -n istio-system-multi kubectl create clusterrolebinding istio-multi-test --clusterrole=cluster-admin --serviceaccount=istio-system-multi:istio-multi-test
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 09 12:26:52 UTC 2024 - 8.1K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/zz_generated.prerelease-lifecycle.go
// It is controlled by "k8s:prerelease-lifecycle-gen:introduced" tags in types.go. func (in *ClusterRoleBinding) APILifecycleIntroduced() (major, minor int) { return 1, 8 }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 23 17:42:49 UTC 2024 - 3.3K bytes - Viewed (0) -
operator/pkg/name/name.go
) // Kubernetes Kind strings. const ( CRDStr = "CustomResourceDefinition" ClusterRoleStr = "ClusterRole" ClusterRoleBindingStr = "ClusterRoleBinding" CMStr = "ConfigMap" DaemonSetStr = "DaemonSet" DeploymentStr = "Deployment" EndpointStr = "Endpoints"
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue May 14 19:23:44 UTC 2024 - 7.9K bytes - Viewed (0) -
pkg/kubeapiserver/authorizer/config.go
&rbac.ClusterRoleGetter{Lister: config.VersionedInformerFactory.Rbac().V1().ClusterRoles().Lister()}, &rbac.ClusterRoleBindingLister{Lister: config.VersionedInformerFactory.Rbac().V1().ClusterRoleBindings().Lister()}, ) } } // Require all non-webhook authorizer types to remain specified in the file on reload seenTypes.Delete(authzconfig.TypeWebhook) r.requireNonWebhookTypes = seenTypes
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 07 21:22:55 UTC 2024 - 8K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/proxy/proxy_test.go
apiVersion: v1 kind: ServiceAccount metadata: creationTimestamp: null name: kube-proxy namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: creationTimestamp: null name: kubeadm:node-proxier roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-proxier subjects: - kind: ServiceAccount
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 8.7K bytes - Viewed (0)