- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 99 for roleBindings (0.41 sec)
-
manifests/charts/gateways/istio-ingress/templates/rolebindings.yaml
{{ $gateway := index .Values "gateways" "istio-ingressgateway" }} apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: {{ $gateway.name }}-sds namespace: {{ .Release.Namespace }} labels: release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" | quote }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "IngressGateways"
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 18 18:16:49 UTC 2024 - 632 bytes - Viewed (0) -
manifests/charts/gateways/istio-egress/templates/rolebindings.yaml
{{ $gateway := index .Values "gateways" "istio-egressgateway" }} apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: {{ $gateway.name }}-sds namespace: {{ .Release.Namespace }} labels: release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" | quote }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "EgressGateways"
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 18 18:16:49 UTC 2024 - 630 bytes - Viewed (0) -
cluster/addons/rbac/cluster-loadbalancing/glbc/user-rolebindings.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: system:controller:glbc namespace: kube-system labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system:controller:glbc subjects: - kind: User name: system:controller:glbc --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 02 05:24:48 UTC 2019 - 647 bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go
names := sets.NewString() roleBindings := map[string]runtime.Object{} bootstrapRoleBindings := bootstrappolicy.ControllerRoleBindings() for i := range bootstrapRoleBindings { roleBinding := bootstrapRoleBindings[i] names.Insert(roleBinding.Name) roleBindings[roleBinding.Name] = &roleBinding } for _, name := range names.List() { list.Items = append(list.Items, roleBindings[name]) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:45:31 UTC 2023 - 9.5K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/subject_locator.go
errorlist = append(errorlist, err) } else { for _, roleBinding := range roleBindings { rules, err := r.roleToRuleMapper.GetRoleReferenceRules(roleBinding.RoleRef, namespace) if err != nil { // if we have an error, just keep track of it and keep processing. Since rules are additive, // missing a reference is bad, but we can continue with other rolebindings and still have a list // that does not contain any invalid values
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 4.7K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/subject_locator_test.go
type actionToSubjects struct { action authorizer.Attributes subjects []rbacv1.Subject } tests := []struct { name string roles []*rbacv1.Role roleBindings []*rbacv1.RoleBinding clusterRoles []*rbacv1.ClusterRole clusterRoleBindings []*rbacv1.ClusterRoleBinding superUser string actionsToSubjects []actionToSubjects }{ {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 5.6K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy_test.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 24 05:24:17 UTC 2019 - 2.9K bytes - Viewed (0) -
pkg/registry/rbac/rolebinding/strategy.go
_ = obj.(*rbac.RoleBinding) } // PrepareForUpdate clears fields that are not allowed to be set by end users on update. func (strategy) PrepareForUpdate(ctx context.Context, obj, old runtime.Object) { newRoleBinding := obj.(*rbac.RoleBinding) oldRoleBinding := old.(*rbac.RoleBinding) _, _ = newRoleBinding, oldRoleBinding } // Validate validates a new RoleBinding. Validation must check for a correct signature.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 18 14:42:36 UTC 2021 - 3.5K bytes - Viewed (0) -
pkg/apis/rbac/types.go
} // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object // RoleBindingList is a collection of RoleBindings type RoleBindingList struct { metav1.TypeMeta // Standard object's metadata. metav1.ListMeta // Items is a list of roleBindings Items []RoleBinding } // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object // RoleList is a collection of Roles
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 24 20:35:20 UTC 2023 - 7.8K bytes - Viewed (0) -
api/discovery/apis__rbac.authorization.k8s.io__v1.json
"deletecollection", "get", "list", "patch", "update", "watch" ] }, { "kind": "RoleBinding", "name": "rolebindings", "namespaced": true, "singularName": "rolebinding", "storageVersionHash": "eGsCzGH6b1g=", "verbs": [ "create", "delete", "deletecollection", "get", "list",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon May 15 18:18:19 UTC 2023 - 1.5K bytes - Viewed (0)