Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 117 for roleRef (0.24 sec)

  1. prow/config/metrics/metrics.yaml

      name: metrics-server:system:auth-delegator
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:auth-delegator
    subjects:
    - kind: ServiceAccount
      name: metrics-server
      namespace: kube-system
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        k8s-app: metrics-server
      name: system:metrics-server
    roleRef:
      apiGroup: rbac.authorization.k8s.io
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 11 20:51:38 UTC 2024
    - 4.6K bytes
    - Viewed (0)
  2. cluster/addons/volumesnapshots/volume-snapshot-controller/rbac-volume-snapshot-controller.yaml

      namespace: kube-system
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    subjects:
      - kind: ServiceAccount
        name: volume-snapshot-controller
        namespace: kube-system
    roleRef:
      kind: ClusterRole
      # change the name also here if the ClusterRole gets renamed
      name: volume-snapshot-controller-runner
      apiGroup: rbac.authorization.k8s.io
    
    ---
    kind: Role
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Sep 16 14:09:47 UTC 2022
    - 2.9K bytes
    - Viewed (0)
  3. cmd/kubeadm/app/phases/addons/proxy/proxy.go

    			Namespace: metav1.NamespaceSystem,
    		},
    	}
    
    	crb := &rbac.ClusterRoleBinding{
    		ObjectMeta: metav1.ObjectMeta{
    			Name: constants.KubeProxyClusterRoleBindingName,
    		},
    		RoleRef: rbac.RoleRef{
    			APIGroup: rbac.GroupName,
    			Kind:     "ClusterRole",
    			Name:     constants.KubeProxyClusterRoleName,
    		},
    		Subjects: []rbac.Subject{
    			{
    				Kind:      rbac.ServiceAccountKind,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Sep 26 13:23:44 UTC 2023
    - 8.1K bytes
    - Viewed (0)
  4. pkg/apis/rbac/v1/helpers.go

    func NewClusterBinding(clusterRoleName string) *ClusterRoleBindingBuilder {
    	return &ClusterRoleBindingBuilder{
    		ClusterRoleBinding: rbacv1.ClusterRoleBinding{
    			ObjectMeta: metav1.ObjectMeta{Name: clusterRoleName},
    			RoleRef: rbacv1.RoleRef{
    				APIGroup: GroupName,
    				Kind:     "ClusterRole",
    				Name:     clusterRoleName,
    			},
    		},
    	}
    }
    
    func (r *ClusterRoleBindingBuilder) Groups(groups ...string) *ClusterRoleBindingBuilder {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 18 15:37:57 UTC 2023
    - 7.4K bytes
    - Viewed (0)
  5. cluster/gce/addons/konnectivity-agent/konnectivity-rbac.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: system:konnectivity-server
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:auth-delegator
    subjects:
      - apiGroup: rbac.authorization.k8s.io
        kind: User
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Mar 02 01:24:48 UTC 2020
    - 409 bytes
    - Viewed (0)
  6. cluster/addons/calico-policy-controller/calico-clusterrolebinding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: calico
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: calico
    subjects:
    - kind: ServiceAccount
      name: calico
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 14 15:32:57 UTC 2019
    - 303 bytes
    - Viewed (0)
  7. cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-rolebinding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: typha-cpha
      namespace: kube-system
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: typha-cpha
    subjects:
      - kind: ServiceAccount
        name: typha-cpha
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 14 15:32:57 UTC 2019
    - 332 bytes
    - Viewed (0)
  8. pkg/registry/rbac/validation/rule_test.go

    					{Kind: rbacv1.GroupKind, Name: "group1"},
    				},
    				RoleRef: rbacv1.RoleRef{APIGroup: rbacv1.GroupName, Kind: "Role", Name: "readthings"},
    			},
    		},
    		clusterRoleBindings: []*rbacv1.ClusterRoleBinding{
    			{
    				Subjects: []rbacv1.Subject{
    					{Kind: rbacv1.UserKind, Name: "admin"},
    					{Kind: rbacv1.GroupKind, Name: "admin"},
    				},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:46:12 UTC 2023
    - 7.9K bytes
    - Viewed (0)
  9. cluster/addons/kube-proxy/kube-proxy-rbac.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: system:kube-proxy
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    subjects:
      - kind: ServiceAccount
        name: kube-proxy
        namespace: kube-system
    roleRef:
      kind: ClusterRole
      name: system:node-proxier
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jun 03 18:46:08 UTC 2019
    - 488 bytes
    - Viewed (0)
  10. cluster/addons/metrics-server/auth-delegator.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: metrics-server:system:auth-delegator
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:auth-delegator
    subjects:
    - kind: ServiceAccount
      name: metrics-server
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Sep 03 20:14:57 UTC 2017
    - 398 bytes
    - Viewed (0)
Back to top