- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 117 for roleRef (0.24 sec)
-
prow/config/metrics/metrics.yaml
name: metrics-server:system:auth-delegator roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects: - kind: ServiceAccount name: metrics-server namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: k8s-app: metrics-server name: system:metrics-server roleRef: apiGroup: rbac.authorization.k8s.io
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 11 20:51:38 UTC 2024 - 4.6K bytes - Viewed (0) -
cluster/addons/volumesnapshots/volume-snapshot-controller/rbac-volume-snapshot-controller.yaml
namespace: kube-system labels: addonmanager.kubernetes.io/mode: Reconcile subjects: - kind: ServiceAccount name: volume-snapshot-controller namespace: kube-system roleRef: kind: ClusterRole # change the name also here if the ClusterRole gets renamed name: volume-snapshot-controller-runner apiGroup: rbac.authorization.k8s.io --- kind: Role
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 16 14:09:47 UTC 2022 - 2.9K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/proxy/proxy.go
Namespace: metav1.NamespaceSystem, }, } crb := &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: constants.KubeProxyClusterRoleBindingName, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: constants.KubeProxyClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.ServiceAccountKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 26 13:23:44 UTC 2023 - 8.1K bytes - Viewed (0) -
pkg/apis/rbac/v1/helpers.go
func NewClusterBinding(clusterRoleName string) *ClusterRoleBindingBuilder { return &ClusterRoleBindingBuilder{ ClusterRoleBinding: rbacv1.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{Name: clusterRoleName}, RoleRef: rbacv1.RoleRef{ APIGroup: GroupName, Kind: "ClusterRole", Name: clusterRoleName, }, }, } } func (r *ClusterRoleBindingBuilder) Groups(groups ...string) *ClusterRoleBindingBuilder {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 7.4K bytes - Viewed (0) -
cluster/gce/addons/konnectivity-agent/konnectivity-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: system:konnectivity-server labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects: - apiGroup: rbac.authorization.k8s.io kind: User
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Mar 02 01:24:48 UTC 2020 - 409 bytes - Viewed (0) -
cluster/addons/calico-policy-controller/calico-clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: calico labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: calico subjects: - kind: ServiceAccount name: calico
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 14 15:32:57 UTC 2019 - 303 bytes - Viewed (0) -
cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-rolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: typha-cpha namespace: kube-system labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: typha-cpha subjects: - kind: ServiceAccount name: typha-cpha
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 14 15:32:57 UTC 2019 - 332 bytes - Viewed (0) -
pkg/registry/rbac/validation/rule_test.go
{Kind: rbacv1.GroupKind, Name: "group1"}, }, RoleRef: rbacv1.RoleRef{APIGroup: rbacv1.GroupName, Kind: "Role", Name: "readthings"}, }, }, clusterRoleBindings: []*rbacv1.ClusterRoleBinding{ { Subjects: []rbacv1.Subject{ {Kind: rbacv1.UserKind, Name: "admin"}, {Kind: rbacv1.GroupKind, Name: "admin"}, },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 7.9K bytes - Viewed (0) -
cluster/addons/kube-proxy/kube-proxy-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1 metadata: name: system:kube-proxy labels: addonmanager.kubernetes.io/mode: Reconcile subjects: - kind: ServiceAccount name: kube-proxy namespace: kube-system roleRef: kind: ClusterRole name: system:node-proxier
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jun 03 18:46:08 UTC 2019 - 488 bytes - Viewed (0) -
cluster/addons/metrics-server/auth-delegator.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: metrics-server:system:auth-delegator labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects: - kind: ServiceAccount name: metrics-server
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Sep 03 20:14:57 UTC 2017 - 398 bytes - Viewed (0)