Search Options

Results per page
Sort
Preferred Languages
Advance

Results 61 - 70 of 119 for ClusterRoleBinding (0.2 sec)

  1. pkg/apis/rbac/types.go

    	ClusterRoleSelectors []metav1.LabelSelector
    }
    
    // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
    
    // ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace,
    // and adds who information via Subject.
    type ClusterRoleBinding struct {
    	metav1.TypeMeta
    	// Standard object's metadata.
    	metav1.ObjectMeta
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Apr 24 20:35:20 UTC 2023
    - 7.8K bytes
    - Viewed (0)
  2. staging/src/k8s.io/api/rbac/v1/generated.proto

      // stomped by the controller.
      // +optional
      optional AggregationRule aggregationRule = 3;
    }
    
    // ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace,
    // and adds who information via Subject.
    message ClusterRoleBinding {
      // Standard object's metadata.
      // +optional
      optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 15:34:11 UTC 2024
    - 7.9K bytes
    - Viewed (0)
  3. common-protos/k8s.io/api/rbac/v1/generated.proto

      // stomped by the controller.
      // +optional
      optional AggregationRule aggregationRule = 3;
    }
    
    // ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace,
    // and adds who information via Subject.
    message ClusterRoleBinding {
      // Standard object's metadata.
      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 7.6K bytes
    - Viewed (0)
  4. plugin/pkg/auth/authorizer/rbac/subject_locator_test.go

    		clusterRoles        []*rbacv1.ClusterRole
    		clusterRoleBindings []*rbacv1.ClusterRoleBinding
    
    		superUser string
    
    		actionsToSubjects []actionToSubjects
    	}{
    		{
    			name: "no super user, star matches star",
    			clusterRoles: []*rbacv1.ClusterRole{
    				newClusterRole("admin", newRule("*", "*", "*", "*")),
    			},
    			clusterRoleBindings: []*rbacv1.ClusterRoleBinding{
    				newClusterRoleBinding("admin", "User:super-admin", "Group:super-admins"),
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 5.6K bytes
    - Viewed (0)
  5. staging/src/k8s.io/api/rbac/v1alpha1/types_swagger_doc_generated.go

    	return map_ClusterRole
    }
    
    var map_ClusterRoleBinding = map[string]string{
    	"":         "ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace, and adds who information via Subject. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBinding, and will no longer be served in v1.22.",
    	"metadata": "Standard object's metadata.",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Jan 22 00:51:25 UTC 2023
    - 8.7K bytes
    - Viewed (0)
  6. staging/src/k8s.io/api/rbac/v1beta1/types_swagger_doc_generated.go

    	return map_ClusterRole
    }
    
    var map_ClusterRoleBinding = map[string]string{
    	"":         "ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace, and adds who information via Subject. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBinding, and will no longer be served in v1.22.",
    	"metadata": "Standard object's metadata.",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Jan 22 00:51:25 UTC 2023
    - 8.8K bytes
    - Viewed (0)
  7. cluster/addons/metrics-server/auth-delegator.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: metrics-server:system:auth-delegator
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:auth-delegator
    subjects:
    - kind: ServiceAccount
      name: metrics-server
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Sep 03 20:14:57 UTC 2017
    - 398 bytes
    - Viewed (0)
  8. cluster/addons/node-problem-detector/kubelet-user-standalone/npd-binding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: kubelet-user-npd-binding
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node-problem-detector
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Nov 08 22:50:41 UTC 2019
    - 389 bytes
    - Viewed (0)
  9. cluster/addons/node-problem-detector/standalone/npd-binding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: npd-binding
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node-problem-detector
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Aug 21 09:29:37 UTC 2017
    - 397 bytes
    - Viewed (0)
  10. cluster/gce/addons/konnectivity-agent/konnectivity-rbac.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: system:konnectivity-server
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:auth-delegator
    subjects:
      - apiGroup: rbac.authorization.k8s.io
        kind: User
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Mar 02 01:24:48 UTC 2020
    - 409 bytes
    - Viewed (0)
Back to top