- Sort Score
- Result 10 results
- Languages All
Results 61 - 70 of 119 for ClusterRoleBinding (0.2 sec)
-
pkg/apis/rbac/types.go
ClusterRoleSelectors []metav1.LabelSelector } // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object // ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, // and adds who information via Subject. type ClusterRoleBinding struct { metav1.TypeMeta // Standard object's metadata. metav1.ObjectMeta
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 24 20:35:20 UTC 2023 - 7.8K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/generated.proto
// stomped by the controller. // +optional optional AggregationRule aggregationRule = 3; } // ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, // and adds who information via Subject. message ClusterRoleBinding { // Standard object's metadata. // +optional optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 15:34:11 UTC 2024 - 7.9K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1/generated.proto
// stomped by the controller. // +optional optional AggregationRule aggregationRule = 3; } // ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, // and adds who information via Subject. message ClusterRoleBinding { // Standard object's metadata. // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 7.6K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/subject_locator_test.go
clusterRoles []*rbacv1.ClusterRole clusterRoleBindings []*rbacv1.ClusterRoleBinding superUser string actionsToSubjects []actionToSubjects }{ { name: "no super user, star matches star", clusterRoles: []*rbacv1.ClusterRole{ newClusterRole("admin", newRule("*", "*", "*", "*")), }, clusterRoleBindings: []*rbacv1.ClusterRoleBinding{ newClusterRoleBinding("admin", "User:super-admin", "Group:super-admins"),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 5.6K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1alpha1/types_swagger_doc_generated.go
return map_ClusterRole } var map_ClusterRoleBinding = map[string]string{ "": "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBinding, and will no longer be served in v1.22.", "metadata": "Standard object's metadata.",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Jan 22 00:51:25 UTC 2023 - 8.7K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1beta1/types_swagger_doc_generated.go
return map_ClusterRole } var map_ClusterRoleBinding = map[string]string{ "": "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoleBinding, and will no longer be served in v1.22.", "metadata": "Standard object's metadata.",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Jan 22 00:51:25 UTC 2023 - 8.8K bytes - Viewed (0) -
cluster/addons/metrics-server/auth-delegator.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: metrics-server:system:auth-delegator labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects: - kind: ServiceAccount name: metrics-server
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Sep 03 20:14:57 UTC 2017 - 398 bytes - Viewed (0) -
cluster/addons/node-problem-detector/kubelet-user-standalone/npd-binding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: kubelet-user-npd-binding labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-problem-detector subjects: - apiGroup: rbac.authorization.k8s.io kind: User
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 08 22:50:41 UTC 2019 - 389 bytes - Viewed (0) -
cluster/addons/node-problem-detector/standalone/npd-binding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: npd-binding labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-problem-detector subjects: - apiGroup: rbac.authorization.k8s.io kind: User
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Aug 21 09:29:37 UTC 2017 - 397 bytes - Viewed (0) -
cluster/gce/addons/konnectivity-agent/konnectivity-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: system:konnectivity-server labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects: - apiGroup: rbac.authorization.k8s.io kind: User
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Mar 02 01:24:48 UTC 2020 - 409 bytes - Viewed (0)