Search Options

Results per page
Sort
Preferred Languages
Advance

Results 81 - 90 of 411 for rbacv1 (0.12 sec)

  1. cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap.go

    			Name: constants.GetNodesClusterRoleName,
    		},
    		RoleRef: rbac.RoleRef{
    			APIGroup: rbac.GroupName,
    			Kind:     "ClusterRole",
    			Name:     constants.GetNodesClusterRoleName,
    		},
    		Subjects: []rbac.Subject{
    			{
    				Kind: rbac.GroupKind,
    				Name: constants.NodeBootstrapTokenAuthGroup,
    			},
    		},
    	})
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Oct 15 10:49:52 UTC 2023
    - 4.2K bytes
    - Viewed (0)
  2. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-roles.yaml

        clusterRoleSelectors:
        - matchLabels:
            rbac.authorization.k8s.io/aggregate-to-admin: "true"
      apiVersion: rbac.authorization.k8s.io/v1
      kind: ClusterRole
      metadata:
        annotations:
          rbac.authorization.kubernetes.io/autoupdate: "true"
        creationTimestamp: null
        labels:
          kubernetes.io/bootstrapping: rbac-defaults
        name: admin
      rules: null
    - apiVersion: rbac.authorization.k8s.io/v1
      kind: ClusterRole
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jul 18 08:11:08 UTC 2023
    - 24.1K bytes
    - Viewed (0)
  3. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-roles.yaml

        - patch
        - update
    - apiVersion: rbac.authorization.k8s.io/v1
      kind: ClusterRole
      metadata:
        annotations:
          rbac.authorization.kubernetes.io/autoupdate: "true"
        creationTimestamp: null
        labels:
          kubernetes.io/bootstrapping: rbac-defaults
        name: system:controller:clusterrole-aggregation-controller
      rules:
      - apiGroups:
        - rbac.authorization.k8s.io
        resources:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Mar 06 00:00:21 UTC 2024
    - 26.6K bytes
    - Viewed (0)
  4. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml

    apiVersion: v1
    items:
    - apiVersion: rbac.authorization.k8s.io/v1
      kind: ClusterRoleBinding
      metadata:
        annotations:
          rbac.authorization.kubernetes.io/autoupdate: "true"
        creationTimestamp: null
        labels:
          kubernetes.io/bootstrapping: rbac-defaults
        name: system:controller:attachdetach-controller
      roleRef:
        apiGroup: rbac.authorization.k8s.io
        kind: ClusterRole
        name: system:controller:attachdetach-controller
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Mar 06 00:00:21 UTC 2024
    - 16.9K bytes
    - Viewed (0)
  5. pkg/apis/rbac/validation/validation_test.go

    				{Name: "valid@groupname", APIGroup: rbac.GroupName, Kind: rbac.GroupKind},
    			},
    		},
    	)
    	if len(errs) != 0 {
    		t.Errorf("expected success: %v", errs)
    	}
    
    	errorCases := map[string]struct {
    		A rbac.ClusterRoleBinding
    		T field.ErrorType
    		F string
    	}{
    		"bad group": {
    			A: rbac.ClusterRoleBinding{
    				ObjectMeta: metav1.ObjectMeta{Name: "default"},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 02 07:48:42 UTC 2023
    - 14.1K bytes
    - Viewed (0)
  6. tensorflow/compiler/jit/encapsulate_subgraphs_pass_test.cc

        Node* recv1 = RecvAtHost(
            ops::NodeOut(key_constant, 0), "F1", "F1", "O1", {DT_FLOAT, DT_FLOAT},
            b2.opts().WithAttr(kXlaHasHostTransferAttrName, true));
        Node* e = Binary(ops::NodeOut(recv1, 0), ops::NodeOut(recv1, 1),
                         b2.opts()
                             .WithName("E")
                             .WithControlInputs({recv1})
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Thu Feb 22 08:47:20 UTC 2024
    - 113.3K bytes
    - Viewed (0)
  7. pkg/apis/rbac/helpers_test.go

    	role := &rbac.Role{
    		Rules: []rbac.PolicyRule{
    			rbac.NewRule("verb").Groups("g").Resources("foo").RuleOrDie(),
    			rbac.NewRule("verb").URLs("/foo").RuleOrDie(),
    		},
    	}
    	clusterRole := &rbac.ClusterRole{
    		Rules: []rbac.PolicyRule{
    			rbac.NewRule("verb").Groups("g").Resources("foo").RuleOrDie(),
    			rbac.NewRule("verb").URLs("/foo").RuleOrDie(),
    		},
    	}
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:46:12 UTC 2023
    - 9.2K bytes
    - Viewed (0)
  8. pkg/apis/rbac/validation/validation.go

    			allErrs = append(allErrs, field.NotSupported(fldPath.Child("apiGroup"), subject.APIGroup, []string{rbac.GroupName}))
    		}
    
    	default:
    		allErrs = append(allErrs, field.NotSupported(fldPath.Child("kind"), subject.Kind, []string{rbac.ServiceAccountKind, rbac.UserKind, rbac.GroupKind}))
    	}
    
    	return allErrs
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Nov 08 01:48:21 UTC 2022
    - 10.4K bytes
    - Viewed (0)
  9. cluster/addons/cloud-controller-manager/cloud-node-controller-binding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
      name: system::leader-locking-cloud-controller-manager
      namespace: kube-system
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: system::leader-locking-cloud-controller-manager
    subjects:
    - kind: ServiceAccount
      name: cloud-controller-manager
      namespace: kube-system
    ---
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 03 17:38:23 UTC 2022
    - 1.2K bytes
    - Viewed (0)
  10. pkg/registry/rbac/clusterrole/policybased/storage.go

    	"k8s.io/apiserver/pkg/registry/rest"
    	kapihelper "k8s.io/kubernetes/pkg/apis/core/helper"
    	"k8s.io/kubernetes/pkg/apis/rbac"
    	rbacregistry "k8s.io/kubernetes/pkg/registry/rbac"
    	rbacregistryvalidation "k8s.io/kubernetes/pkg/registry/rbac/validation"
    )
    
    var groupResource = rbac.Resource("clusterroles")
    
    type Storage struct {
    	rest.StandardStorage
    
    	authorizer authorizer.Authorizer
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Nov 18 10:11:16 UTC 2022
    - 5.2K bytes
    - Viewed (0)
Back to top