- Sort Score
- Result 10 results
- Languages All
Results 81 - 90 of 411 for rbacv1 (0.12 sec)
-
cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap.go
Name: constants.GetNodesClusterRoleName, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: constants.GetNodesClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind, Name: constants.NodeBootstrapTokenAuthGroup, }, }, }) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Oct 15 10:49:52 UTC 2023 - 4.2K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-roles.yaml
clusterRoleSelectors: - matchLabels: rbac.authorization.k8s.io/aggregate-to-admin: "true" apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: admin rules: null - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jul 18 08:11:08 UTC 2023 - 24.1K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-roles.yaml
- patch - update - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:clusterrole-aggregation-controller rules: - apiGroups: - rbac.authorization.k8s.io resources:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 26.6K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml
apiVersion: v1 items: - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:attachdetach-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:attachdetach-controller
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 16.9K bytes - Viewed (0) -
pkg/apis/rbac/validation/validation_test.go
{Name: "valid@groupname", APIGroup: rbac.GroupName, Kind: rbac.GroupKind}, }, }, ) if len(errs) != 0 { t.Errorf("expected success: %v", errs) } errorCases := map[string]struct { A rbac.ClusterRoleBinding T field.ErrorType F string }{ "bad group": { A: rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{Name: "default"},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 02 07:48:42 UTC 2023 - 14.1K bytes - Viewed (0) -
tensorflow/compiler/jit/encapsulate_subgraphs_pass_test.cc
Node* recv1 = RecvAtHost( ops::NodeOut(key_constant, 0), "F1", "F1", "O1", {DT_FLOAT, DT_FLOAT}, b2.opts().WithAttr(kXlaHasHostTransferAttrName, true)); Node* e = Binary(ops::NodeOut(recv1, 0), ops::NodeOut(recv1, 1), b2.opts() .WithName("E") .WithControlInputs({recv1})
Registered: Sun Jun 16 05:45:23 UTC 2024 - Last Modified: Thu Feb 22 08:47:20 UTC 2024 - 113.3K bytes - Viewed (0) -
pkg/apis/rbac/helpers_test.go
role := &rbac.Role{ Rules: []rbac.PolicyRule{ rbac.NewRule("verb").Groups("g").Resources("foo").RuleOrDie(), rbac.NewRule("verb").URLs("/foo").RuleOrDie(), }, } clusterRole := &rbac.ClusterRole{ Rules: []rbac.PolicyRule{ rbac.NewRule("verb").Groups("g").Resources("foo").RuleOrDie(), rbac.NewRule("verb").URLs("/foo").RuleOrDie(), }, }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 9.2K bytes - Viewed (0) -
pkg/apis/rbac/validation/validation.go
allErrs = append(allErrs, field.NotSupported(fldPath.Child("apiGroup"), subject.APIGroup, []string{rbac.GroupName})) } default: allErrs = append(allErrs, field.NotSupported(fldPath.Child("kind"), subject.Kind, []string{rbac.ServiceAccountKind, rbac.UserKind, rbac.GroupKind})) } return allErrs
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Nov 08 01:48:21 UTC 2022 - 10.4K bytes - Viewed (0) -
cluster/addons/cloud-controller-manager/cloud-node-controller-binding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: labels: addonmanager.kubernetes.io/mode: Reconcile name: system::leader-locking-cloud-controller-manager namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system::leader-locking-cloud-controller-manager subjects: - kind: ServiceAccount name: cloud-controller-manager namespace: kube-system ---
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 03 17:38:23 UTC 2022 - 1.2K bytes - Viewed (0) -
pkg/registry/rbac/clusterrole/policybased/storage.go
"k8s.io/apiserver/pkg/registry/rest" kapihelper "k8s.io/kubernetes/pkg/apis/core/helper" "k8s.io/kubernetes/pkg/apis/rbac" rbacregistry "k8s.io/kubernetes/pkg/registry/rbac" rbacregistryvalidation "k8s.io/kubernetes/pkg/registry/rbac/validation" ) var groupResource = rbac.Resource("clusterroles") type Storage struct { rest.StandardStorage authorizer authorizer.Authorizer
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 5.2K bytes - Viewed (0)