- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 62 for roleRef (0.21 sec)
-
staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1beta1.ClusterRoleBinding.json
} ] }, "subjects": [ { "kind": "kindValue", "apiGroup": "apiGroupValue", "name": "nameValue", "namespace": "namespaceValue" } ], "roleRef": { "apiGroup": "apiGroupValue", "kind": "kindValue", "name": "nameValue" }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 08:52:25 UTC 2024 - 1.4K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1beta1.RoleBinding.json
} ] }, "subjects": [ { "kind": "kindValue", "apiGroup": "apiGroupValue", "name": "nameValue", "namespace": "namespaceValue" } ], "roleRef": { "apiGroup": "apiGroupValue", "kind": "kindValue", "name": "nameValue" }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 08:52:25 UTC 2024 - 1.4K bytes - Viewed (0) -
cmd/kubeadm/app/phases/bootstraptoken/clusterinfo/clusterinfo_test.go
ObjectMeta: metav1.ObjectMeta{ Name: BootstrapSignerClusterRoleName, Namespace: metav1.NamespacePublic, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "Role", Name: BootstrapSignerClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.UserKind, Name: user.Anonymous, },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 5.3K bytes - Viewed (0) -
cmd/kubeadm/app/phases/kubelet/config.go
return apiclient.CreateOrUpdateRoleBinding(client, &rbac.RoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: kubeadmconstants.KubeletBaseConfigMapRole, Namespace: metav1.NamespaceSystem, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "Role", Name: kubeadmconstants.KubeletBaseConfigMapRole, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Feb 02 12:34:30 UTC 2024 - 5.9K bytes - Viewed (0) -
cluster/addons/node-problem-detector/npd.yaml
--- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: npd-binding labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-problem-detector subjects: - kind: ServiceAccount name: node-problem-detector namespace: kube-system --- apiVersion: apps/v1
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 30 04:14:02 UTC 2024 - 2.6K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/proxy/proxy_test.go
name: kube-proxy namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: creationTimestamp: null name: kubeadm:node-proxier roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-proxier subjects: - kind: ServiceAccount name: kube-proxy namespace: kube-system ---
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 8.7K bytes - Viewed (0) -
samples/addons/kiali.yaml
app.kubernetes.io/name: kiali app.kubernetes.io/instance: kiali version: "v1.85.0" app.kubernetes.io/version: "v1.85.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/part-of: "kiali" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: kiali subjects: - kind: ServiceAccount name: kiali namespace: istio-system ... ---
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 12 18:57:35 UTC 2024 - 10.6K bytes - Viewed (0) -
operator/cmd/mesh/testdata/operator/output/operator-init.yaml
--- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: istio-operator subjects: - kind: ServiceAccount name: istio-operator namespace: operator-test-namespace roleRef: kind: ClusterRole name: istio-operator apiGroup: rbac.authorization.k8s.io --- --- apiVersion: apps/v1 kind: Deployment metadata: namespace: operator-test-namespace
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 5.3K bytes - Viewed (0) -
operator/cmd/mesh/testdata/operator/output/operator-dump.yaml
--- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: istio-operator subjects: - kind: ServiceAccount name: istio-operator namespace: operator-test-namespace roleRef: kind: ClusterRole name: istio-operator apiGroup: rbac.authorization.k8s.io --- --- apiVersion: apps/v1 kind: Deployment metadata: namespace: operator-test-namespace
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 5.4K bytes - Viewed (0) -
pkg/printers/internalversion/printers.go
row := metav1.TableRow{ Object: runtime.RawExtension{Object: obj}, } roleRef := fmt.Sprintf("%s/%s", obj.RoleRef.Kind, obj.RoleRef.Name) row.Cells = append(row.Cells, obj.Name, roleRef, translateTimestampSince(obj.CreationTimestamp)) if options.Wide { users, groups, sas, _ := rbac.SubjectsStrings(obj.Subjects)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jun 11 14:04:15 UTC 2024 - 128.3K bytes - Viewed (0)