Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 62 for roleRef (0.18 sec)

  1. tests/integration/security/egress_sidecar_tls_origination_test.go

      resources:
      - secrets
      verbs:
      - list
    `
    
    	rolebinding := `
    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: allow-list-secrets-to-{{ .ServiceAccount }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: allow-list-secrets
    subjects:
    - kind: ServiceAccount
      name: {{ .ServiceAccount }}
      namespace: {{ .Namespace }}
    `
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Apr 08 22:02:59 UTC 2024
    - 10.4K bytes
    - Viewed (0)
  2. samples/addons/prometheus.yaml

        app.kubernetes.io/managed-by: Helm
        app.kubernetes.io/part-of: prometheus
      name: prometheus
    subjects:
      - kind: ServiceAccount
        name: prometheus
        namespace: istio-system
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: prometheus
    ---
    # Source: prometheus/templates/service.yaml
    apiVersion: v1
    kind: Service
    metadata:
      labels:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 12 18:57:35 UTC 2024
    - 16.2K bytes
    - Viewed (0)
  3. common/scripts/metallb-native.yaml

      namespace: metallb-system
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: pod-lister
    subjects:
    - kind: ServiceAccount
      name: speaker
      namespace: metallb-system
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        app: metallb
      name: metallb-system:controller
    roleRef:
      apiGroup: rbac.authorization.k8s.io
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Feb 23 23:56:31 UTC 2024
    - 63.9K bytes
    - Viewed (0)
  4. cmd/kubeadm/app/phases/kubeconfig/kubeconfig.go

    		crbExists          bool
    		clusterRoleBinding = &rbac.ClusterRoleBinding{
    			ObjectMeta: metav1.ObjectMeta{
    				Name: kubeadmconstants.ClusterAdminsGroupAndClusterRoleBinding,
    			},
    			RoleRef: rbac.RoleRef{
    				APIGroup: rbac.GroupName,
    				Kind:     "ClusterRole",
    				Name:     "cluster-admin",
    			},
    			Subjects: []rbac.Subject{
    				{
    					Kind: rbac.GroupKind,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Jun 07 17:04:18 UTC 2024
    - 27K bytes
    - Viewed (0)
  5. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go

    		// This leaves the binding, but with an empty set of subjects, so that tightening reconciliation can remove the subject.
    		{
    			ObjectMeta: metav1.ObjectMeta{Name: systemNodeRoleName},
    			RoleRef:    rbacv1.RoleRef{APIGroup: rbacv1.GroupName, Kind: "ClusterRole", Name: systemNodeRoleName},
    		},
    	}
    
    	// Allow all in-cluster workloads (via their service accounts) to read the OIDC discovery endpoints.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 34.4K bytes
    - Viewed (0)
  6. cmd/kubeadm/app/phases/addons/dns/dns_test.go

      - discovery.k8s.io
      resources:
      - endpointslices
      verbs:
      - list
      - watch
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: system:coredns
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:coredns
    subjects:
    - kind: ServiceAccount
      name: coredns
      namespace: kube-system
    ---
    apiVersion: v1
    kind: ServiceAccount
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 11 10:21:20 UTC 2024
    - 41.7K bytes
    - Viewed (0)
  7. operator/cmd/mesh/testdata/manifest-generate/output/pilot_default.golden.yaml

      - delete
    
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        app: istio-reader
        release: istio
      name: istio-reader-clusterrole-istio-system
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: istio-reader-clusterrole-istio-system
    subjects:
    - kind: ServiceAccount
      name: istio-reader-service-account
      namespace: istio-system
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jan 10 05:10:03 UTC 2024
    - 102.6K bytes
    - Viewed (0)
  8. pkg/printers/internalversion/printers_test.go

    				},
    				Subjects: []rbac.Subject{
    					{
    						Kind: "User",
    						Name: "system:kube-controller-manager",
    					},
    				},
    				RoleRef: rbac.RoleRef{
    					Kind: "Role",
    					Name: "extension-apiserver-authentication-reader",
    				},
    			},
    			options: printers.GenerateOptions{},
    			// Columns: Name, Age
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jun 11 14:04:15 UTC 2024
    - 218.6K bytes
    - Viewed (0)
  9. api/openapi-spec/v3/apis__rbac.authorization.k8s.io__v1_openapi.json

                "description": "Standard object's metadata."
              },
              "roleRef": {
                "allOf": [
                  {
                    "$ref": "#/components/schemas/io.k8s.api.rbac.v1.RoleRef"
                  }
                ],
                "default": {},
                "description": "RoleRef can only reference a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error. This field is immutable."
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 04:18:56 UTC 2024
    - 352.2K bytes
    - Viewed (0)
  10. operator/cmd/mesh/testdata/manifest-generate/output/all_on.golden-show-in-gh-pull-request.yaml

    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        app: istio-reader
        release: istio
      name: istio-reader-clusterrole-istio-system
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: istio-reader-clusterrole-istio-system
    subjects:
    - kind: ServiceAccount
      name: istio-reader-service-account
      namespace: istio-system
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jan 10 05:10:03 UTC 2024
    - 506.8K bytes
    - Viewed (0)
Back to top