- Sort Score
- Result 10 results
- Languages All
Results 91 - 100 of 210 for clusterRoles (0.34 sec)
-
pkg/registry/rbac/clusterrole/doc.go
See the License for the specific language governing permissions and limitations under the License. */ // Package clusterrole provides Registry interface and its RESTStorage // implementation for storing ClusterRole objects.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 02 02:35:47 UTC 2019 - 773 bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/templates/reader-clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istio-reader release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jul 12 16:44:21 UTC 2021 - 589 bytes - Viewed (0) -
cluster/addons/rbac/kubelet-cert-rotation/kubelet-certificate-management.yaml
labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: gce:beta:kubelet-certificate-rotation subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:nodes --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: gce:beta:kubelet-certificate-bootstrap labels: addonmanager.kubernetes.io/mode: Reconcile
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Mar 24 04:11:47 UTC 2019 - 1.4K bytes - Viewed (0) -
pkg/generated/openapi/zz_generated.openapi.go
return common.OpenAPIDefinition{ Schema: spec.Schema{ SchemaProps: spec.SchemaProps{ Description: "ClusterRoleList is a collection of ClusterRoles. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRoles, and will no longer be served in v1.22.", Type: []string{"object"}, Properties: map[string]spec.Schema{ "kind": { SchemaProps: spec.SchemaProps{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jun 05 18:37:07 UTC 2024 - 3M bytes - Viewed (0) -
pkg/apis/rbac/v1/zz_generated.conversion.go
return err } if err := s.AddGeneratedConversionFunc((*v1.ClusterRole)(nil), (*rbac.ClusterRole)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1_ClusterRole_To_rbac_ClusterRole(a.(*v1.ClusterRole), b.(*rbac.ClusterRole), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*rbac.ClusterRole)(nil), (*v1.ClusterRole)(nil), func(a, b interface{}, scope conversion.Scope) error {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 24 19:47:49 UTC 2021 - 21K bytes - Viewed (0) -
pkg/apis/rbac/v1beta1/zz_generated.conversion.go
} if err := s.AddGeneratedConversionFunc((*v1beta1.ClusterRole)(nil), (*rbac.ClusterRole)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1beta1_ClusterRole_To_rbac_ClusterRole(a.(*v1beta1.ClusterRole), b.(*rbac.ClusterRole), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*rbac.ClusterRole)(nil), (*v1beta1.ClusterRole)(nil), func(a, b interface{}, scope conversion.Scope) error {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 24 19:47:49 UTC 2021 - 22.1K bytes - Viewed (0) -
cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap.go
ObjectMeta: metav1.ObjectMeta{ Name: constants.NodeKubeletBootstrap, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: constants.NodeBootstrapperClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind, Name: constants.NodeBootstrapTokenAuthGroup, }, }, }) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Oct 15 10:49:52 UTC 2023 - 4.2K bytes - Viewed (0) -
cluster/addons/metadata-agent/stackdriver/metadata-agent-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: stackdriver:metadata-agent labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile rules: - apiGroups: - "*" resources: - "*" verbs: - watch - get - list --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: stackdriver:metadata-agent labels:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Aug 06 15:26:35 UTC 2018 - 685 bytes - Viewed (0) -
pkg/apis/rbac/validation/validation_test.go
RoleRef: rbac.RoleRef{APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: "valid"}, }, T: field.ErrorTypeRequired, F: "metadata.name", }, "bad role": { A: rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{Name: "default"}, RoleRef: rbac.RoleRef{APIGroup: rbac.GroupName, Kind: "ClusterRole"}, }, T: field.ErrorTypeRequired, F: "roleRef.name", },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 02 07:48:42 UTC 2023 - 14.1K bytes - Viewed (0) -
cluster/gce/addons/loadbalancing/cloud-provider-role.yaml
- create - get - patch - update - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: labels: addonmanager.kubernetes.io/mode: Reconcile name: cloud-provider annotations: kubernetes.io/deprecation: 'cloud-provider clusterrole is DEPRECATED in the concern of potential collisions and will be removed in 1.16. Do not use this role.' rules:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jan 28 23:02:19 UTC 2020 - 1.5K bytes - Viewed (0)