- Sort Score
- Result 10 results
- Languages All
Results 101 - 110 of 185 for ClusterRoleBinding (0.4 sec)
-
tests/integration/create_cluster_gke.sh
--cluster-version="$CLUSTER_VERSION" \ --zone="$ZONE" \ --machine-type="$MACHINE_TYPE" \ --num-nodes="$NUM_NODES" \ --no-enable-legacy-authorization # This is a hack to handle the case where clusterrolebinding creation returns: # # Error from server (Forbidden): clusterrolebindings.rbac.authorization.k8s.io is forbidden: User "client" cannot # create clusterrolebindings.rbac.authorization.k8s.io at the cluster scope
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Mar 12 16:02:51 UTC 2022 - 3.8K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/rbac_test.go
} const ( bindToRole uint16 = 0x0 bindToClusterRole uint16 = 0x1 ) func newClusterRoleBinding(roleName string, subjects ...string) *rbacv1.ClusterRoleBinding { r := &rbacv1.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{}, RoleRef: rbacv1.RoleRef{ APIGroup: rbacv1.GroupName, Kind: "ClusterRole", // ClusterRoleBindings can only refer to ClusterRole Name: roleName,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 21.1K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/generated.pb.go
func (m *ClusterRoleBinding) Reset() { *m = ClusterRoleBinding{} } func (*ClusterRoleBinding) ProtoMessage() {} func (*ClusterRoleBinding) Descriptor() ([]byte, []int) { return fileDescriptor_c8ba2e7dd472de66, []int{2} } func (m *ClusterRoleBinding) XXX_Unmarshal(b []byte) error { return m.Unmarshal(b) } func (m *ClusterRoleBinding) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 06:06:37 UTC 2024 - 77.5K bytes - Viewed (0) -
samples/security/spire/README.md
```bash $ kubectl delete namespace spire ``` 1. Delete the ClusterRole, ClusterRoleBinding, Role, RoleBindings, ValidatingWebhookConfiguration, CSIDriver, and CustomResourceDefinition: ```bash $ kubectl delete clusterrole spire-server-cluster-role spire-agent-cluster-role manager-role $ kubectl delete clusterrolebinding spire-server-cluster-role-binding spire-agent-cluster-role-binding manager-role-binding
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Feb 24 22:08:56 UTC 2023 - 4.1K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/dns/manifests.go
- apiGroups: - discovery.k8s.io resources: - endpointslices verbs: - list - watch ` // CoreDNSClusterRoleBinding is the CoreDNS Clusterrolebinding manifest CoreDNSClusterRoleBinding = ` apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: system:coredns roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:coredns subjects:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Oct 20 09:59:39 UTC 2023 - 5.4K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1beta1/zz_generated.prerelease-lifecycle.go
func (in *ClusterRoleBinding) APILifecycleDeprecated() (major, minor int) { return 1, 17 } // APILifecycleReplacement is an autogenerated function, returning the group, version, and kind that should be used instead of this deprecated type. // It is controlled by "k8s:prerelease-lifecycle-gen:replacement=<group>,<version>,<kind>" tags in types.go. func (in *ClusterRoleBinding) APILifecycleReplacement() schema.GroupVersionKind {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 24 19:47:49 UTC 2021 - 13.1K bytes - Viewed (0) -
manifests/charts/ztunnel/templates/rbac.yaml
rules: - apiGroups: ["security.openshift.io"] resources: ["securitycontextconstraints"] resourceNames: ["privileged"] verbs: ["use"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: ztunnel labels: app: ztunnel release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" }}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat May 04 01:17:57 UTC 2024 - 1.3K bytes - Viewed (0) -
pkg/apis/rbac/v1alpha1/defaults.go
"k8s.io/apimachinery/pkg/runtime" ) func addDefaultingFuncs(scheme *runtime.Scheme) error { return RegisterDefaults(scheme) } func SetDefaults_ClusterRoleBinding(obj *rbacv1alpha1.ClusterRoleBinding) { if len(obj.RoleRef.APIGroup) == 0 { obj.RoleRef.APIGroup = GroupName } } func SetDefaults_RoleBinding(obj *rbacv1alpha1.RoleBinding) { if len(obj.RoleRef.APIGroup) == 0 {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jun 22 18:30:51 UTC 2017 - 1.4K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1beta1/generated.pb.go
func (m *ClusterRoleBinding) Reset() { *m = ClusterRoleBinding{} } func (*ClusterRoleBinding) ProtoMessage() {} func (*ClusterRoleBinding) Descriptor() ([]byte, []int) { return fileDescriptor_c5bc2d145acd4e45, []int{2} } func (m *ClusterRoleBinding) XXX_Unmarshal(b []byte) error { return m.Unmarshal(b) } func (m *ClusterRoleBinding) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 06:06:37 UTC 2024 - 77.6K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1alpha1/generated.pb.go
func (m *ClusterRoleBinding) Reset() { *m = ClusterRoleBinding{} } func (*ClusterRoleBinding) ProtoMessage() {} func (*ClusterRoleBinding) Descriptor() ([]byte, []int) { return fileDescriptor_758889dfd9a88fa6, []int{2} } func (m *ClusterRoleBinding) XXX_Unmarshal(b []byte) error { return m.Unmarshal(b) } func (m *ClusterRoleBinding) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 06:06:37 UTC 2024 - 77.7K bytes - Viewed (0)