- Sort Score
- Result 10 results
- Languages All
Results 121 - 130 of 185 for ClusterRoleBinding (0.29 sec)
-
cluster/addons/volumesnapshots/volume-snapshot-controller/rbac-volume-snapshot-controller.yaml
verbs: ["patch"] - apiGroups: ["apiextensions.k8s.io"] resources: ["customresourcedefinitions"] verbs: ["create", "list", "watch", "delete", "get", "update"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: volume-snapshot-controller-role namespace: kube-system labels: addonmanager.kubernetes.io/mode: Reconcile subjects: - kind: ServiceAccount
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 16 14:09:47 UTC 2022 - 2.9K bytes - Viewed (0) -
cluster/addons/node-problem-detector/npd.yaml
metadata: name: node-problem-detector namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: npd-binding labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 30 04:14:02 UTC 2024 - 2.6K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
} // ClusterRoleBindingsToSplit returns a map of Names of source ClusterRoleBindings // to copy Subjects, Annotations, and Labels to destination ClusterRoleBinding templates. func ClusterRoleBindingsToSplit() map[string]rbacv1.ClusterRoleBinding { bindingsToSplit := map[string]rbacv1.ClusterRoleBinding{} for _, defaultClusterRoleBinding := range ClusterRoleBindings() { switch defaultClusterRoleBinding.Name { case "system:public-info-viewer":
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 34.4K bytes - Viewed (0) -
pkg/api/testing/defaulting_test.go
{Group: "extensions", Version: "v1beta1", Kind: "NetworkPolicyList"}: {}, {Group: "rbac.authorization.k8s.io", Version: "v1alpha1", Kind: "ClusterRoleBinding"}: {}, {Group: "rbac.authorization.k8s.io", Version: "v1alpha1", Kind: "ClusterRoleBindingList"}: {},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 20.3K bytes - Viewed (0) -
prow/lib.sh
export KUBECONFIG="${context}" kubectl delete ns istio-system-multi --ignore-not-found kubectl delete clusterrolebinding istio-multi-test --ignore-not-found kubectl create ns istio-system-multi kubectl create sa istio-multi-test -n istio-system-multi kubectl create clusterrolebinding istio-multi-test --clusterrole=cluster-admin --serviceaccount=istio-system-multi:istio-multi-test
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 09 12:26:52 UTC 2024 - 8.1K bytes - Viewed (0) -
cluster/addons/dns-horizontal-autoscaler/dns-horizontal-autoscaler.yaml
# Remove the configmaps rule once below issue is fixed: # kubernetes-incubator/cluster-proportional-autoscaler#16 - apiGroups: [""] resources: ["configmaps"] verbs: ["get", "create"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: system:kube-dns-autoscaler labels: addonmanager.kubernetes.io/mode: Reconcile subjects: - kind: ServiceAccount name: kube-dns-autoscaler
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 31 14:16:53 UTC 2022 - 3.3K bytes - Viewed (0) -
cmd/kubeadm/app/constants/constants.go
// NodeKubeletBootstrap defines the name of the ClusterRoleBinding that lets kubelets post CSRs NodeKubeletBootstrap = "kubeadm:kubelet-bootstrap" // GetNodesClusterRoleName defines the name of the ClusterRole and ClusterRoleBinding to get nodes GetNodesClusterRoleName = "kubeadm:get-nodes" // NodeAutoApproveBootstrapClusterRoleBinding defines the name of the ClusterRoleBinding that makes the csrapprover approve node CSRs
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 01 03:36:35 UTC 2024 - 32.4K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy_test.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 24 05:24:17 UTC 2019 - 2.9K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/zz_generated.prerelease-lifecycle.go
// It is controlled by "k8s:prerelease-lifecycle-gen:introduced" tags in types.go. func (in *ClusterRoleBinding) APILifecycleIntroduced() (major, minor int) { return 1, 8 }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 23 17:42:49 UTC 2024 - 3.3K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go
} func buildControllerRoles() ([]rbacv1.ClusterRole, []rbacv1.ClusterRoleBinding) { // controllerRoles is a slice of roles used for controllers controllerRoles := []rbacv1.ClusterRole{} // controllerRoleBindings is a slice of roles used for controllers controllerRoleBindings := []rbacv1.ClusterRoleBinding{} addControllerRole(&controllerRoles, &controllerRoleBindings, func() rbacv1.ClusterRole {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 28.9K bytes - Viewed (0)