Search Options

Results per page
Sort
Preferred Languages
Advance

Results 121 - 130 of 165 for roleRef (0.21 sec)

  1. cluster/addons/rbac/cluster-autoscaler/cluster-autoscaler-rbac.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: cluster-autoscaler
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    subjects:
      - kind: User
        name: cluster-autoscaler
        namespace: kube-system
    roleRef:
      kind: ClusterRole
      name: cluster-autoscaler
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 12 16:56:45 UTC 2020
    - 2K bytes
    - Viewed (0)
  2. cmd/kubeadm/app/phases/kubelet/config.go

    	return apiclient.CreateOrUpdateRoleBinding(client, &rbac.RoleBinding{
    		ObjectMeta: metav1.ObjectMeta{
    			Name:      kubeadmconstants.KubeletBaseConfigMapRole,
    			Namespace: metav1.NamespaceSystem,
    		},
    		RoleRef: rbac.RoleRef{
    			APIGroup: rbac.GroupName,
    			Kind:     "Role",
    			Name:     kubeadmconstants.KubeletBaseConfigMapRole,
    		},
    		Subjects: []rbac.Subject{
    			{
    				Kind: rbac.GroupKind,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Feb 02 12:34:30 UTC 2024
    - 5.9K bytes
    - Viewed (0)
  3. tests/integration/pilot/testdata/upgrade/1.11.0-beta.1-cni-install.yaml.tar

    "create" ] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-cni labels: app: istio-cni release: istio istio.io/rev: default install.operator.istio.io/owning-resource: unknown operator.istio.io/component: "Cni" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istio-cni subjects: - kind: ServiceAccount name: istio-cni namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-cni-repair-rolebinding...
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jul 29 18:43:32 UTC 2021
    - 10K bytes
    - Viewed (0)
  4. pkg/registry/rbac/clusterrole/policybased/storage_test.go

    		nil,
    		[]*rbacv1.ClusterRole{{ObjectMeta: metav1.ObjectMeta{Name: "alice-role"}, Rules: []rbacv1.PolicyRule{{APIGroups: []string{"*"}, Resources: []string{"*"}, Verbs: []string{"*"}}}}},
    		[]*rbacv1.ClusterRoleBinding{{RoleRef: rbacv1.RoleRef{Name: "alice-role", APIGroup: "rbac.authorization.k8s.io", Kind: "ClusterRole"}, Subjects: []rbacv1.Subject{{Name: "alice", Kind: "User", APIGroup: "rbac.authorization.k8s.io"}}}},
    	)
    
    	role := &rbac.ClusterRole{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Apr 09 13:47:19 UTC 2021
    - 6.2K bytes
    - Viewed (0)
  5. cluster/addons/fluentd-gcp/event-exporter.yaml

    kind: ClusterRoleBinding
    metadata:
      name: event-exporter-rb
      namespace: kube-system
      labels:
        k8s-app: event-exporter
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: view
    subjects:
    - kind: ServiceAccount
      name: event-exporter-sa
      namespace: kube-system
    ---
    apiVersion: apps/v1
    kind: Deployment
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 13 18:40:41 UTC 2021
    - 2.3K bytes
    - Viewed (0)
  6. pkg/registry/rbac/role/policybased/storage_test.go

    		nil,
    		[]*rbacv1.ClusterRole{{ObjectMeta: metav1.ObjectMeta{Name: "alice-role"}, Rules: []rbacv1.PolicyRule{{APIGroups: []string{"*"}, Resources: []string{"*"}, Verbs: []string{"*"}}}}},
    		[]*rbacv1.ClusterRoleBinding{{RoleRef: rbacv1.RoleRef{Name: "alice-role", APIGroup: "rbac.authorization.k8s.io", Kind: "ClusterRole"}, Subjects: []rbacv1.Subject{{Name: "alice", Kind: "User", APIGroup: "rbac.authorization.k8s.io"}}}},
    	)
    
    	role := &rbac.Role{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Apr 09 13:47:19 UTC 2021
    - 6.3K bytes
    - Viewed (0)
  7. pkg/apis/rbac/fuzzer/fuzzer.go

    	"k8s.io/kubernetes/pkg/apis/rbac"
    )
    
    // Funcs returns the fuzzer functions for the rbac api group.
    var Funcs = func(codecs runtimeserializer.CodecFactory) []interface{} {
    	return []interface{}{
    		func(r *rbac.RoleRef, c fuzz.Continue) {
    			c.FuzzNoCustom(r) // fuzz self without calling this function again
    
    			// match defaulter
    			if len(r.APIGroup) == 0 {
    				r.APIGroup = rbac.GroupName
    			}
    		},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Aug 11 07:12:57 UTC 2017
    - 1.6K bytes
    - Viewed (0)
  8. cluster/addons/node-problem-detector/npd.yaml

    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: npd-binding
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node-problem-detector
    subjects:
    - kind: ServiceAccount
      name: node-problem-detector
      namespace: kube-system
    ---
    apiVersion: apps/v1
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 30 04:14:02 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  9. cmd/kubeadm/app/phases/addons/proxy/proxy_test.go

      name: kube-proxy
      namespace: kube-system
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      creationTimestamp: null
      name: kubeadm:node-proxier
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node-proxier
    subjects:
    - kind: ServiceAccount
      name: kube-proxy
      namespace: kube-system
    ---
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Feb 18 11:14:32 UTC 2024
    - 8.7K bytes
    - Viewed (0)
  10. cluster/addons/dns-horizontal-autoscaler/dns-horizontal-autoscaler.yaml

    metadata:
      name: system:kube-dns-autoscaler
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    subjects:
      - kind: ServiceAccount
        name: kube-dns-autoscaler
        namespace: kube-system
    roleRef:
      kind: ClusterRole
      name: system:kube-dns-autoscaler
      apiGroup: rbac.authorization.k8s.io
    
    ---
    apiVersion: apps/v1
    kind: Deployment
    metadata:
      name: kube-dns-autoscaler
      namespace: kube-system
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 31 14:16:53 UTC 2022
    - 3.3K bytes
    - Viewed (0)
Back to top