- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 873 for apiGroup (0.16 sec)
-
cluster/addons/rbac/kubelet-cert-rotation/kubelet-certificate-management.yaml
kind: ClusterRoleBinding metadata: name: gce:beta:kubelet-certificate-bootstrap labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: gce:beta:kubelet-certificate-bootstrap subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: kubelet --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Mar 24 04:11:47 UTC 2019 - 1.4K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/subject_locator_test.go
[]rbacv1.Subject{ {Kind: rbacv1.GroupKind, APIGroup: rbacv1.GroupName, Name: user.SystemPrivilegedGroup}, {Kind: rbacv1.UserKind, APIGroup: rbacv1.GroupName, Name: "super-admin"}, {Kind: rbacv1.GroupKind, APIGroup: rbacv1.GroupName, Name: "super-admins"}, {Kind: rbacv1.UserKind, APIGroup: rbacv1.GroupName, Name: "admin"}, {Kind: rbacv1.GroupKind, APIGroup: rbacv1.GroupName, Name: "admins"}, }, }, {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 5.6K bytes - Viewed (0) -
pkg/apis/rbac/validation/validation_test.go
ObjectMeta: metav1.ObjectMeta{Name: "master"}, RoleRef: rbac.RoleRef{APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: "valid"}, Subjects: []rbac.Subject{ {Name: "validsaname", APIGroup: "", Namespace: "foo", Kind: rbac.ServiceAccountKind}, {Name: "valid@username", APIGroup: rbac.GroupName, Kind: rbac.UserKind}, {Name: "valid@groupname", APIGroup: rbac.GroupName, Kind: rbac.GroupKind}, }, }, ) if len(errs) != 0 {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 02 07:48:42 UTC 2023 - 14.1K bytes - Viewed (0) -
pkg/apis/rbac/validation/validation.go
if subject.APIGroup != rbac.GroupName { allErrs = append(allErrs, field.NotSupported(fldPath.Child("apiGroup"), subject.APIGroup, []string{rbac.GroupName})) } case rbac.GroupKind: // TODO(ericchiang): What other restrictions on group name are there? if subject.APIGroup != rbac.GroupName { allErrs = append(allErrs, field.NotSupported(fldPath.Child("apiGroup"), subject.APIGroup, []string{rbac.GroupName}))
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Nov 08 01:48:21 UTC 2022 - 10.4K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml
kubernetes.io/bootstrapping: rbac-defaults name: system:public-info-viewer roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:public-info-viewer subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:authenticated - apiGroup: rbac.authorization.k8s.io kind: Group name: system:unauthenticated
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 11 19:01:47 UTC 2020 - 5.7K bytes - Viewed (0) -
pkg/apis/rbac/v1alpha1/conversion_test.go
RoleRef: rbacapi.RoleRef{Name: "foo", APIGroup: v1alpha1.GroupName}, Subjects: []rbacapi.Subject{ {Kind: "User", APIGroup: v1alpha1.GroupName, Name: "myuser"}, {Kind: "Group", APIGroup: v1alpha1.GroupName, Name: "mygroup"}, {Kind: "ServiceAccount", APIGroup: "", Name: "mysa", Namespace: "myns"}, {Kind: "User", APIGroup: v1alpha1.GroupName, Name: "myuser"}, {Kind: "Group", APIGroup: v1alpha1.GroupName, Name: "mygroup"},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 15:23:55 UTC 2017 - 4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/resourcequota/config_test.go
}, { name: "valid v1alpha1 config", input: ` kind: Configuration apiVersion: resourcequota.admission.k8s.io/v1alpha1 limitedResources: - apiGroup: "" resource: persistentvolumeclaims matchContains: - .storageclass.storage.k8s.io/requests.storage - apiGroup: "" resource: pods matchScopes: - scopeName: PriorityClass operator: In values: - cluster-services `,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 04 12:53:52 UTC 2020 - 4.2K bytes - Viewed (0) -
pkg/apis/rbac/v1/defaults.go
if len(obj.RoleRef.APIGroup) == 0 { obj.RoleRef.APIGroup = GroupName } } func SetDefaults_RoleBinding(obj *rbacv1.RoleBinding) { if len(obj.RoleRef.APIGroup) == 0 { obj.RoleRef.APIGroup = GroupName } } func SetDefaults_Subject(obj *rbacv1.Subject) { if len(obj.APIGroup) == 0 { switch obj.Kind { case rbacv1.ServiceAccountKind: obj.APIGroup = "" case rbacv1.UserKind:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Aug 09 21:04:54 UTC 2017 - 1.3K bytes - Viewed (0) -
cluster/gce/manifests/abac-authz-policy.jsonl
{"apiVersion": "abac.authorization.kubernetes.io/v1beta1", "kind": "Policy", "spec": {"user":"{{kube_user}}", "namespace": "*", "resource": "*", "apiGroup": "*", "nonResourcePath": "*"}} {"apiVersion": "abac.authorization.kubernetes.io/v1beta1", "kind": "Policy", "spec": {"user":"kubelet", "namespace": "*", "resource": "*", "apiGroup": "*", "nonResourcePath": "*"}}
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Feb 01 16:39:56 UTC 2018 - 1.3K bytes - Viewed (0) -
pkg/apis/rbac/v1alpha1/conversion.go
return err } // specifically set the APIGroup for the three subjects recognized in v1alpha1 switch { case in.Kind == rbacv1alpha1.ServiceAccountKind: out.APIGroup = "" case in.Kind == rbacv1alpha1.UserKind: out.APIGroup = GroupName case in.Kind == rbacv1alpha1.GroupKind: out.APIGroup = GroupName default:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jun 22 18:30:51 UTC 2017 - 2.8K bytes - Viewed (0)