Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 873 for apiGroup (0.15 sec)

  1. staging/src/k8s.io/apiserver/pkg/util/flowcontrol/request/width_test.go

    				APIGroup: "foo.bar",
    				Resource: "events",
    			},
    			counts: map[string]int64{
    				"events.foo.bar": 399,
    			},
    			maxSeats:             10,
    			initialSeatsExpected: 8,
    		},
    		{
    			name:       "request verb is list, no query parameters, count not known",
    			requestURI: "http://server/apis/foo.bar/v1/events",
    			requestInfo: &apirequest.RequestInfo{
    				Verb:     "list",
    				APIGroup: "foo.bar",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 24 18:25:29 UTC 2024
    - 17K bytes
    - Viewed (0)
  2. pkg/apis/rbac/v1beta1/defaults.go

    func SetDefaults_ClusterRoleBinding(obj *rbacv1beta1.ClusterRoleBinding) {
    	if len(obj.RoleRef.APIGroup) == 0 {
    		obj.RoleRef.APIGroup = GroupName
    	}
    }
    func SetDefaults_RoleBinding(obj *rbacv1beta1.RoleBinding) {
    	if len(obj.RoleRef.APIGroup) == 0 {
    		obj.RoleRef.APIGroup = GroupName
    	}
    }
    func SetDefaults_Subject(obj *rbacv1beta1.Subject) {
    	if len(obj.APIGroup) == 0 {
    		switch obj.Kind {
    		case rbacv1beta1.ServiceAccountKind:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jun 22 18:30:51 UTC 2017
    - 1.3K bytes
    - Viewed (0)
  3. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml

          rbac.authorization.kubernetes.io/autoupdate: "true"
        creationTimestamp: null
        labels:
          kubernetes.io/bootstrapping: rbac-defaults
        name: system:controller:attachdetach-controller
      roleRef:
        apiGroup: rbac.authorization.k8s.io
        kind: ClusterRole
        name: system:controller:attachdetach-controller
      subjects:
      - kind: ServiceAccount
        name: attachdetach-controller
        namespace: kube-system
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Mar 06 00:00:21 UTC 2024
    - 16.9K bytes
    - Viewed (0)
  4. pkg/apis/abac/v0/conversion_test.go

    		},
    
    		// specifying a user is preserved
    		"user": {
    			old:      &v0.Policy{User: "bob"},
    			expected: &abac.Policy{Spec: abac.PolicySpec{User: "bob", Readonly: false, NonResourcePath: "*", Namespace: "*", Resource: "*", APIGroup: "*"}},
    		},
    
    		// specifying a group is preserved (and no longer matches all users)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Oct 30 18:54:02 UTC 2017
    - 3.4K bytes
    - Viewed (0)
  5. cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap_test.go

    				},
    				Rules: []rbac.PolicyRule{
    					{
    						Verbs:     []string{"get"},
    						APIGroups: []string{""},
    						Resources: []string{"nodes"},
    					},
    				},
    			}, &rbac.ClusterRoleBinding{
    				ObjectMeta: metav1.ObjectMeta{
    					Name: constants.GetNodesClusterRoleName,
    				},
    				RoleRef: rbac.RoleRef{
    					APIGroup: rbac.GroupName,
    					Kind:     "ClusterRole",
    					Name:     constants.GetNodesClusterRoleName,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Oct 18 04:16:31 UTC 2023
    - 8.1K bytes
    - Viewed (0)
  6. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/namespace-role-bindings.yaml

        name: system::extension-apiserver-authentication-reader
        namespace: kube-system
      roleRef:
        apiGroup: rbac.authorization.k8s.io
        kind: Role
        name: extension-apiserver-authentication-reader
      subjects:
      - apiGroup: rbac.authorization.k8s.io
        kind: User
        name: system:kube-controller-manager
      - apiGroup: rbac.authorization.k8s.io
        kind: User
        name: system:kube-scheduler
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Feb 08 16:15:52 UTC 2019
    - 3.9K bytes
    - Viewed (0)
  7. pkg/api/persistentvolumeclaim/util.go

    func dataSourceIsPvcOrSnapshot(dataSource *core.TypedLocalObjectReference) bool {
    	if dataSource != nil {
    		apiGroup := ""
    		if dataSource.APIGroup != nil {
    			apiGroup = *dataSource.APIGroup
    		}
    		if dataSource.Kind == pvc &&
    			apiGroup == "" {
    			return true
    		}
    
    		if dataSource.Kind == volumeSnapshot && apiGroup == "snapshot.storage.k8s.io" {
    			return true
    		}
    	}
    	return false
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Oct 31 03:18:56 UTC 2023
    - 8.3K bytes
    - Viewed (0)
  8. pkg/registry/batch/job/storage/storage_test.go

    			deleteOptions: &metav1.DeleteOptions{},
    			requestInfo:   &genericapirequest.RequestInfo{APIGroup: "batch", APIVersion: "v1"},
    		},
    		{
    			description:   "deletion: no policy, v2, no warning",
    			expectWarning: false,
    			deleteOptions: &metav1.DeleteOptions{},
    			requestInfo:   &genericapirequest.RequestInfo{APIGroup: "batch", APIVersion: "v2"},
    		},
    		{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Apr 15 14:34:53 UTC 2024
    - 11.2K bytes
    - Viewed (0)
  9. plugin/pkg/auth/authorizer/rbac/rbac_test.go

    	verb        string
    	resource    string
    	subresource string
    	namespace   string
    	apiGroup    string
    }
    
    func (d *defaultAttributes) String() string {
    	return fmt.Sprintf("user=(%s), groups=(%s), verb=(%s), resource=(%s), namespace=(%s), apiGroup=(%s)",
    		d.user, strings.Split(d.groups, ","), d.verb, d.resource, d.namespace, d.apiGroup)
    }
    
    func (d *defaultAttributes) GetUser() user.Info {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Sep 24 15:14:54 UTC 2019
    - 21.1K bytes
    - Viewed (0)
  10. cluster/addons/cloud-controller-manager/cloud-node-controller-binding.yaml

    kind: ClusterRoleBinding
    metadata:
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
      name: system:cloud-controller-manager
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:cloud-controller-manager
    subjects:
    - kind: User
      apiGroup: rbac.authorization.k8s.io
      name: system:cloud-controller-manager
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 03 17:38:23 UTC 2022
    - 1.2K bytes
    - Viewed (0)
Back to top