- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 165 for roleRef (0.13 sec)
-
pkg/apis/rbac/v1beta1/defaults.go
return RegisterDefaults(scheme) } func SetDefaults_ClusterRoleBinding(obj *rbacv1beta1.ClusterRoleBinding) { if len(obj.RoleRef.APIGroup) == 0 { obj.RoleRef.APIGroup = GroupName } } func SetDefaults_RoleBinding(obj *rbacv1beta1.RoleBinding) { if len(obj.RoleRef.APIGroup) == 0 { obj.RoleRef.APIGroup = GroupName } } func SetDefaults_Subject(obj *rbacv1beta1.Subject) { if len(obj.APIGroup) == 0 { switch obj.Kind {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jun 22 18:30:51 UTC 2017 - 1.3K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1beta1/generated.proto
// Subjects holds references to the objects the role applies to. // +optional repeated Subject subjects = 2; // RoleRef can only reference a ClusterRole in the global namespace. // If the RoleRef cannot be resolved, the Authorizer must return an error. optional RoleRef roleRef = 3; } // ClusterRoleBindingList is a collection of ClusterRoleBindings.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8.6K bytes - Viewed (0) -
pkg/registry/rbac/rolebinding/policybased/storage.go
} roleBinding := obj.(*rbac.RoleBinding) if rbacregistry.BindingAuthorized(ctx, roleBinding.RoleRef, namespace, s.authorizer) { return s.StandardStorage.Create(ctx, obj, createValidation, options) } v1RoleRef := rbacv1.RoleRef{} err := rbacv1helpers.Convert_rbac_RoleRef_To_v1_RoleRef(&roleBinding.RoleRef, &v1RoleRef, nil) if err != nil { return nil, err }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 5.5K bytes - Viewed (0) -
cluster/addons/cloud-controller-manager/cloud-node-controller-binding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: labels: addonmanager.kubernetes.io/mode: Reconcile name: system::leader-locking-cloud-controller-manager namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system::leader-locking-cloud-controller-manager subjects: - kind: ServiceAccount name: cloud-controller-manager namespace: kube-system ---
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 03 17:38:23 UTC 2022 - 1.2K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1alpha1/types.go
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"` // RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace. // If the RoleRef cannot be resolved, the Authorizer must return an error. RoleRef RoleRef `json:"roleRef" protobuf:"bytes,3,opt,name=roleRef"` } // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 22:49:19 UTC 2024 - 11.2K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/generated.proto
// +optional // +listType=atomic repeated Subject subjects = 2; // RoleRef can only reference a ClusterRole in the global namespace. // If the RoleRef cannot be resolved, the Authorizer must return an error. // This field is immutable. optional RoleRef roleRef = 3; } // ClusterRoleBindingList is a collection of ClusterRoleBindings message ClusterRoleBindingList {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 15:34:11 UTC 2024 - 7.9K bytes - Viewed (0) -
cluster/addons/rbac/cluster-loadbalancing/glbc/user-rolebindings.yaml
addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system:controller:glbc subjects: - kind: User name: system:controller:glbc --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: system:controller:glbc labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 02 05:24:48 UTC 2019 - 647 bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/zz_generated.deepcopy.go
func (in *RoleRef) DeepCopyInto(out *RoleRef) { *out = *in return } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RoleRef. func (in *RoleRef) DeepCopy() *RoleRef { if in == nil { return nil } out := new(RoleRef) in.DeepCopyInto(out) return out }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 24 19:47:49 UTC 2021 - 10.6K bytes - Viewed (0) -
cluster/gce/addons/loadbalancing/cloud-provider-binding.yaml
namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: gce:cloud-provider subjects: - kind: ServiceAccount name: cloud-provider namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: addonmanager.kubernetes.io/mode: Reconcile name: gce:cloud-provider roleRef: apiGroup: rbac.authorization.k8s.io
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 28 03:47:26 UTC 2018 - 685 bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1beta1/types_swagger_doc_generated.go
"metadata": "Standard object's metadata.", "subjects": "Subjects holds references to the objects the role applies to.", "roleRef": "RoleRef can only reference a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error.", } func (ClusterRoleBinding) SwaggerDoc() map[string]string { return map_ClusterRoleBinding }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Jan 22 00:51:25 UTC 2023 - 8.8K bytes - Viewed (0)