Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 165 for roleRef (0.1 sec)

  1. staging/src/k8s.io/api/rbac/v1beta1/types.go

    	Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
    
    	// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
    	// If the RoleRef cannot be resolved, the Authorizer must return an error.
    	RoleRef RoleRef `json:"roleRef" protobuf:"bytes,3,opt,name=roleRef"`
    }
    
    // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 22:49:19 UTC 2024
    - 13.1K bytes
    - Viewed (0)
  2. staging/src/k8s.io/api/rbac/v1beta1/generated.proto

      // +optional
      // +listType=atomic
      repeated Subject subjects = 2;
    
      // RoleRef can only reference a ClusterRole in the global namespace.
      // If the RoleRef cannot be resolved, the Authorizer must return an error.
      optional RoleRef roleRef = 3;
    }
    
    // ClusterRoleBindingList is a collection of ClusterRoleBindings.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 15:34:11 UTC 2024
    - 8.8K bytes
    - Viewed (0)
  3. staging/src/k8s.io/api/rbac/v1alpha1/generated.proto

      // +optional
      // +listType=atomic
      repeated Subject subjects = 2;
    
      // RoleRef can only reference a ClusterRole in the global namespace.
      // If the RoleRef cannot be resolved, the Authorizer must return an error.
      optional RoleRef roleRef = 3;
    }
    
    // ClusterRoleBindingList is a collection of ClusterRoleBindings.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 15:34:11 UTC 2024
    - 8.8K bytes
    - Viewed (0)
  4. plugin/pkg/auth/authorizer/rbac/subject_locator.go

    	// of the role binding, the empty string if a cluster role binding.
    	GetRoleReferenceRules(roleRef rbacv1.RoleRef, namespace string) ([]rbacv1.PolicyRule, error)
    }
    
    type SubjectLocator interface {
    	AllowedSubjects(attributes authorizer.Attributes) ([]rbacv1.Subject, error)
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 4.7K bytes
    - Viewed (0)
  5. manifests/charts/istio-cni/templates/clusterrolebinding.yaml

        release: {{ .Release.Name }}
        istio.io/rev: {{ .Values.revision | default "default" }}
        install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
        operator.istio.io/component: "Cni"
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: {{ template "name" . }}
    subjects:
    - kind: ServiceAccount
      name: {{ template "name" . }}
      namespace: {{ .Release.Namespace }}
    ---
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri May 17 21:52:29 UTC 2024
    - 1.9K bytes
    - Viewed (0)
  6. pkg/apis/rbac/zz_generated.deepcopy.go

    func (in *RoleRef) DeepCopyInto(out *RoleRef) {
    	*out = *in
    	return
    }
    
    // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RoleRef.
    func (in *RoleRef) DeepCopy() *RoleRef {
    	if in == nil {
    		return nil
    	}
    	out := new(RoleRef)
    	in.DeepCopyInto(out)
    	return out
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Aug 24 19:47:49 UTC 2021
    - 11.1K bytes
    - Viewed (0)
  7. staging/src/k8s.io/api/rbac/v1beta1/zz_generated.deepcopy.go

    func (in *RoleRef) DeepCopyInto(out *RoleRef) {
    	*out = *in
    	return
    }
    
    // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RoleRef.
    func (in *RoleRef) DeepCopy() *RoleRef {
    	if in == nil {
    		return nil
    	}
    	out := new(RoleRef)
    	in.DeepCopyInto(out)
    	return out
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Aug 24 19:47:49 UTC 2021
    - 10.6K bytes
    - Viewed (0)
  8. cluster/addons/rbac/kubelet-cert-rotation/kubelet-certificate-management.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: gce:beta:kubelet-certificate-bootstrap
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: gce:beta:kubelet-certificate-bootstrap
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
      name: kubelet
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Mar 24 04:11:47 UTC 2019
    - 1.4K bytes
    - Viewed (0)
  9. staging/src/k8s.io/api/rbac/v1/types_swagger_doc_generated.go

    	"metadata": "Standard object's metadata.",
    	"subjects": "Subjects holds references to the objects the role applies to.",
    	"roleRef":  "RoleRef can only reference a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error. This field is immutable.",
    }
    
    func (ClusterRoleBinding) SwaggerDoc() map[string]string {
    	return map_ClusterRoleBinding
    }
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Apr 24 20:35:20 UTC 2023
    - 7.8K bytes
    - Viewed (0)
  10. staging/src/k8s.io/api/rbac/v1alpha1/types_swagger_doc_generated.go

    	"metadata": "Standard object's metadata.",
    	"subjects": "Subjects holds references to the objects the role applies to.",
    	"roleRef":  "RoleRef can only reference a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error.",
    }
    
    func (ClusterRoleBinding) SwaggerDoc() map[string]string {
    	return map_ClusterRoleBinding
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Jan 22 00:51:25 UTC 2023
    - 8.7K bytes
    - Viewed (0)
Back to top