- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 165 for roleRef (0.11 sec)
-
manifests/charts/istio-control/istio-discovery/templates/clusterrolebinding.yaml
kind: ClusterRoleBinding metadata: name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} subjects: - kind: ServiceAccount
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Oct 10 17:32:44 UTC 2021 - 1.3K bytes - Viewed (0) -
manifests/charts/istiod-remote/templates/clusterrolebinding.yaml
kind: ClusterRoleBinding metadata: name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} subjects: - kind: ServiceAccount
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Oct 10 17:32:44 UTC 2021 - 1.4K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1alpha1/zz_generated.deepcopy.go
func (in *RoleRef) DeepCopyInto(out *RoleRef) { *out = *in return } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RoleRef. func (in *RoleRef) DeepCopy() *RoleRef { if in == nil { return nil } out := new(RoleRef) in.DeepCopyInto(out) return out }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 24 19:47:49 UTC 2021 - 10.6K bytes - Viewed (0) -
cluster/addons/rbac/legacy-kubelet-user-disable/kubelet-binding.yaml
roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node subjects: [] --- # This is required so that new clusters still have bootstrap permissions apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: kubelet-bootstrap labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Mar 24 04:11:47 UTC 2019 - 782 bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/generated.pb.go
} var xxx_messageInfo_RoleList proto.InternalMessageInfo func (m *RoleRef) Reset() { *m = RoleRef{} } func (*RoleRef) ProtoMessage() {} func (*RoleRef) Descriptor() ([]byte, []int) { return fileDescriptor_c8ba2e7dd472de66, []int{10} } func (m *RoleRef) XXX_Unmarshal(b []byte) error { return m.Unmarshal(b) } func (m *RoleRef) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { b = b[:cap(b)]
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 06:06:37 UTC 2024 - 77.5K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1beta1/generated.pb.go
} var xxx_messageInfo_RoleList proto.InternalMessageInfo func (m *RoleRef) Reset() { *m = RoleRef{} } func (*RoleRef) ProtoMessage() {} func (*RoleRef) Descriptor() ([]byte, []int) { return fileDescriptor_c5bc2d145acd4e45, []int{10} } func (m *RoleRef) XXX_Unmarshal(b []byte) error { return m.Unmarshal(b) } func (m *RoleRef) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { b = b[:cap(b)]
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 06:06:37 UTC 2024 - 77.6K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1alpha1/generated.pb.go
} var xxx_messageInfo_RoleList proto.InternalMessageInfo func (m *RoleRef) Reset() { *m = RoleRef{} } func (*RoleRef) ProtoMessage() {} func (*RoleRef) Descriptor() ([]byte, []int) { return fileDescriptor_758889dfd9a88fa6, []int{10} } func (m *RoleRef) XXX_Unmarshal(b []byte) error { return m.Unmarshal(b) } func (m *RoleRef) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { b = b[:cap(b)]
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 06:06:37 UTC 2024 - 77.7K bytes - Viewed (0) -
prow/config/metrics/metrics.yaml
name: metrics-server:system:auth-delegator roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects: - kind: ServiceAccount name: metrics-server namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: k8s-app: metrics-server name: system:metrics-server roleRef: apiGroup: rbac.authorization.k8s.io
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 11 20:51:38 UTC 2024 - 4.6K bytes - Viewed (0) -
cluster/addons/volumesnapshots/volume-snapshot-controller/rbac-volume-snapshot-controller.yaml
namespace: kube-system labels: addonmanager.kubernetes.io/mode: Reconcile subjects: - kind: ServiceAccount name: volume-snapshot-controller namespace: kube-system roleRef: kind: ClusterRole # change the name also here if the ClusterRole gets renamed name: volume-snapshot-controller-runner apiGroup: rbac.authorization.k8s.io --- kind: Role
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 16 14:09:47 UTC 2022 - 2.9K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/proxy/proxy.go
Namespace: metav1.NamespaceSystem, }, } crb := &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: constants.KubeProxyClusterRoleBindingName, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: constants.KubeProxyClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.ServiceAccountKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 26 13:23:44 UTC 2023 - 8.1K bytes - Viewed (0)