Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 165 for roleRef (0.11 sec)

  1. manifests/charts/istio-control/istio-discovery/templates/clusterrolebinding.yaml

    kind: ClusterRoleBinding
    metadata:
      name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
      labels:
        app: istiod
        release: {{ .Release.Name }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
    subjects:
      - kind: ServiceAccount
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sun Oct 10 17:32:44 UTC 2021
    - 1.3K bytes
    - Viewed (0)
  2. manifests/charts/istiod-remote/templates/clusterrolebinding.yaml

    kind: ClusterRoleBinding
    metadata:
      name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
      labels:
        app: istiod
        release: {{ .Release.Name }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
    subjects:
      - kind: ServiceAccount
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sun Oct 10 17:32:44 UTC 2021
    - 1.4K bytes
    - Viewed (0)
  3. staging/src/k8s.io/api/rbac/v1alpha1/zz_generated.deepcopy.go

    func (in *RoleRef) DeepCopyInto(out *RoleRef) {
    	*out = *in
    	return
    }
    
    // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RoleRef.
    func (in *RoleRef) DeepCopy() *RoleRef {
    	if in == nil {
    		return nil
    	}
    	out := new(RoleRef)
    	in.DeepCopyInto(out)
    	return out
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Aug 24 19:47:49 UTC 2021
    - 10.6K bytes
    - Viewed (0)
  4. cluster/addons/rbac/legacy-kubelet-user-disable/kubelet-binding.yaml

    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node
    subjects: []
    ---
    # This is required so that new clusters still have bootstrap permissions
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: kubelet-bootstrap
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Mar 24 04:11:47 UTC 2019
    - 782 bytes
    - Viewed (0)
  5. staging/src/k8s.io/api/rbac/v1/generated.pb.go

    }
    
    var xxx_messageInfo_RoleList proto.InternalMessageInfo
    
    func (m *RoleRef) Reset()      { *m = RoleRef{} }
    func (*RoleRef) ProtoMessage() {}
    func (*RoleRef) Descriptor() ([]byte, []int) {
    	return fileDescriptor_c8ba2e7dd472de66, []int{10}
    }
    func (m *RoleRef) XXX_Unmarshal(b []byte) error {
    	return m.Unmarshal(b)
    }
    func (m *RoleRef) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
    	b = b[:cap(b)]
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 01 06:06:37 UTC 2024
    - 77.5K bytes
    - Viewed (0)
  6. staging/src/k8s.io/api/rbac/v1beta1/generated.pb.go

    }
    
    var xxx_messageInfo_RoleList proto.InternalMessageInfo
    
    func (m *RoleRef) Reset()      { *m = RoleRef{} }
    func (*RoleRef) ProtoMessage() {}
    func (*RoleRef) Descriptor() ([]byte, []int) {
    	return fileDescriptor_c5bc2d145acd4e45, []int{10}
    }
    func (m *RoleRef) XXX_Unmarshal(b []byte) error {
    	return m.Unmarshal(b)
    }
    func (m *RoleRef) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
    	b = b[:cap(b)]
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 01 06:06:37 UTC 2024
    - 77.6K bytes
    - Viewed (0)
  7. staging/src/k8s.io/api/rbac/v1alpha1/generated.pb.go

    }
    
    var xxx_messageInfo_RoleList proto.InternalMessageInfo
    
    func (m *RoleRef) Reset()      { *m = RoleRef{} }
    func (*RoleRef) ProtoMessage() {}
    func (*RoleRef) Descriptor() ([]byte, []int) {
    	return fileDescriptor_758889dfd9a88fa6, []int{10}
    }
    func (m *RoleRef) XXX_Unmarshal(b []byte) error {
    	return m.Unmarshal(b)
    }
    func (m *RoleRef) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
    	b = b[:cap(b)]
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 01 06:06:37 UTC 2024
    - 77.7K bytes
    - Viewed (0)
  8. prow/config/metrics/metrics.yaml

      name: metrics-server:system:auth-delegator
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:auth-delegator
    subjects:
    - kind: ServiceAccount
      name: metrics-server
      namespace: kube-system
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        k8s-app: metrics-server
      name: system:metrics-server
    roleRef:
      apiGroup: rbac.authorization.k8s.io
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 11 20:51:38 UTC 2024
    - 4.6K bytes
    - Viewed (0)
  9. cluster/addons/volumesnapshots/volume-snapshot-controller/rbac-volume-snapshot-controller.yaml

      namespace: kube-system
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    subjects:
      - kind: ServiceAccount
        name: volume-snapshot-controller
        namespace: kube-system
    roleRef:
      kind: ClusterRole
      # change the name also here if the ClusterRole gets renamed
      name: volume-snapshot-controller-runner
      apiGroup: rbac.authorization.k8s.io
    
    ---
    kind: Role
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Sep 16 14:09:47 UTC 2022
    - 2.9K bytes
    - Viewed (0)
  10. cmd/kubeadm/app/phases/addons/proxy/proxy.go

    			Namespace: metav1.NamespaceSystem,
    		},
    	}
    
    	crb := &rbac.ClusterRoleBinding{
    		ObjectMeta: metav1.ObjectMeta{
    			Name: constants.KubeProxyClusterRoleBindingName,
    		},
    		RoleRef: rbac.RoleRef{
    			APIGroup: rbac.GroupName,
    			Kind:     "ClusterRole",
    			Name:     constants.KubeProxyClusterRoleName,
    		},
    		Subjects: []rbac.Subject{
    			{
    				Kind:      rbac.ServiceAccountKind,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Sep 26 13:23:44 UTC 2023
    - 8.1K bytes
    - Viewed (0)
Back to top