Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 165 for roleRef (0.1 sec)

  1. pkg/apis/rbac/v1/helpers.go

    func NewClusterBinding(clusterRoleName string) *ClusterRoleBindingBuilder {
    	return &ClusterRoleBindingBuilder{
    		ClusterRoleBinding: rbacv1.ClusterRoleBinding{
    			ObjectMeta: metav1.ObjectMeta{Name: clusterRoleName},
    			RoleRef: rbacv1.RoleRef{
    				APIGroup: GroupName,
    				Kind:     "ClusterRole",
    				Name:     clusterRoleName,
    			},
    		},
    	}
    }
    
    func (r *ClusterRoleBindingBuilder) Groups(groups ...string) *ClusterRoleBindingBuilder {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 18 15:37:57 UTC 2023
    - 7.4K bytes
    - Viewed (0)
  2. pkg/apis/rbac/helpers.go

    func NewClusterBinding(clusterRoleName string) *ClusterRoleBindingBuilder {
    	return &ClusterRoleBindingBuilder{
    		ClusterRoleBinding: ClusterRoleBinding{
    			ObjectMeta: metav1.ObjectMeta{Name: clusterRoleName},
    			RoleRef: RoleRef{
    				APIGroup: GroupName,
    				Kind:     "ClusterRole",
    				Name:     clusterRoleName,
    			},
    		},
    	}
    }
    
    // Groups adds the specified groups as the subjects of the ClusterRoleBinding.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Feb 23 15:11:00 UTC 2020
    - 12.1K bytes
    - Viewed (0)
  3. cluster/gce/addons/konnectivity-agent/konnectivity-rbac.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: system:konnectivity-server
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:auth-delegator
    subjects:
      - apiGroup: rbac.authorization.k8s.io
        kind: User
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Mar 02 01:24:48 UTC 2020
    - 409 bytes
    - Viewed (0)
  4. cluster/addons/calico-policy-controller/calico-clusterrolebinding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: calico
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: calico
    subjects:
    - kind: ServiceAccount
      name: calico
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 14 15:32:57 UTC 2019
    - 303 bytes
    - Viewed (0)
  5. cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-rolebinding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: typha-cpha
      namespace: kube-system
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: typha-cpha
    subjects:
      - kind: ServiceAccount
        name: typha-cpha
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 14 15:32:57 UTC 2019
    - 332 bytes
    - Viewed (0)
  6. pkg/registry/rbac/validation/rule_test.go

    					{Kind: rbacv1.GroupKind, Name: "group1"},
    				},
    				RoleRef: rbacv1.RoleRef{APIGroup: rbacv1.GroupName, Kind: "Role", Name: "readthings"},
    			},
    		},
    		clusterRoleBindings: []*rbacv1.ClusterRoleBinding{
    			{
    				Subjects: []rbacv1.Subject{
    					{Kind: rbacv1.UserKind, Name: "admin"},
    					{Kind: rbacv1.GroupKind, Name: "admin"},
    				},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:46:12 UTC 2023
    - 7.9K bytes
    - Viewed (0)
  7. cluster/addons/kube-proxy/kube-proxy-rbac.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: system:kube-proxy
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    subjects:
      - kind: ServiceAccount
        name: kube-proxy
        namespace: kube-system
    roleRef:
      kind: ClusterRole
      name: system:node-proxier
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jun 03 18:46:08 UTC 2019
    - 488 bytes
    - Viewed (0)
  8. cluster/addons/metrics-server/auth-delegator.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: metrics-server:system:auth-delegator
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:auth-delegator
    subjects:
    - kind: ServiceAccount
      name: metrics-server
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Sep 03 20:14:57 UTC 2017
    - 398 bytes
    - Viewed (0)
  9. manifests/charts/istio-operator/templates/clusterrole_binding.yaml

    subjects:
    - kind: ServiceAccount
      name: istio-operator{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}
      namespace: {{.Release.Namespace}}
    roleRef:
      kind: ClusterRole
      name: istio-operator{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}
      apiGroup: rbac.authorization.k8s.io
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jul 28 18:55:36 UTC 2021
    - 498 bytes
    - Viewed (0)
  10. cluster/addons/node-problem-detector/kubelet-user-standalone/npd-binding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: kubelet-user-npd-binding
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node-problem-detector
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Nov 08 22:50:41 UTC 2019
    - 389 bytes
    - Viewed (0)
Back to top