- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 165 for roleRef (0.1 sec)
-
pkg/apis/rbac/v1/helpers.go
func NewClusterBinding(clusterRoleName string) *ClusterRoleBindingBuilder { return &ClusterRoleBindingBuilder{ ClusterRoleBinding: rbacv1.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{Name: clusterRoleName}, RoleRef: rbacv1.RoleRef{ APIGroup: GroupName, Kind: "ClusterRole", Name: clusterRoleName, }, }, } } func (r *ClusterRoleBindingBuilder) Groups(groups ...string) *ClusterRoleBindingBuilder {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 7.4K bytes - Viewed (0) -
pkg/apis/rbac/helpers.go
func NewClusterBinding(clusterRoleName string) *ClusterRoleBindingBuilder { return &ClusterRoleBindingBuilder{ ClusterRoleBinding: ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{Name: clusterRoleName}, RoleRef: RoleRef{ APIGroup: GroupName, Kind: "ClusterRole", Name: clusterRoleName, }, }, } } // Groups adds the specified groups as the subjects of the ClusterRoleBinding.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 23 15:11:00 UTC 2020 - 12.1K bytes - Viewed (0) -
cluster/gce/addons/konnectivity-agent/konnectivity-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: system:konnectivity-server labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects: - apiGroup: rbac.authorization.k8s.io kind: User
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Mar 02 01:24:48 UTC 2020 - 409 bytes - Viewed (0) -
cluster/addons/calico-policy-controller/calico-clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: calico labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: calico subjects: - kind: ServiceAccount name: calico
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 14 15:32:57 UTC 2019 - 303 bytes - Viewed (0) -
cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-rolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: typha-cpha namespace: kube-system labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: typha-cpha subjects: - kind: ServiceAccount name: typha-cpha
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 14 15:32:57 UTC 2019 - 332 bytes - Viewed (0) -
pkg/registry/rbac/validation/rule_test.go
{Kind: rbacv1.GroupKind, Name: "group1"}, }, RoleRef: rbacv1.RoleRef{APIGroup: rbacv1.GroupName, Kind: "Role", Name: "readthings"}, }, }, clusterRoleBindings: []*rbacv1.ClusterRoleBinding{ { Subjects: []rbacv1.Subject{ {Kind: rbacv1.UserKind, Name: "admin"}, {Kind: rbacv1.GroupKind, Name: "admin"}, },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 7.9K bytes - Viewed (0) -
cluster/addons/kube-proxy/kube-proxy-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1 metadata: name: system:kube-proxy labels: addonmanager.kubernetes.io/mode: Reconcile subjects: - kind: ServiceAccount name: kube-proxy namespace: kube-system roleRef: kind: ClusterRole name: system:node-proxier
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jun 03 18:46:08 UTC 2019 - 488 bytes - Viewed (0) -
cluster/addons/metrics-server/auth-delegator.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: metrics-server:system:auth-delegator labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects: - kind: ServiceAccount name: metrics-server
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Sep 03 20:14:57 UTC 2017 - 398 bytes - Viewed (0) -
manifests/charts/istio-operator/templates/clusterrole_binding.yaml
subjects: - kind: ServiceAccount name: istio-operator{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }} namespace: {{.Release.Namespace}} roleRef: kind: ClusterRole name: istio-operator{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }} apiGroup: rbac.authorization.k8s.io
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jul 28 18:55:36 UTC 2021 - 498 bytes - Viewed (0) -
cluster/addons/node-problem-detector/kubelet-user-standalone/npd-binding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: kubelet-user-npd-binding labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-problem-detector subjects: - apiGroup: rbac.authorization.k8s.io kind: User
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 08 22:50:41 UTC 2019 - 389 bytes - Viewed (0)