- Sort Score
- Result 10 results
- Languages All
Results 61 - 70 of 227 for RoleBinding (0.18 sec)
-
common-protos/k8s.io/api/rbac/v1beta1/generated.proto
// Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleBinding, and will no longer be served in v1.22. message RoleBinding { // Standard object's metadata. // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; // Subjects holds references to the objects the role applies to. // +optional repeated Subject subjects = 2;
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8.6K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1/generated.proto
message Role { // Standard object's metadata. // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; // Rules holds all the PolicyRules for this Role // +optional repeated PolicyRule rules = 2; }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 7.6K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1alpha1/zz_generated.deepcopy.go
func (in *RoleBinding) DeepCopy() *RoleBinding { if in == nil { return nil } out := new(RoleBinding) in.DeepCopyInto(out) return out } // DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object. func (in *RoleBinding) DeepCopyObject() runtime.Object { if c := in.DeepCopy(); c != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 24 19:47:49 UTC 2021 - 10.6K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/subject_locator_test.go
action authorizer.Attributes subjects []rbacv1.Subject } tests := []struct { name string roles []*rbacv1.Role roleBindings []*rbacv1.RoleBinding clusterRoles []*rbacv1.ClusterRole clusterRoleBindings []*rbacv1.ClusterRoleBinding superUser string actionsToSubjects []actionToSubjects }{ { name: "no super user, star matches star",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 5.6K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1beta1/types_swagger_doc_generated.go
var map_RoleBinding = map[string]string{ "": "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleBinding, and will no longer be served in v1.22.",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Jan 22 00:51:25 UTC 2023 - 8.8K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/generated.proto
message Role { // Standard object's metadata. // +optional optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; // Rules holds all the PolicyRules for this Role // +optional // +listType=atomic repeated PolicyRule rules = 2; }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 15:34:11 UTC 2024 - 7.9K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1beta1/generated.proto
// Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleBinding, and will no longer be served in v1.22. message RoleBinding { // Standard object's metadata. // +optional optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; // Subjects holds references to the objects the role applies to. // +optional // +listType=atomic repeated Subject subjects = 2;
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 15:34:11 UTC 2024 - 8.8K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1alpha1/generated.proto
// Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleBinding, and will no longer be served in v1.22. message RoleBinding { // Standard object's metadata. // +optional optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; // Subjects holds references to the objects the role applies to. // +optional // +listType=atomic repeated Subject subjects = 2;
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 15:34:11 UTC 2024 - 8.8K bytes - Viewed (0) -
cluster/gce/addons/loadbalancing/cloud-provider-binding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: labels: addonmanager.kubernetes.io/mode: Reconcile name: gce:cloud-provider namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: gce:cloud-provider subjects: - kind: ServiceAccount name: cloud-provider namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 28 03:47:26 UTC 2018 - 685 bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1alpha1/types_swagger_doc_generated.go
var map_RoleBinding = map[string]string{ "": "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace. Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleBinding, and will no longer be served in v1.22.",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Jan 22 00:51:25 UTC 2023 - 8.7K bytes - Viewed (0)