- Sort Score
- Result 10 results
- Languages All
Results 71 - 80 of 227 for RoleBinding (0.26 sec)
-
cluster/addons/rbac/cluster-loadbalancing/glbc/user-rolebindings.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: system:controller:glbc namespace: kube-system labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system:controller:glbc subjects: - kind: User name: system:controller:glbc --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 02 05:24:48 UTC 2019 - 647 bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1alpha1/types.go
// namespace only have effect in that namespace. // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleBinding, and will no longer be served in v1.22. type RoleBinding struct { metav1.TypeMeta `json:",inline"` // Standard object's metadata. // +optional metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"` // Subjects holds references to the objects the role applies to.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 22:49:19 UTC 2024 - 11.2K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1beta1/types.go
// +k8s:prerelease-lifecycle-gen:introduced=1.6 // +k8s:prerelease-lifecycle-gen:deprecated=1.17 // +k8s:prerelease-lifecycle-gen:removed=1.22 // +k8s:prerelease-lifecycle-gen:replacement=rbac.authorization.k8s.io,v1,RoleBinding // RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 22:49:19 UTC 2024 - 13.1K bytes - Viewed (0) -
cluster/addons/metrics-server/auth-reader.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: metrics-server-auth-reader namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: extension-apiserver-authentication-reader subjects: - kind: ServiceAccount name: metrics-server
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Sep 03 20:14:57 UTC 2017 - 419 bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/types.go
// +k8s:prerelease-lifecycle-gen:introduced=1.8 // RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. // It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given // namespace only have effect in that namespace. type RoleBinding struct { metav1.TypeMeta `json:",inline"`
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 23 17:42:49 UTC 2024 - 10.7K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy_test.go
t.Errorf("ClusterRole: %s GetLabels() = %s, want %s", accessor.GetName(), got, want) } } rolebindings := ControllerRoleBindings() for i := range rolebindings { rolebinding := rolebindings[i] accessor, err := meta.Accessor(&rolebinding) if err != nil { t.Fatalf("unexpected error: %v", err) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 24 05:24:17 UTC 2019 - 2.9K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/generated.pb.go
} var xxx_messageInfo_Role proto.InternalMessageInfo func (m *RoleBinding) Reset() { *m = RoleBinding{} } func (*RoleBinding) ProtoMessage() {} func (*RoleBinding) Descriptor() ([]byte, []int) { return fileDescriptor_c8ba2e7dd472de66, []int{7} } func (m *RoleBinding) XXX_Unmarshal(b []byte) error { return m.Unmarshal(b) } func (m *RoleBinding) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { b = b[:cap(b)]
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 06:06:37 UTC 2024 - 77.5K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/rbac_test.go
default: panic(fmt.Errorf("invalid kind %s", r.Subjects[i].Kind)) } } return r } func newRoleBinding(namespace, roleName string, bindType uint16, subjects ...string) *rbacv1.RoleBinding { r := &rbacv1.RoleBinding{ObjectMeta: metav1.ObjectMeta{Namespace: namespace}} switch bindType { case bindToRole: r.RoleRef = rbacv1.RoleRef{APIGroup: rbacv1.GroupName, Kind: "Role", Name: roleName} case bindToClusterRole:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 21.1K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/types_swagger_doc_generated.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 24 20:35:20 UTC 2023 - 7.8K bytes - Viewed (0) -
manifests/charts/gateways/istio-ingress/templates/rolebindings.yaml
{{ $gateway := index .Values "gateways" "istio-ingressgateway" }} apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: {{ $gateway.name }}-sds namespace: {{ .Release.Namespace }} labels: release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" | quote }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "IngressGateways"
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 18 18:16:49 UTC 2024 - 632 bytes - Viewed (0)