- Sort Score
- Result 10 results
- Languages All
Results 71 - 80 of 873 for apiGroup (0.12 sec)
-
pkg/apis/abac/v1beta1/zz_generated.conversion.go
} func autoConvert_v1beta1_PolicySpec_To_abac_PolicySpec(in *PolicySpec, out *abac.PolicySpec, s conversion.Scope) error { out.User = in.User out.Group = in.Group out.Readonly = in.Readonly out.APIGroup = in.APIGroup out.Resource = in.Resource out.Namespace = in.Namespace out.NonResourcePath = in.NonResourcePath return nil } // Convert_v1beta1_PolicySpec_To_abac_PolicySpec is an autogenerated conversion function.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 24 19:47:49 UTC 2021 - 4K bytes - Viewed (0) -
pkg/registry/admissionregistration/validatingadmissionpolicybinding/authz.go
resource, apiGroup, apiVersion := "*", "*", "*" if policy, err := v.policyGetter.GetValidatingAdmissionPolicy(ctx, binding.Spec.PolicyName); err == nil && policy.Spec.ParamKind != nil { paramKind := policy.Spec.ParamKind if gv, err := schema.ParseGroupVersion(paramKind.APIVersion); err == nil { // we only need to authorize the parsed group/version apiGroup = gv.Group apiVersion = gv.Version
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 12:19:03 UTC 2024 - 3.7K bytes - Viewed (0) -
cluster/addons/node-problem-detector/standalone/npd-binding.yaml
kind: ClusterRoleBinding metadata: name: npd-binding labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-problem-detector subjects: - apiGroup: rbac.authorization.k8s.io kind: User
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Aug 21 09:29:37 UTC 2017 - 397 bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/v1.29.0/rbac.authorization.k8s.io.v1beta1.ClusterRoleBinding.yaml
kind: kindValue name: nameValue uid: uidValue resourceVersion: resourceVersionValue selfLink: selfLinkValue uid: uidValue roleRef: apiGroup: apiGroupValue kind: kindValue name: nameValue subjects: - apiGroup: apiGroupValue kind: kindValue name: nameValue
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Dec 15 04:12:07 UTC 2023 - 1K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/v1.29.0/rbac.authorization.k8s.io.v1.ClusterRoleBinding.json
"fieldsV1": {}, "subresource": "subresourceValue" } ] }, "subjects": [ { "kind": "kindValue", "apiGroup": "apiGroupValue", "name": "nameValue", "namespace": "namespaceValue" } ], "roleRef": { "apiGroup": "apiGroupValue", "kind": "kindValue", "name": "nameValue" }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Dec 15 04:12:07 UTC 2023 - 1.4K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/HEAD/rbac.authorization.k8s.io.v1.RoleBinding.yaml
kind: kindValue name: nameValue uid: uidValue resourceVersion: resourceVersionValue selfLink: selfLinkValue uid: uidValue roleRef: apiGroup: apiGroupValue kind: kindValue name: nameValue subjects: - apiGroup: apiGroupValue kind: kindValue name: nameValue
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 06 21:25:20 UTC 2022 - 1K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/HEAD/rbac.authorization.k8s.io.v1.ClusterRoleBinding.yaml
kind: kindValue name: nameValue uid: uidValue resourceVersion: resourceVersionValue selfLink: selfLinkValue uid: uidValue roleRef: apiGroup: apiGroupValue kind: kindValue name: nameValue subjects: - apiGroup: apiGroupValue kind: kindValue name: nameValue
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 06 21:25:20 UTC 2022 - 1K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1.ClusterRoleBinding.json
"fieldsV1": {}, "subresource": "subresourceValue" } ] }, "subjects": [ { "kind": "kindValue", "apiGroup": "apiGroupValue", "name": "nameValue", "namespace": "namespaceValue" } ], "roleRef": { "apiGroup": "apiGroupValue", "kind": "kindValue", "name": "nameValue" }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 08:52:25 UTC 2024 - 1.4K bytes - Viewed (0) -
pkg/registry/admissionregistration/validatingadmissionpolicy/authz.go
} paramKind := policy.Spec.ParamKind // default to requiring permissions on all group/version/resources resource, apiGroup, apiVersion := "*", "*", "*" if gv, err := schema.ParseGroupVersion(paramKind.APIVersion); err == nil { // we only need to authorize the parsed group/version apiGroup = gv.Group apiVersion = gv.Version if gvr, err := v.resourceResolver.Resolve(gv.WithKind(paramKind.Kind)); err == nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 07 21:29:56 UTC 2022 - 3.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/resourcequota/apis/resourcequota/v1beta1/types.go
// To consume the resource, there must exist an associated quota that limits // its consumption. type LimitedResource struct { // APIGroup is the name of the APIGroup that contains the limited resource. // +optional APIGroup string `json:"apiGroup,omitempty"` // Resource is the name of the resource this rule applies to. // For example, if the administrator wants to limit consumption
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 04 12:53:52 UTC 2020 - 2.9K bytes - Viewed (0)