- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 26 for RoleRef (0.11 sec)
-
staging/src/k8s.io/api/rbac/v1beta1/types.go
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"` // RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace. // If the RoleRef cannot be resolved, the Authorizer must return an error. RoleRef RoleRef `json:"roleRef" protobuf:"bytes,3,opt,name=roleRef"` } // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 22:49:19 UTC 2024 - 13.1K bytes - Viewed (0) -
pkg/apis/rbac/zz_generated.deepcopy.go
func (in *RoleRef) DeepCopyInto(out *RoleRef) { *out = *in return } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RoleRef. func (in *RoleRef) DeepCopy() *RoleRef { if in == nil { return nil } out := new(RoleRef) in.DeepCopyInto(out) return out }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 24 19:47:49 UTC 2021 - 11.1K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1beta1/zz_generated.deepcopy.go
func (in *RoleRef) DeepCopyInto(out *RoleRef) { *out = *in return } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RoleRef. func (in *RoleRef) DeepCopy() *RoleRef { if in == nil { return nil } out := new(RoleRef) in.DeepCopyInto(out) return out }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 24 19:47:49 UTC 2021 - 10.6K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1alpha1/zz_generated.deepcopy.go
func (in *RoleRef) DeepCopyInto(out *RoleRef) { *out = *in return } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RoleRef. func (in *RoleRef) DeepCopy() *RoleRef { if in == nil { return nil } out := new(RoleRef) in.DeepCopyInto(out) return out }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 24 19:47:49 UTC 2021 - 10.6K bytes - Viewed (0) -
pkg/apis/rbac/helpers.go
func NewClusterBinding(clusterRoleName string) *ClusterRoleBindingBuilder { return &ClusterRoleBindingBuilder{ ClusterRoleBinding: ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{Name: clusterRoleName}, RoleRef: RoleRef{ APIGroup: GroupName, Kind: "ClusterRole", Name: clusterRoleName, }, }, } } // Groups adds the specified groups as the subjects of the ClusterRoleBinding.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 23 15:11:00 UTC 2020 - 12.1K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/rbac_test.go
r := &rbacv1.RoleBinding{ObjectMeta: metav1.ObjectMeta{Namespace: namespace}} switch bindType { case bindToRole: r.RoleRef = rbacv1.RoleRef{APIGroup: rbacv1.GroupName, Kind: "Role", Name: roleName} case bindToClusterRole: r.RoleRef = rbacv1.RoleRef{APIGroup: rbacv1.GroupName, Kind: "ClusterRole", Name: roleName} } r.Subjects = make([]rbacv1.Subject, len(subjects)) for i, subject := range subjects {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 21.1K bytes - Viewed (0) -
tests/integration/pilot/testdata/upgrade/1.11.0-beta.1-cni-install.yaml.tar
"create" ] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-cni labels: app: istio-cni release: istio istio.io/rev: default install.operator.istio.io/owning-resource: unknown operator.istio.io/component: "Cni" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istio-cni subjects: - kind: ServiceAccount name: istio-cni namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-cni-repair-rolebinding...
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jul 29 18:43:32 UTC 2021 - 10K bytes - Viewed (0) -
samples/addons/kiali.yaml
app.kubernetes.io/name: kiali app.kubernetes.io/instance: kiali version: "v1.85.0" app.kubernetes.io/version: "v1.85.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/part-of: "kiali" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: kiali subjects: - kind: ServiceAccount name: kiali namespace: istio-system ... ---
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 12 18:57:35 UTC 2024 - 10.6K bytes - Viewed (0) -
cmd/kubeadm/app/phases/copycerts/copycerts.go
return apiclient.CreateOrUpdateRoleBinding(client, &rbac.RoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: kubeadmconstants.KubeadmCertsClusterRoleName, Namespace: metav1.NamespaceSystem, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "Role", Name: kubeadmconstants.KubeadmCertsClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Jan 01 00:15:30 UTC 2023 - 10.2K bytes - Viewed (0) -
samples/security/spire/spire-quickstart.yaml
kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: spire-server-cluster-role-binding subjects: - kind: ServiceAccount name: spire-server namespace: spire roleRef: kind: ClusterRole name: spire-server-cluster-role apiGroup: rbac.authorization.k8s.io --- # Role for the SPIRE server. kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Oct 12 16:12:42 UTC 2023 - 32.2K bytes - Viewed (0)