- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 40 for clusterRoles (0.23 sec)
-
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go
ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "clusterrole-aggregation-controller"}, Rules: []rbacv1.PolicyRule{ // this controller must have full permissions on clusterroles to allow it to mutate them in any way rbacv1helpers.NewRule("escalate", "get", "list", "watch", "update", "patch").Groups(rbacGroup).Resources("clusterroles").RuleOrDie(), }, })
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 28.9K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
} return nodePolicyRules } // ClusterRoles returns the cluster roles to bootstrap an API server with func ClusterRoles() []rbacv1.ClusterRole { roles := []rbacv1.ClusterRole{ { // a "root" role which can do absolutely anything ObjectMeta: metav1.ObjectMeta{Name: "cluster-admin"}, Rules: []rbacv1.PolicyRule{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 34.4K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-roles.yaml
kind: ClusterRole metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:clusterrole-aggregation-controller rules: - apiGroups: - rbac.authorization.k8s.io resources: - clusterroles verbs: - escalate
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 26.6K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/dns/dns.go
return err } } coreDNSClusterRoles := &rbac.ClusterRole{} if err := kuberuntime.DecodeInto(clientsetscheme.Codecs.UniversalDecoder(), []byte(CoreDNSClusterRole), coreDNSClusterRoles); err != nil { return errors.Wrapf(err, "%s ClusterRole", unableToDecodeCoreDNS) } // Create the Clusterroles for CoreDNS or update it in case it already exists
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 11 10:21:20 UTC 2024 - 16.1K bytes - Viewed (0) -
istioctl/pkg/precheck/precheck.go
version string resource string }{ { version: "v1", resource: "namespaces", }, { group: "rbac.authorization.k8s.io", version: "v1", resource: "clusterroles", }, { group: "rbac.authorization.k8s.io", version: "v1", resource: "clusterrolebindings", }, { group: "apiextensions.k8s.io", version: "v1",
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 12 02:57:30 UTC 2024 - 19.3K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml
name: system:controller:clusterrole-aggregation-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:clusterrole-aggregation-controller subjects: - kind: ServiceAccount name: clusterrole-aggregation-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 16.9K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-roles.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: admin rules: null - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jul 18 08:11:08 UTC 2023 - 24.1K bytes - Viewed (0) -
pkg/apis/rbac/v1/zz_generated.conversion.go
return err } if err := s.AddGeneratedConversionFunc((*v1.ClusterRole)(nil), (*rbac.ClusterRole)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1_ClusterRole_To_rbac_ClusterRole(a.(*v1.ClusterRole), b.(*rbac.ClusterRole), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*rbac.ClusterRole)(nil), (*v1.ClusterRole)(nil), func(a, b interface{}, scope conversion.Scope) error {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 24 19:47:49 UTC 2021 - 21K bytes - Viewed (0) -
pkg/apis/rbac/v1beta1/zz_generated.conversion.go
} if err := s.AddGeneratedConversionFunc((*v1beta1.ClusterRole)(nil), (*rbac.ClusterRole)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1beta1_ClusterRole_To_rbac_ClusterRole(a.(*v1beta1.ClusterRole), b.(*rbac.ClusterRole), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*rbac.ClusterRole)(nil), (*v1beta1.ClusterRole)(nil), func(a, b interface{}, scope conversion.Scope) error {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 24 19:47:49 UTC 2021 - 22.1K bytes - Viewed (0) -
pkg/apis/rbac/validation/validation_test.go
RoleRef: rbac.RoleRef{APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: "valid"}, }, T: field.ErrorTypeRequired, F: "metadata.name", }, "bad role": { A: rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{Name: "default"}, RoleRef: rbac.RoleRef{APIGroup: rbac.GroupName, Kind: "ClusterRole"}, }, T: field.ErrorTypeRequired, F: "roleRef.name", },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 02 07:48:42 UTC 2023 - 14.1K bytes - Viewed (0)