Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 108 for RoleBinding (0.61 sec)

  1. staging/src/k8s.io/api/rbac/v1/types_swagger_doc_generated.go

    	"metadata": "Standard object's metadata.",
    	"rules":    "Rules holds all the PolicyRules for this Role",
    }
    
    func (Role) SwaggerDoc() map[string]string {
    	return map_Role
    }
    
    var map_RoleBinding = map[string]string{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Apr 24 20:35:20 UTC 2023
    - 7.8K bytes
    - Viewed (0)
  2. manifests/charts/gateway/templates/role.yaml

      annotations:
        {{- .Values.annotations | toYaml | nindent 4 }}
    rules:
    - apiGroups: [""]
      resources: ["secrets"]
      verbs: ["get", "watch", "list"]
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: {{ include "gateway.serviceAccountName" . }}
      namespace: {{ .Release.Namespace }}
      labels:
        {{- include "gateway.labels" . | nindent 4}}
      annotations:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Feb 21 16:58:32 UTC 2023
    - 963 bytes
    - Viewed (0)
  3. manifests/charts/gateways/istio-ingress/templates/rolebindings.yaml

    {{ $gateway := index .Values "gateways" "istio-ingressgateway" }}
    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: {{ $gateway.name }}-sds
      namespace: {{ .Release.Namespace }}
      labels:
        release: {{ .Release.Name }}
        istio.io/rev: {{ .Values.revision | default "default" | quote }}
        install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
        operator.istio.io/component: "IngressGateways"
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 18 18:16:49 UTC 2024
    - 632 bytes
    - Viewed (0)
  4. manifests/charts/gateways/istio-egress/templates/rolebindings.yaml

    {{ $gateway := index .Values "gateways" "istio-egressgateway" }}
    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: {{ $gateway.name }}-sds
      namespace: {{ .Release.Namespace }}
      labels:
        release: {{ .Release.Name }}
        istio.io/rev: {{ .Values.revision | default "default" | quote }}
        install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
        operator.istio.io/component: "EgressGateways"
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 18 18:16:49 UTC 2024
    - 630 bytes
    - Viewed (0)
  5. cmd/kubeadm/app/phases/bootstraptoken/clusterinfo/clusterinfo_test.go

    			},
    		},
    	}, metav1.CreateOptions{})
    	if err != nil {
    		t.Fatalf("error creating role: %v", err)
    	}
    
    	_, err = client.RbacV1().RoleBindings(metav1.NamespacePublic).Create(context.TODO(), &rbac.RoleBinding{
    		ObjectMeta: metav1.ObjectMeta{
    			Name:      BootstrapSignerClusterRoleName,
    			Namespace: metav1.NamespacePublic,
    		},
    		RoleRef: rbac.RoleRef{
    			APIGroup: rbac.GroupName,
    			Kind:     "Role",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Feb 18 11:14:32 UTC 2024
    - 5.3K bytes
    - Viewed (0)
  6. staging/src/k8s.io/api/rbac/v1beta1/generated.pb.go

    }
    
    var xxx_messageInfo_Role proto.InternalMessageInfo
    
    func (m *RoleBinding) Reset()      { *m = RoleBinding{} }
    func (*RoleBinding) ProtoMessage() {}
    func (*RoleBinding) Descriptor() ([]byte, []int) {
    	return fileDescriptor_c5bc2d145acd4e45, []int{7}
    }
    func (m *RoleBinding) XXX_Unmarshal(b []byte) error {
    	return m.Unmarshal(b)
    }
    func (m *RoleBinding) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
    	b = b[:cap(b)]
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 01 06:06:37 UTC 2024
    - 77.6K bytes
    - Viewed (0)
  7. staging/src/k8s.io/api/rbac/v1alpha1/generated.pb.go

    }
    
    var xxx_messageInfo_Role proto.InternalMessageInfo
    
    func (m *RoleBinding) Reset()      { *m = RoleBinding{} }
    func (*RoleBinding) ProtoMessage() {}
    func (*RoleBinding) Descriptor() ([]byte, []int) {
    	return fileDescriptor_758889dfd9a88fa6, []int{7}
    }
    func (m *RoleBinding) XXX_Unmarshal(b []byte) error {
    	return m.Unmarshal(b)
    }
    func (m *RoleBinding) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
    	b = b[:cap(b)]
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 01 06:06:37 UTC 2024
    - 77.7K bytes
    - Viewed (0)
  8. cluster/addons/cloud-controller-manager/cloud-node-controller-binding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
      name: system::leader-locking-cloud-controller-manager
      namespace: kube-system
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: system::leader-locking-cloud-controller-manager
    subjects:
    - kind: ServiceAccount
      name: cloud-controller-manager
      namespace: kube-system
    ---
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 03 17:38:23 UTC 2022
    - 1.2K bytes
    - Viewed (0)
  9. samples/addons/kiali.yaml

      - cacerts
      - istio-ca-secret
      resources:
      - secrets
      verbs:
      - get
      - list
      - watch
    ...
    ---
    # Source: kiali-server/templates/rolebinding-controlplane.yaml
    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: kiali-controlplane
      namespace: istio-system
      labels:
        helm.sh/chart: kiali-server-1.85.0
        app: kiali
        app.kubernetes.io/name: kiali
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 12 18:57:35 UTC 2024
    - 10.6K bytes
    - Viewed (0)
  10. tests/integration/security/egress_sidecar_tls_origination_test.go

    kind: Role
    metadata:
      name: allow-list-secrets
    rules:
    - apiGroups:
      - ""
      resources:
      - secrets
      verbs:
      - list
    `
    
    	rolebinding := `
    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: allow-list-secrets-to-{{ .ServiceAccount }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: allow-list-secrets
    subjects:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Apr 08 22:02:59 UTC 2024
    - 10.4K bytes
    - Viewed (0)
Back to top