- Sort Score
- Result 10 results
- Languages All
Results 61 - 70 of 106 for ClusterRoleBinding (0.39 sec)
-
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
} // ClusterRoleBindingsToSplit returns a map of Names of source ClusterRoleBindings // to copy Subjects, Annotations, and Labels to destination ClusterRoleBinding templates. func ClusterRoleBindingsToSplit() map[string]rbacv1.ClusterRoleBinding { bindingsToSplit := map[string]rbacv1.ClusterRoleBinding{} for _, defaultClusterRoleBinding := range ClusterRoleBindings() { switch defaultClusterRoleBinding.Name { case "system:public-info-viewer":
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 34.4K bytes - Viewed (0) -
pkg/api/testing/defaulting_test.go
{Group: "extensions", Version: "v1beta1", Kind: "NetworkPolicyList"}: {}, {Group: "rbac.authorization.k8s.io", Version: "v1alpha1", Kind: "ClusterRoleBinding"}: {}, {Group: "rbac.authorization.k8s.io", Version: "v1alpha1", Kind: "ClusterRoleBindingList"}: {},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 20.3K bytes - Viewed (0) -
prow/lib.sh
export KUBECONFIG="${context}" kubectl delete ns istio-system-multi --ignore-not-found kubectl delete clusterrolebinding istio-multi-test --ignore-not-found kubectl create ns istio-system-multi kubectl create sa istio-multi-test -n istio-system-multi kubectl create clusterrolebinding istio-multi-test --clusterrole=cluster-admin --serviceaccount=istio-system-multi:istio-multi-test
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 09 12:26:52 UTC 2024 - 8.1K bytes - Viewed (0) -
cmd/kubeadm/app/constants/constants.go
// NodeKubeletBootstrap defines the name of the ClusterRoleBinding that lets kubelets post CSRs NodeKubeletBootstrap = "kubeadm:kubelet-bootstrap" // GetNodesClusterRoleName defines the name of the ClusterRole and ClusterRoleBinding to get nodes GetNodesClusterRoleName = "kubeadm:get-nodes" // NodeAutoApproveBootstrapClusterRoleBinding defines the name of the ClusterRoleBinding that makes the csrapprover approve node CSRs
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 01 03:36:35 UTC 2024 - 32.4K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/zz_generated.prerelease-lifecycle.go
// It is controlled by "k8s:prerelease-lifecycle-gen:introduced" tags in types.go. func (in *ClusterRoleBinding) APILifecycleIntroduced() (major, minor int) { return 1, 8 }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 23 17:42:49 UTC 2024 - 3.3K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go
} func buildControllerRoles() ([]rbacv1.ClusterRole, []rbacv1.ClusterRoleBinding) { // controllerRoles is a slice of roles used for controllers controllerRoles := []rbacv1.ClusterRole{} // controllerRoleBindings is a slice of roles used for controllers controllerRoleBindings := []rbacv1.ClusterRoleBinding{} addControllerRole(&controllerRoles, &controllerRoleBindings, func() rbacv1.ClusterRole {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 28.9K bytes - Viewed (0) -
api/openapi-spec/v3/apis__rbac.authorization.k8s.io__v1_openapi.json
{ "group": "rbac.authorization.k8s.io", "kind": "ClusterRole", "version": "v1" } ] }, "io.k8s.api.rbac.v1.ClusterRoleBinding": { "description": "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.", "properties": { "apiVersion": {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 04:18:56 UTC 2024 - 352.2K bytes - Viewed (0) -
samples/addons/prometheus.yaml
verbs: - get - list - watch - nonResourceURLs: - "/metrics" verbs: - get --- # Source: prometheus/templates/clusterrolebinding.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: app.kubernetes.io/component: server app.kubernetes.io/name: prometheus app.kubernetes.io/instance: prometheus
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 12 18:57:35 UTC 2024 - 16.2K bytes - Viewed (0) -
cluster/addons/dns/coredns/coredns.yaml.base
- namespaces verbs: - list - watch - apiGroups: - discovery.k8s.io resources: - endpointslices verbs: - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" labels: kubernetes.io/bootstrapping: rbac-defaults addonmanager.kubernetes.io/mode: EnsureExists name: system:coredns
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 23:50:49 UTC 2023 - 4.9K bytes - Viewed (0) -
cluster/addons/dns/coredns/coredns.yaml.in
- namespaces verbs: - list - watch - apiGroups: - discovery.k8s.io resources: - endpointslices verbs: - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" labels: kubernetes.io/bootstrapping: rbac-defaults addonmanager.kubernetes.io/mode: EnsureExists name: system:coredns
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 23:50:49 UTC 2023 - 4.9K bytes - Viewed (0)