Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 873 for apiGroup (0.18 sec)

  1. cluster/addons/rbac/kubelet-cert-rotation/kubelet-certificate-management.yaml

    kind: ClusterRoleBinding
    metadata:
      name: gce:beta:kubelet-certificate-bootstrap
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: gce:beta:kubelet-certificate-bootstrap
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
      name: kubelet
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Mar 24 04:11:47 UTC 2019
    - 1.4K bytes
    - Viewed (0)
  2. plugin/pkg/auth/authorizer/rbac/subject_locator_test.go

    					[]rbacv1.Subject{
    						{Kind: rbacv1.GroupKind, APIGroup: rbacv1.GroupName, Name: user.SystemPrivilegedGroup},
    						{Kind: rbacv1.UserKind, APIGroup: rbacv1.GroupName, Name: "super-admin"},
    						{Kind: rbacv1.GroupKind, APIGroup: rbacv1.GroupName, Name: "super-admins"},
    						{Kind: rbacv1.UserKind, APIGroup: rbacv1.GroupName, Name: "admin"},
    						{Kind: rbacv1.GroupKind, APIGroup: rbacv1.GroupName, Name: "admins"},
    					},
    				},
    				{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 5.6K bytes
    - Viewed (0)
  3. pkg/apis/rbac/validation/validation_test.go

    			ObjectMeta: metav1.ObjectMeta{Name: "master"},
    			RoleRef:    rbac.RoleRef{APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: "valid"},
    			Subjects: []rbac.Subject{
    				{Name: "validsaname", APIGroup: "", Namespace: "foo", Kind: rbac.ServiceAccountKind},
    				{Name: "valid@username", APIGroup: rbac.GroupName, Kind: rbac.UserKind},
    				{Name: "valid@groupname", APIGroup: rbac.GroupName, Kind: rbac.GroupKind},
    			},
    		},
    	)
    	if len(errs) != 0 {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 02 07:48:42 UTC 2023
    - 14.1K bytes
    - Viewed (0)
  4. pkg/apis/rbac/validation/validation.go

    		if subject.APIGroup != rbac.GroupName {
    			allErrs = append(allErrs, field.NotSupported(fldPath.Child("apiGroup"), subject.APIGroup, []string{rbac.GroupName}))
    		}
    
    	case rbac.GroupKind:
    		// TODO(ericchiang): What other restrictions on group name are there?
    		if subject.APIGroup != rbac.GroupName {
    			allErrs = append(allErrs, field.NotSupported(fldPath.Child("apiGroup"), subject.APIGroup, []string{rbac.GroupName}))
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Nov 08 01:48:21 UTC 2022
    - 10.4K bytes
    - Viewed (0)
  5. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml

          kubernetes.io/bootstrapping: rbac-defaults
        name: system:public-info-viewer
      roleRef:
        apiGroup: rbac.authorization.k8s.io
        kind: ClusterRole
        name: system:public-info-viewer
      subjects:
      - apiGroup: rbac.authorization.k8s.io
        kind: Group
        name: system:authenticated
      - apiGroup: rbac.authorization.k8s.io
        kind: Group
        name: system:unauthenticated
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Sep 11 19:01:47 UTC 2020
    - 5.7K bytes
    - Viewed (0)
  6. pkg/apis/rbac/v1alpha1/conversion_test.go

    				RoleRef: rbacapi.RoleRef{Name: "foo", APIGroup: v1alpha1.GroupName},
    				Subjects: []rbacapi.Subject{
    					{Kind: "User", APIGroup: v1alpha1.GroupName, Name: "myuser"},
    					{Kind: "Group", APIGroup: v1alpha1.GroupName, Name: "mygroup"},
    					{Kind: "ServiceAccount", APIGroup: "", Name: "mysa", Namespace: "myns"},
    					{Kind: "User", APIGroup: v1alpha1.GroupName, Name: "myuser"},
    					{Kind: "Group", APIGroup: v1alpha1.GroupName, Name: "mygroup"},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Oct 18 15:23:55 UTC 2017
    - 4K bytes
    - Viewed (0)
  7. staging/src/k8s.io/apiserver/pkg/admission/plugin/resourcequota/config_test.go

    		},
    		{
    			name: "valid v1alpha1 config",
    			input: `
    kind: Configuration
    apiVersion: resourcequota.admission.k8s.io/v1alpha1
    limitedResources:
    - apiGroup: ""
      resource: persistentvolumeclaims
      matchContains:
      - .storageclass.storage.k8s.io/requests.storage
    - apiGroup: ""
      resource: pods
      matchScopes:
      - scopeName: PriorityClass
        operator: In
        values:
        - cluster-services
    `,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Sep 04 12:53:52 UTC 2020
    - 4.2K bytes
    - Viewed (0)
  8. pkg/apis/rbac/v1/defaults.go

    	if len(obj.RoleRef.APIGroup) == 0 {
    		obj.RoleRef.APIGroup = GroupName
    	}
    }
    func SetDefaults_RoleBinding(obj *rbacv1.RoleBinding) {
    	if len(obj.RoleRef.APIGroup) == 0 {
    		obj.RoleRef.APIGroup = GroupName
    	}
    }
    func SetDefaults_Subject(obj *rbacv1.Subject) {
    	if len(obj.APIGroup) == 0 {
    		switch obj.Kind {
    		case rbacv1.ServiceAccountKind:
    			obj.APIGroup = ""
    		case rbacv1.UserKind:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Aug 09 21:04:54 UTC 2017
    - 1.3K bytes
    - Viewed (0)
  9. cluster/gce/manifests/abac-authz-policy.jsonl

    {"apiVersion": "abac.authorization.kubernetes.io/v1beta1", "kind": "Policy", "spec": {"user":"{{kube_user}}", "namespace": "*", "resource": "*", "apiGroup": "*", "nonResourcePath": "*"}}
    {"apiVersion": "abac.authorization.kubernetes.io/v1beta1", "kind": "Policy", "spec": {"user":"kubelet", "namespace": "*", "resource": "*", "apiGroup": "*", "nonResourcePath": "*"}}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Feb 01 16:39:56 UTC 2018
    - 1.3K bytes
    - Viewed (0)
  10. pkg/apis/rbac/v1alpha1/conversion.go

    		return err
    	}
    
    	// specifically set the APIGroup for the three subjects recognized in v1alpha1
    	switch {
    	case in.Kind == rbacv1alpha1.ServiceAccountKind:
    		out.APIGroup = ""
    	case in.Kind == rbacv1alpha1.UserKind:
    		out.APIGroup = GroupName
    	case in.Kind == rbacv1alpha1.GroupKind:
    		out.APIGroup = GroupName
    	default:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jun 22 18:30:51 UTC 2017
    - 2.8K bytes
    - Viewed (0)
Back to top