Search Options

Results per page
Sort
Preferred Languages
Advance

Results 121 - 130 of 597 for rbacv1 (0.15 sec)

  1. staging/src/k8s.io/api/testdata/v1.29.0/rbac.authorization.k8s.io.v1beta1.RoleBinding.json

    {
      "kind": "RoleBinding",
      "apiVersion": "rbac.authorization.k8s.io/v1beta1",
      "metadata": {
        "name": "nameValue",
        "generateName": "generateNameValue",
        "namespace": "namespaceValue",
        "selfLink": "selfLinkValue",
        "uid": "uidValue",
        "resourceVersion": "resourceVersionValue",
        "generation": 7,
        "creationTimestamp": "2008-01-01T01:01:01Z",
        "deletionTimestamp": "2009-01-01T01:01:01Z",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Dec 15 04:12:07 UTC 2023
    - 1.4K bytes
    - Viewed (0)
  2. staging/src/k8s.io/api/testdata/HEAD/rbac.authorization.k8s.io.v1.RoleBinding.json

    {
      "kind": "RoleBinding",
      "apiVersion": "rbac.authorization.k8s.io/v1",
      "metadata": {
        "name": "nameValue",
        "generateName": "generateNameValue",
        "namespace": "namespaceValue",
        "selfLink": "selfLinkValue",
        "uid": "uidValue",
        "resourceVersion": "resourceVersionValue",
        "generation": 7,
        "creationTimestamp": "2008-01-01T01:01:01Z",
        "deletionTimestamp": "2009-01-01T01:01:01Z",
        "deletionGracePeriodSeconds": 10,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri May 06 21:25:20 UTC 2022
    - 1.4K bytes
    - Viewed (0)
  3. staging/src/k8s.io/api/testdata/HEAD/rbac.authorization.k8s.io.v1beta1.ClusterRoleBinding.json

    {
      "kind": "ClusterRoleBinding",
      "apiVersion": "rbac.authorization.k8s.io/v1beta1",
      "metadata": {
        "name": "nameValue",
        "generateName": "generateNameValue",
        "namespace": "namespaceValue",
        "selfLink": "selfLinkValue",
        "uid": "uidValue",
        "resourceVersion": "resourceVersionValue",
        "generation": 7,
        "creationTimestamp": "2008-01-01T01:01:01Z",
        "deletionTimestamp": "2009-01-01T01:01:01Z",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri May 06 21:25:20 UTC 2022
    - 1.4K bytes
    - Viewed (0)
  4. staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1alpha1.ClusterRole.yaml

    aggregationRule:
      clusterRoleSelectors:
      - matchExpressions:
        - key: keyValue
          operator: operatorValue
          values:
          - valuesValue
        matchLabels:
          matchLabelsKey: matchLabelsValue
    apiVersion: rbac.authorization.k8s.io/v1alpha1
    kind: ClusterRole
    metadata:
      annotations:
        annotationsKey: annotationsValue
      creationTimestamp: "2008-01-01T01:01:01Z"
      deletionGracePeriodSeconds: 10
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 08:52:25 UTC 2024
    - 1.2K bytes
    - Viewed (0)
  5. staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1beta1.ClusterRole.yaml

    aggregationRule:
      clusterRoleSelectors:
      - matchExpressions:
        - key: keyValue
          operator: operatorValue
          values:
          - valuesValue
        matchLabels:
          matchLabelsKey: matchLabelsValue
    apiVersion: rbac.authorization.k8s.io/v1beta1
    kind: ClusterRole
    metadata:
      annotations:
        annotationsKey: annotationsValue
      creationTimestamp: "2008-01-01T01:01:01Z"
      deletionGracePeriodSeconds: 10
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 08:52:25 UTC 2024
    - 1.2K bytes
    - Viewed (0)
  6. staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1.ClusterRole.yaml

    aggregationRule:
      clusterRoleSelectors:
      - matchExpressions:
        - key: keyValue
          operator: operatorValue
          values:
          - valuesValue
        matchLabels:
          matchLabelsKey: matchLabelsValue
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      annotations:
        annotationsKey: annotationsValue
      creationTimestamp: "2008-01-01T01:01:01Z"
      deletionGracePeriodSeconds: 10
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 08:52:25 UTC 2024
    - 1.2K bytes
    - Viewed (0)
  7. staging/src/k8s.io/api/testdata/HEAD/rbac.authorization.k8s.io.v1.ClusterRole.json

    {
      "kind": "ClusterRole",
      "apiVersion": "rbac.authorization.k8s.io/v1",
      "metadata": {
        "name": "nameValue",
        "generateName": "generateNameValue",
        "namespace": "namespaceValue",
        "selfLink": "selfLinkValue",
        "uid": "uidValue",
        "resourceVersion": "resourceVersionValue",
        "generation": 7,
        "creationTimestamp": "2008-01-01T01:01:01Z",
        "deletionTimestamp": "2009-01-01T01:01:01Z",
        "deletionGracePeriodSeconds": 10,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri May 06 21:25:20 UTC 2022
    - 1.8K bytes
    - Viewed (0)
  8. test/chan/select7.go

    func send3(recv func(<-chan int)) {
    	c := make(chan int)
    	go recv(c)
    	runtime.Gosched()
    	c2 := make(chan int)
    	select {
    	case c <- 1:
    	case c2 <- 1:
    	}
    }
    
    func main() {
    	send1(recv1)
    	send2(recv1)
    	send3(recv1)
    	send1(recv2)
    	send2(recv2)
    	send3(recv2)
    	send1(recv3)
    	send2(recv3)
    	send3(recv3)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 02 13:43:18 UTC 2016
    - 932 bytes
    - Viewed (0)
  9. test/struct0.go

    func recv(c chan interface{}) struct{} {
    	return (<-c).(struct{})
    }
    
    var m = make(map[interface{}]int)
    
    func recv1(c chan interface{}) {
    	defer rec()
    	m[(<-c).(struct{})] = 0
    }
    
    func rec() {
    	recover()
    }
    
    func main() {
    	c := make(chan interface{})
    	go recv(c)
    	c <- struct{}{}
    	go recv1(c)
    	c <- struct{}{}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 02 13:43:18 UTC 2016
    - 565 bytes
    - Viewed (0)
  10. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml

    apiVersion: v1
    items:
    - apiVersion: rbac.authorization.k8s.io/v1
      kind: ClusterRoleBinding
      metadata:
        annotations:
          rbac.authorization.kubernetes.io/autoupdate: "true"
        creationTimestamp: null
        labels:
          kubernetes.io/bootstrapping: rbac-defaults
        name: cluster-admin
      roleRef:
        apiGroup: rbac.authorization.k8s.io
        kind: ClusterRole
        name: cluster-admin
      subjects:
      - apiGroup: rbac.authorization.k8s.io
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Sep 11 19:01:47 UTC 2020
    - 5.7K bytes
    - Viewed (0)
Back to top