- Sort Score
- Result 10 results
- Languages All
Results 121 - 130 of 165 for roleRef (0.19 sec)
-
cluster/addons/rbac/cluster-autoscaler/cluster-autoscaler-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1 metadata: name: cluster-autoscaler labels: addonmanager.kubernetes.io/mode: Reconcile subjects: - kind: User name: cluster-autoscaler namespace: kube-system roleRef: kind: ClusterRole name: cluster-autoscaler
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 12 16:56:45 UTC 2020 - 2K bytes - Viewed (0) -
cmd/kubeadm/app/phases/kubelet/config.go
return apiclient.CreateOrUpdateRoleBinding(client, &rbac.RoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: kubeadmconstants.KubeletBaseConfigMapRole, Namespace: metav1.NamespaceSystem, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "Role", Name: kubeadmconstants.KubeletBaseConfigMapRole, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Feb 02 12:34:30 UTC 2024 - 5.9K bytes - Viewed (0) -
tests/integration/pilot/testdata/upgrade/1.11.0-beta.1-cni-install.yaml.tar
"create" ] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-cni labels: app: istio-cni release: istio istio.io/rev: default install.operator.istio.io/owning-resource: unknown operator.istio.io/component: "Cni" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istio-cni subjects: - kind: ServiceAccount name: istio-cni namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-cni-repair-rolebinding...
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jul 29 18:43:32 UTC 2021 - 10K bytes - Viewed (0) -
pkg/registry/rbac/clusterrole/policybased/storage_test.go
nil, []*rbacv1.ClusterRole{{ObjectMeta: metav1.ObjectMeta{Name: "alice-role"}, Rules: []rbacv1.PolicyRule{{APIGroups: []string{"*"}, Resources: []string{"*"}, Verbs: []string{"*"}}}}}, []*rbacv1.ClusterRoleBinding{{RoleRef: rbacv1.RoleRef{Name: "alice-role", APIGroup: "rbac.authorization.k8s.io", Kind: "ClusterRole"}, Subjects: []rbacv1.Subject{{Name: "alice", Kind: "User", APIGroup: "rbac.authorization.k8s.io"}}}}, ) role := &rbac.ClusterRole{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 09 13:47:19 UTC 2021 - 6.2K bytes - Viewed (0) -
cluster/addons/fluentd-gcp/event-exporter.yaml
kind: ClusterRoleBinding metadata: name: event-exporter-rb namespace: kube-system labels: k8s-app: event-exporter kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: view subjects: - kind: ServiceAccount name: event-exporter-sa namespace: kube-system --- apiVersion: apps/v1 kind: Deployment
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 13 18:40:41 UTC 2021 - 2.3K bytes - Viewed (0) -
pkg/registry/rbac/role/policybased/storage_test.go
nil, []*rbacv1.ClusterRole{{ObjectMeta: metav1.ObjectMeta{Name: "alice-role"}, Rules: []rbacv1.PolicyRule{{APIGroups: []string{"*"}, Resources: []string{"*"}, Verbs: []string{"*"}}}}}, []*rbacv1.ClusterRoleBinding{{RoleRef: rbacv1.RoleRef{Name: "alice-role", APIGroup: "rbac.authorization.k8s.io", Kind: "ClusterRole"}, Subjects: []rbacv1.Subject{{Name: "alice", Kind: "User", APIGroup: "rbac.authorization.k8s.io"}}}}, ) role := &rbac.Role{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 09 13:47:19 UTC 2021 - 6.3K bytes - Viewed (0) -
pkg/apis/rbac/fuzzer/fuzzer.go
"k8s.io/kubernetes/pkg/apis/rbac" ) // Funcs returns the fuzzer functions for the rbac api group. var Funcs = func(codecs runtimeserializer.CodecFactory) []interface{} { return []interface{}{ func(r *rbac.RoleRef, c fuzz.Continue) { c.FuzzNoCustom(r) // fuzz self without calling this function again // match defaulter if len(r.APIGroup) == 0 { r.APIGroup = rbac.GroupName } },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Aug 11 07:12:57 UTC 2017 - 1.6K bytes - Viewed (0) -
cluster/addons/node-problem-detector/npd.yaml
--- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: npd-binding labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-problem-detector subjects: - kind: ServiceAccount name: node-problem-detector namespace: kube-system --- apiVersion: apps/v1
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 30 04:14:02 UTC 2024 - 2.6K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/proxy/proxy_test.go
name: kube-proxy namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: creationTimestamp: null name: kubeadm:node-proxier roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:node-proxier subjects: - kind: ServiceAccount name: kube-proxy namespace: kube-system ---
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 8.7K bytes - Viewed (0) -
cluster/addons/dns-horizontal-autoscaler/dns-horizontal-autoscaler.yaml
metadata: name: system:kube-dns-autoscaler labels: addonmanager.kubernetes.io/mode: Reconcile subjects: - kind: ServiceAccount name: kube-dns-autoscaler namespace: kube-system roleRef: kind: ClusterRole name: system:kube-dns-autoscaler apiGroup: rbac.authorization.k8s.io --- apiVersion: apps/v1 kind: Deployment metadata: name: kube-dns-autoscaler namespace: kube-system
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 31 14:16:53 UTC 2022 - 3.3K bytes - Viewed (0)