- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 510 for apiGroup (0.13 sec)
-
pkg/apis/abac/v0/conversion_test.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Oct 30 18:54:02 UTC 2017 - 3.4K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/namespace-role-bindings.yaml
name: system::extension-apiserver-authentication-reader namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: extension-apiserver-authentication-reader subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: system:kube-controller-manager - apiGroup: rbac.authorization.k8s.io kind: User name: system:kube-scheduler
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Feb 08 16:15:52 UTC 2019 - 3.9K bytes - Viewed (0) -
pkg/api/persistentvolumeclaim/util.go
func dataSourceIsPvcOrSnapshot(dataSource *core.TypedLocalObjectReference) bool { if dataSource != nil { apiGroup := "" if dataSource.APIGroup != nil { apiGroup = *dataSource.APIGroup } if dataSource.Kind == pvc && apiGroup == "" { return true } if dataSource.Kind == volumeSnapshot && apiGroup == "snapshot.storage.k8s.io" { return true } } return false }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Oct 31 03:18:56 UTC 2023 - 8.3K bytes - Viewed (0) -
cluster/addons/cloud-controller-manager/cloud-node-controller-binding.yaml
kind: ClusterRoleBinding metadata: labels: addonmanager.kubernetes.io/mode: Reconcile name: system:cloud-controller-manager roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:cloud-controller-manager subjects: - kind: User apiGroup: rbac.authorization.k8s.io name: system:cloud-controller-manager --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 03 17:38:23 UTC 2022 - 1.2K bytes - Viewed (0) -
samples/security/psp/sidecar-psp.yaml
metadata: name: istio-sidecar-psp rules: - apiGroups: - extensions resources: - podsecuritypolicies resourceNames: - istio-sidecar verbs: - use --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-sidecar-psp roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istio-sidecar-psp
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 27 17:55:37 UTC 2023 - 881 bytes - Viewed (0) -
pkg/apis/abac/v1beta1/types.go
// +optional Readonly bool `json:"readonly,omitempty"` // APIGroup is the name of an API group. APIGroup, Resource, and Namespace are required to match resource requests. // "*" matches all API groups // +optional APIGroup string `json:"apiGroup,omitempty"` // Resource is the name of a resource. APIGroup, Resource, and Namespace are required to match resource requests. // "*" matches all resources
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Oct 18 16:05:04 UTC 2018 - 2.3K bytes - Viewed (0) -
pkg/registry/rbac/escalation_check.go
// Invalid APIGroup or Name values will fail validation switch roleRef.Kind { case "ClusterRole": attrs.APIGroup = roleRef.APIGroup attrs.APIVersion = "*" attrs.Resource = "clusterroles" attrs.Name = roleRef.Name case "Role": attrs.APIGroup = roleRef.APIGroup attrs.APIVersion = "*" attrs.Resource = "roles" attrs.Name = roleRef.Name
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 4.3K bytes - Viewed (0) -
pkg/apis/rbac/fuzzer/fuzzer.go
// match defaulter if len(r.APIGroup) == 0 { r.APIGroup = rbac.GroupName } }, func(r *rbac.Subject, c fuzz.Continue) { switch c.Int31n(3) { case 0: r.Kind = rbac.ServiceAccountKind r.APIGroup = "" c.FuzzNoCustom(&r.Name) c.FuzzNoCustom(&r.Namespace) case 1: r.Kind = rbac.UserKind r.APIGroup = rbac.GroupName c.FuzzNoCustom(&r.Name)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Aug 11 07:12:57 UTC 2017 - 1.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/endpoints/discovery/root_test.go
// Register three groups handler.AddGroup(metav1.APIGroup{Name: "x"}) handler.AddGroup(metav1.APIGroup{Name: "y"}) handler.AddGroup(metav1.APIGroup{Name: "z"}) // Register three additional groups that come earlier alphabetically handler.AddGroup(metav1.APIGroup{Name: "a"}) handler.AddGroup(metav1.APIGroup{Name: "b"}) handler.AddGroup(metav1.APIGroup{Name: "c"})
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 08 22:33:50 UTC 2018 - 6K bytes - Viewed (0) -
api/openapi-spec/v3/apis__networking.k8s.io_openapi.json
{ "components": { "schemas": { "io.k8s.apimachinery.pkg.apis.meta.v1.APIGroup": { "description": "APIGroup contains the name, the supported versions, and the preferred version of a group.", "properties": { "apiVersion": {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 27 20:05:52 UTC 2023 - 6.2K bytes - Viewed (0)