- Sort Score
- Result 10 results
- Languages All
Results 111 - 120 of 227 for RoleBinding (0.21 sec)
-
tests/integration/pilot/testdata/upgrade/1.11.0-beta.1-cni-install.yaml.tar
apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istio-cni subjects: - kind: ServiceAccount name: istio-cni namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-cni-repair-rolebinding labels: k8s-app: istio-cni-repair istio.io/rev: default install.operator.istio.io/owning-resource: unknown operator.istio.io/component: "Cni" subjects: - kind: ServiceAccount name: istio-cni namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io...
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jul 29 18:43:32 UTC 2021 - 10K bytes - Viewed (0) -
api/discovery/aggregated_v2.json
{ "resource": "rolebindings", "responseKind": { "group": "", "kind": "RoleBinding", "version": "" }, "scope": "Namespaced", "singularResource": "rolebinding", "verbs": [ "create", "delete", "deletecollection",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Mar 12 17:29:14 UTC 2024 - 55.4K bytes - Viewed (0) -
operator/cmd/mesh/test-util_test.go
out["name"] = name } if port != -1 { out["port"] = port } if targetPort != -1 { out["targetPort"] = targetPort } return out } // checkRoleBindingsReferenceRoles fails if any RoleBinding in objs references a Role that isn't found in objs. func checkRoleBindingsReferenceRoles(g *WithT, objs *ObjectSet) { for _, o := range objs.kind(name2.RoleBindingStr).objSlice { ou := o.Unstructured()
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Oct 31 14:48:28 UTC 2023 - 15.3K bytes - Viewed (0) -
api/discovery/aggregated_v2beta1.json
{ "resource": "rolebindings", "responseKind": { "group": "", "kind": "RoleBinding", "version": "" }, "scope": "Namespaced", "singularResource": "rolebinding", "verbs": [ "create", "delete", "deletecollection",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 04:18:56 UTC 2024 - 55.4K bytes - Viewed (0) -
pkg/registry/rbac/validation/rule_test.go
Rules: []rbacv1.PolicyRule{ruleAdmin}, }, { ObjectMeta: metav1.ObjectMeta{Name: "write-nodes"}, Rules: []rbacv1.PolicyRule{ruleWriteNodes}, }, }, roleBindings: []*rbacv1.RoleBinding{ { ObjectMeta: metav1.ObjectMeta{Namespace: "namespace1"}, Subjects: []rbacv1.Subject{ {Kind: rbacv1.UserKind, Name: "foobar"}, {Kind: rbacv1.GroupKind, Name: "group1"}, },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 7.9K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/proxy/proxy.go
Verbs: []string{"get"}, APIGroups: []string{""}, Resources: []string{"configmaps"}, ResourceNames: []string{constants.KubeProxyConfigMap}, }, }, } rb := &rbac.RoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: KubeProxyConfigMapRoleName, Namespace: metav1.NamespaceSystem, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "Role",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 26 13:23:44 UTC 2023 - 8.1K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/rbac.go
return g.Lister.Roles(namespace).Get(name) } type RoleBindingLister struct { Lister rbaclisters.RoleBindingLister } func (l *RoleBindingLister) ListRoleBindings(namespace string) ([]*rbacv1.RoleBinding, error) { return l.Lister.RoleBindings(namespace).List(labels.Everything()) } type ClusterRoleGetter struct { Lister rbaclisters.ClusterRoleLister }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 24 10:13:50 UTC 2022 - 7.8K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/proxy/proxy_test.go
namespace: kube-system rules: - apiGroups: - "" resourceNames: - kube-proxy resources: - configmaps verbs: - get --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: creationTimestamp: null name: kube-proxy namespace: kube-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: kube-proxy subjects: - kind: Group
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 8.7K bytes - Viewed (0) -
samples/security/spire/spire-quickstart.yaml
- apiGroups: [""] resources: ["configmaps"] resourceNames: ["spire-bundle"] verbs: ["get", "patch"] --- # RoleBinding granting the spire-server-role to the SPIRE server # service account. kind: RoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: spire-server-role-binding namespace: spire subjects: - kind: ServiceAccount name: spire-server
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Oct 12 16:12:42 UTC 2023 - 32.2K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go
switch { case errors.IsNotFound(err): // ignore, authConfigMap is nil now return nil case errors.IsForbidden(err): klog.Warningf("Unable to get configmap/%s in %s. Usually fixed by "+ "'kubectl create rolebinding -n %s ROLEBINDING_NAME --role=%s --serviceaccount=YOUR_NS:YOUR_SA'", c.configmapName, c.configmapNamespace, c.configmapNamespace, authenticationRoleName) return err case err != nil: return err }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 10.9K bytes - Viewed (0)