- Sort Score
- Result 10 results
- Languages All
Results 141 - 150 of 165 for roleRef (0.15 sec)
-
operator/cmd/mesh/test-util_test.go
func checkRoleBindingsReferenceRoles(g *WithT, objs *ObjectSet) { for _, o := range objs.kind(name2.RoleBindingStr).objSlice { ou := o.Unstructured() rrname := mustGetValueAtPath(g, ou, "roleRef.name") mustGetRole(g, objs, rrname.(string)) } } // checkClusterRoleBindingsReferenceRoles fails if any RoleBinding in objs references a Role that isn't found in objs.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Oct 31 14:48:28 UTC 2023 - 15.3K bytes - Viewed (0) -
pkg/printers/internalversion/printers.go
row := metav1.TableRow{ Object: runtime.RawExtension{Object: obj}, } roleRef := fmt.Sprintf("%s/%s", obj.RoleRef.Kind, obj.RoleRef.Name) row.Cells = append(row.Cells, obj.Name, roleRef, translateTimestampSince(obj.CreationTimestamp)) if options.Wide { users, groups, sas, _ := rbac.SubjectsStrings(obj.Subjects)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jun 11 14:04:15 UTC 2024 - 128.3K bytes - Viewed (0) -
tests/integration/security/egress_sidecar_tls_origination_test.go
resources: - secrets verbs: - list ` rolebinding := ` apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: allow-list-secrets-to-{{ .ServiceAccount }} roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: allow-list-secrets subjects: - kind: ServiceAccount name: {{ .ServiceAccount }} namespace: {{ .Namespace }} `
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 08 22:02:59 UTC 2024 - 10.4K bytes - Viewed (0) -
samples/addons/prometheus.yaml
app.kubernetes.io/managed-by: Helm app.kubernetes.io/part-of: prometheus name: prometheus subjects: - kind: ServiceAccount name: prometheus namespace: istio-system roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: prometheus --- # Source: prometheus/templates/service.yaml apiVersion: v1 kind: Service metadata: labels:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 12 18:57:35 UTC 2024 - 16.2K bytes - Viewed (0) -
common/scripts/metallb-native.yaml
namespace: metallb-system roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: pod-lister subjects: - kind: ServiceAccount name: speaker namespace: metallb-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: app: metallb name: metallb-system:controller roleRef: apiGroup: rbac.authorization.k8s.io
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Feb 23 23:56:31 UTC 2024 - 63.9K bytes - Viewed (0) -
cmd/kubeadm/app/phases/kubeconfig/kubeconfig.go
crbExists bool clusterRoleBinding = &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: kubeadmconstants.ClusterAdminsGroupAndClusterRoleBinding, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: "cluster-admin", }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 07 17:04:18 UTC 2024 - 27K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
// This leaves the binding, but with an empty set of subjects, so that tightening reconciliation can remove the subject. { ObjectMeta: metav1.ObjectMeta{Name: systemNodeRoleName}, RoleRef: rbacv1.RoleRef{APIGroup: rbacv1.GroupName, Kind: "ClusterRole", Name: systemNodeRoleName}, }, } // Allow all in-cluster workloads (via their service accounts) to read the OIDC discovery endpoints.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 34.4K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/dns/dns_test.go
- discovery.k8s.io resources: - endpointslices verbs: - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: system:coredns roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:coredns subjects: - kind: ServiceAccount name: coredns namespace: kube-system --- apiVersion: v1 kind: ServiceAccount
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 11 10:21:20 UTC 2024 - 41.7K bytes - Viewed (0) -
operator/cmd/mesh/testdata/manifest-generate/output/pilot_default.golden.yaml
- delete --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: app: istio-reader release: istio name: istio-reader-clusterrole-istio-system roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istio-reader-clusterrole-istio-system subjects: - kind: ServiceAccount name: istio-reader-service-account namespace: istio-system
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 102.6K bytes - Viewed (0) -
pkg/printers/internalversion/printers_test.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jun 11 14:04:15 UTC 2024 - 218.6K bytes - Viewed (0)