Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 110 for rbacv1 (0.25 sec)

  1. pkg/controller/clusterroleaggregation/clusterroleaggregation_controller.go

    	return err
    }
    
    func toApplyPolicyRules(rules []rbacv1.PolicyRule) []*rbacv1ac.PolicyRuleApplyConfiguration {
    	var result []*rbacv1ac.PolicyRuleApplyConfiguration
    	for _, rule := range rules {
    		result = append(result, toApplyPolicyRule(rule))
    	}
    	return result
    }
    
    func toApplyPolicyRule(rule rbacv1.PolicyRule) *rbacv1ac.PolicyRuleApplyConfiguration {
    	result := rbacv1ac.PolicyRule()
    	result.Resources = rule.Resources
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 8K bytes
    - Viewed (0)
  2. cmd/kubeadm/app/phases/bootstraptoken/clusterinfo/clusterinfo_test.go

    	if err != nil {
    		t.Fatalf("error creating role: %v", err)
    	}
    
    	_, err = client.RbacV1().RoleBindings(metav1.NamespacePublic).Create(context.TODO(), &rbac.RoleBinding{
    		ObjectMeta: metav1.ObjectMeta{
    			Name:      BootstrapSignerClusterRoleName,
    			Namespace: metav1.NamespacePublic,
    		},
    		RoleRef: rbac.RoleRef{
    			APIGroup: rbac.GroupName,
    			Kind:     "Role",
    			Name:     BootstrapSignerClusterRoleName,
    		},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Feb 18 11:14:32 UTC 2024
    - 5.3K bytes
    - Viewed (0)
  3. staging/src/k8s.io/api/roundtrip_test.go

    	nodev1alpha1 "k8s.io/api/node/v1alpha1"
    	nodev1beta1 "k8s.io/api/node/v1beta1"
    	policyv1 "k8s.io/api/policy/v1"
    	policyv1beta1 "k8s.io/api/policy/v1beta1"
    	rbacv1 "k8s.io/api/rbac/v1"
    	rbacv1alpha1 "k8s.io/api/rbac/v1alpha1"
    	rbacv1beta1 "k8s.io/api/rbac/v1beta1"
    	resourcev1alpha2 "k8s.io/api/resource/v1alpha2"
    	schedulingv1 "k8s.io/api/scheduling/v1"
    	schedulingv1alpha1 "k8s.io/api/scheduling/v1alpha1"
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 04:18:56 UTC 2024
    - 5.9K bytes
    - Viewed (0)
  4. manifests/charts/ztunnel/templates/rbac.yaml

      verbs: ["use"]
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: ztunnel
      labels:
        app: ztunnel
        release: {{ .Release.Name }}
        istio.io/rev: {{ .Values.revision | default "default" }}
        install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: ztunnel
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat May 04 01:17:57 UTC 2024
    - 1.3K bytes
    - Viewed (0)
  5. pilot/pkg/security/authz/model/permission.go

    	return &rbacpb.Permission{
    		Rule: &rbacpb.Permission_OrRules{
    			OrRules: &rbacpb.Permission_Set{
    				Rules: permission,
    			},
    		},
    	}
    }
    
    func permissionNot(permission *rbacpb.Permission) *rbacpb.Permission {
    	return &rbacpb.Permission{
    		Rule: &rbacpb.Permission_NotRule{
    			NotRule: permission,
    		},
    	}
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Apr 20 01:58:53 UTC 2024
    - 3K bytes
    - Viewed (0)
  6. cluster/addons/kube-network-policies/kube-network-policies-rbac.yaml

          - networkpolicies
        verbs:
          - watch
          - list
    ---
    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: kube-network-policies
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:network-policies
    subjects:
    - kind: ServiceAccount
      name: kube-network-policies
      namespace: kube-system
    ---
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Apr 21 10:01:31 UTC 2024
    - 1.1K bytes
    - Viewed (0)
  7. staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1alpha1.ClusterRole.json

    {
      "kind": "ClusterRole",
      "apiVersion": "rbac.authorization.k8s.io/v1alpha1",
      "metadata": {
        "name": "nameValue",
        "generateName": "generateNameValue",
        "namespace": "namespaceValue",
        "selfLink": "selfLinkValue",
        "uid": "uidValue",
        "resourceVersion": "resourceVersionValue",
        "generation": 7,
        "creationTimestamp": "2008-01-01T01:01:01Z",
        "deletionTimestamp": "2009-01-01T01:01:01Z",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 08:52:25 UTC 2024
    - 1.8K bytes
    - Viewed (0)
  8. staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1alpha1.Role.yaml

    apiVersion: rbac.authorization.k8s.io/v1alpha1
    kind: Role
    metadata:
      annotations:
        annotationsKey: annotationsValue
      creationTimestamp: "2008-01-01T01:01:01Z"
      deletionGracePeriodSeconds: 10
      deletionTimestamp: "2009-01-01T01:01:01Z"
      finalizers:
      - finalizersValue
      generateName: generateNameValue
      generation: 7
      labels:
        labelsKey: labelsValue
      managedFields:
      - apiVersion: apiVersionValue
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 08:52:25 UTC 2024
    - 1K bytes
    - Viewed (0)
  9. staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1beta1.Role.yaml

    apiVersion: rbac.authorization.k8s.io/v1beta1
    kind: Role
    metadata:
      annotations:
        annotationsKey: annotationsValue
      creationTimestamp: "2008-01-01T01:01:01Z"
      deletionGracePeriodSeconds: 10
      deletionTimestamp: "2009-01-01T01:01:01Z"
      finalizers:
      - finalizersValue
      generateName: generateNameValue
      generation: 7
      labels:
        labelsKey: labelsValue
      managedFields:
      - apiVersion: apiVersionValue
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 08:52:25 UTC 2024
    - 1K bytes
    - Viewed (0)
  10. staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1.Role.json

    {
      "kind": "Role",
      "apiVersion": "rbac.authorization.k8s.io/v1",
      "metadata": {
        "name": "nameValue",
        "generateName": "generateNameValue",
        "namespace": "namespaceValue",
        "selfLink": "selfLinkValue",
        "uid": "uidValue",
        "resourceVersion": "resourceVersionValue",
        "generation": 7,
        "creationTimestamp": "2008-01-01T01:01:01Z",
        "deletionTimestamp": "2009-01-01T01:01:01Z",
        "deletionGracePeriodSeconds": 10,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 08:52:25 UTC 2024
    - 1.5K bytes
    - Viewed (0)
Back to top