- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 50 for authorization (0.16 sec)
-
manifests/charts/istio-control/istio-discovery/templates/clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} subjects:
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Sun Oct 10 17:32:44 GMT 2021 - 1.3K bytes - Viewed (0) -
common-protos/k8s.io/api/authorization/v1beta1/generated.proto
syntax = "proto2"; package k8s.io.api.authorization.v1beta1; import "k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto"; import "k8s.io/apimachinery/pkg/runtime/generated.proto"; import "k8s.io/apimachinery/pkg/runtime/schema/generated.proto"; // Package-wide variables from generator "generated". option go_package = "k8s.io/api/authorization/v1beta1"; // ExtraValue masks the value so protobuf can generate
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 11.9K bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/templates/rolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: istiod{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }} namespace: {{ .Values.global.istioNamespace }} labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: istiod{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }} subjects: - kind: ServiceAccount
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Jun 09 22:42:56 GMT 2021 - 581 bytes - Viewed (0) -
manifests/charts/gateway/templates/role.yaml
--- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: {{ include "gateway.serviceAccountName" . }} namespace: {{ .Release.Namespace }} labels: {{- include "gateway.labels" . | nindent 4}} annotations: {{- .Values.annotations | toYaml | nindent 4 }} roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: {{ include "gateway.serviceAccountName" . }} subjects:
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Feb 21 16:58:32 GMT 2023 - 963 bytes - Viewed (0) -
common-protos/k8s.io/api/authorization/v1/generated.proto
syntax = "proto2"; package k8s.io.api.authorization.v1; import "k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto"; import "k8s.io/apimachinery/pkg/runtime/generated.proto"; import "k8s.io/apimachinery/pkg/runtime/schema/generated.proto"; // Package-wide variables from generator "generated". option go_package = "k8s.io/api/authorization/v1"; // ExtraValue masks the value so protobuf can generate
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 11.9K bytes - Viewed (0) -
istioctl/pkg/xds/google.go
ret := map[string]string{ "x-goog-user-project": c.project, } if err := updateAuthHdrs(ctx, uri, "k8s", c.k8sCreds, ret, "x-mesh-authorization"); err != nil { return nil, err } if err := updateAuthHdrs(ctx, uri, "gcp", c.gcpCreds, ret, "authorization"); err != nil { return nil, err } return ret, nil } func (*meshAuthCredentials) RequireTransportSecurity() bool { return true }
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Nov 14 20:23:34 GMT 2022 - 3.4K bytes - Viewed (0) -
architecture/ambient/peer-authentication.md
of ztunnel is to be a minimal L4 proxy, and as such, its xDS configuration is purposefully limited. In particular, ztunnel only supports 2 (custom) xDS resources: [`Workload`](../../pkg/workloadapi/workload.proto) and [`Authorization`](../../pkg/workloadapi/security/authorization.proto). As such, ztunnel does not receive `PeerAuthentication`s directly; when istiod detects a `PeerAuthentication` resource that targets an Ambient captured workload, it computes the effective policy for that workload...
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Aug 09 22:09:18 GMT 2023 - 3.9K bytes - Viewed (0) -
manifests/charts/istiod-remote/templates/clusterrolebinding.yaml
{{- if .Values.global.configCluster }} apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Sun Oct 10 17:32:44 GMT 2021 - 1.4K bytes - Viewed (0) -
manifests/charts/istio-operator/templates/clusterrole_binding.yaml
kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: istio-operator{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }} subjects: - kind: ServiceAccount name: istio-operator{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }} namespace: {{.Release.Namespace}} roleRef: kind: ClusterRole name: istio-operator{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Jul 28 18:55:36 GMT 2021 - 498 bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1alpha1/generated.proto
} // ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding. // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRole, and will no longer be served in v1.22. message ClusterRole { // Standard object's metadata. // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 8.5K bytes - Viewed (0)