Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for NewRule (0.1 sec)

  1. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go

    			Rules: []rbacv1.PolicyRule{
    				rbacv1helpers.NewRule("list", "watch").Groups(legacyGroup).Resources("persistentvolumes", "persistentvolumeclaims").RuleOrDie(),
    				rbacv1helpers.NewRule("get", "list", "watch").Groups(legacyGroup).Resources("nodes").RuleOrDie(),
    				rbacv1helpers.NewRule("patch", "update").Groups(legacyGroup).Resources("nodes/status").RuleOrDie(),
    				rbacv1helpers.NewRule("list", "watch").Groups(legacyGroup).Resources("pods").RuleOrDie(),
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 28.9K bytes
    - Viewed (0)
  2. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go

    				rbacv1helpers.NewRule("create").Groups(coordinationGroup).Resources("leases").RuleOrDie(),
    				rbacv1helpers.NewRule("get", "update").Groups(coordinationGroup).Resources("leases").Names("kube-controller-manager").RuleOrDie(),
    				// Fundamental resources.
    				rbacv1helpers.NewRule("create").Groups(legacyGroup).Resources("secrets", "serviceaccounts").RuleOrDie(),
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 34.4K bytes
    - Viewed (0)
  3. cni/pkg/iptables/iptables_linux.go

    		// A very similar mechanism is used for sidecar TPROXY.
    		//
    		// TODO largely identical/copied from tools/istio-iptables/pkg/capture/run_linux.go
    		inpodMarkRule := netlink.NewRule()
    		inpodMarkRule.Family = family
    		inpodMarkRule.Table = RouteTableInbound
    		inpodMarkRule.Mark = InpodTProxyMark
    		inpodMarkRule.Mask = InpodTProxyMask
    		inpodMarkRule.Priority = 32764
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Apr 30 22:24:38 UTC 2024
    - 3.3K bytes
    - Viewed (0)
  4. tools/istio-iptables/pkg/capture/run_linux.go

    			families := []int{unix.AF_INET}
    			if cfg.EnableIPv6 {
    				families = append(families, unix.AF_INET6)
    			}
    			for _, family := range families {
    				r := netlink.NewRule()
    				r.Family = family
    				r.Table = tproxyTable
    				r.Mark = tproxyMark
    				if err := netlink.RuleAdd(r); err != nil {
    					return fmt.Errorf("failed to configure netlink rule: %v", err)
    				}
    			}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Apr 30 22:24:38 UTC 2024
    - 3.1K bytes
    - Viewed (0)
Back to top