Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 13 for sas (0.05 sec)

  1. src/syscall/route_bsd.go

    	if m.Header.Addrs&RTA_IFP == 0 {
    		return nil, nil
    	}
    	sa, err := parseSockaddrLink(m.Data[:])
    	if err != nil {
    		return nil, err
    	}
    	sas[RTAX_IFP] = sa
    	return sas[:], nil
    }
    
    // InterfaceAddrMessage represents a routing message containing
    // network interface address entries.
    //
    // Deprecated: Use golang.org/x/net/route instead.
    type InterfaceAddrMessage struct {
    	Header IfaMsghdr
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Feb 26 21:03:59 UTC 2024
    - 9.1K bytes
    - Viewed (0)
  2. pkg/apis/rbac/v1/helpers.go

    		r.RoleBinding.Subjects = append(r.RoleBinding.Subjects, rbacv1.Subject{Kind: rbacv1.UserKind, APIGroup: GroupName, Name: user})
    	}
    	return r
    }
    
    // SAs adds the specified service accounts as the subjects of the
    // RoleBinding.
    func (r *RoleBindingBuilder) SAs(namespace string, serviceAccountNames ...string) *RoleBindingBuilder {
    	for _, saName := range serviceAccountNames {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 18 15:37:57 UTC 2023
    - 7.4K bytes
    - Viewed (0)
  3. pkg/apis/rbac/helpers_test.go

    func TestHelpersRoundTrip(t *testing.T) {
    	rb := rbac.NewRoleBinding("role", "ns").Groups("g").SAs("ns", "sa").Users("u").BindingOrDie()
    	rbcr := rbac.NewRoleBindingForClusterRole("role", "ns").Groups("g").SAs("ns", "sa").Users("u").BindingOrDie()
    	crb := rbac.NewClusterBinding("role").Groups("g").SAs("ns", "sa").Users("u").BindingOrDie()
    
    	role := &rbac.Role{
    		Rules: []rbac.PolicyRule{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:46:12 UTC 2023
    - 9.2K bytes
    - Viewed (0)
  4. pkg/apis/rbac/v1alpha1/helpers.go

    	for _, user := range users {
    		r.ClusterRoleBinding.Subjects = append(r.ClusterRoleBinding.Subjects, rbacv1alpha1.Subject{Kind: rbacv1alpha1.UserKind, Name: user})
    	}
    	return r
    }
    
    func (r *ClusterRoleBindingBuilder) SAs(namespace string, serviceAccountNames ...string) *ClusterRoleBindingBuilder {
    	for _, saName := range serviceAccountNames {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 18 15:37:57 UTC 2023
    - 4.4K bytes
    - Viewed (0)
  5. pkg/apis/rbac/v1beta1/helpers.go

    	for _, user := range users {
    		r.ClusterRoleBinding.Subjects = append(r.ClusterRoleBinding.Subjects, rbacv1beta1.Subject{Kind: rbacv1beta1.UserKind, Name: user})
    	}
    	return r
    }
    
    func (r *ClusterRoleBindingBuilder) SAs(namespace string, serviceAccountNames ...string) *ClusterRoleBindingBuilder {
    	for _, saName := range serviceAccountNames {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 18 15:37:57 UTC 2023
    - 4.4K bytes
    - Viewed (0)
  6. fess-crawler/src/main/resources/org/codelibs/fess/crawler/mime/tika-mimetypes.xml

      <mime-type type="application/x-sas-audit">
        <_comment>SAS Audit</_comment>
        <glob pattern="*.st7"/>
        <glob pattern="*.sas7baud"/>
      </mime-type>
      <mime-type type="application/x-sas-data-v6">
        <_comment>SAS v6 Data Set</_comment>
        <glob pattern="*.sd2"/>
        <magic priority="40">
          <match value="SAS     6." type="string" offset="0" />
          <match value="SAS     7." type="string" offset="0" />
    Registered: Wed Jun 12 15:17:51 UTC 2024
    - Last Modified: Thu Sep 21 06:46:43 UTC 2023
    - 298.5K bytes
    - Viewed (0)
  7. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go

    	// This includes the issuer URL, which is already present in the SA token JWT.  Similarly, SAs can
    	// already gain this same info via introspection of their own token.  Since this discovery endpoint
    	// points to what issued all service account tokens, it seems fitting for SAs to have this access.
    	// Defer to the cluster admin with regard to binding directly to all authenticated and/or
    	// unauthenticated users.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 34.4K bytes
    - Viewed (0)
  8. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go

    		}
    	}
    
    	*controllerRoles = append(*controllerRoles, role)
    	addClusterRoleLabel(*controllerRoles)
    
    	*controllerRoleBindings = append(*controllerRoleBindings,
    		rbacv1helpers.NewClusterBinding(role.Name).SAs("kube-system", role.Name[len(saRolePrefix):]).BindingOrDie())
    	addClusterRoleBindingLabel(*controllerRoleBindings)
    }
    
    func eventsRule() rbacv1.PolicyRule {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 28.9K bytes
    - Viewed (0)
  9. pkg/printers/internalversion/printers.go

    	row.Cells = append(row.Cells, obj.Name, roleRef, translateTimestampSince(obj.CreationTimestamp))
    	if options.Wide {
    		users, groups, sas, _ := rbac.SubjectsStrings(obj.Subjects)
    		row.Cells = append(row.Cells, strings.Join(users, ", "), strings.Join(groups, ", "), strings.Join(sas, ", "))
    	}
    	return []metav1.TableRow{row}, nil
    }
    
    // Prints the RoleBinding in a human-friendly format.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jun 11 14:04:15 UTC 2024
    - 128.3K bytes
    - Viewed (0)
  10. okhttp/src/test/resources/okhttp3/internal/publicsuffix/public_suffix_list.dat

    sandvikcoromant
    
    // sanofi : 2014-10-09 Sanofi
    sanofi
    
    // sap : 2014-03-27 SAP AG
    sap
    
    // sarl : 2014-07-03 Binky Moon, LLC
    sarl
    
    // sas : 2015-04-02 Research IP LLC
    sas
    
    // save : 2015-06-25 Amazon Registry Services, Inc.
    save
    
    // saxo : 2014-10-31 Saxo Bank A/S
    saxo
    
    // sbi : 2015-03-12 STATE BANK OF INDIA
    sbi
    
    Registered: Sun Jun 16 04:42:17 UTC 2024
    - Last Modified: Wed Dec 20 23:27:07 UTC 2023
    - 240.3K bytes
    - Viewed (0)
Back to top