- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 13 for sas (0.05 sec)
-
src/syscall/route_bsd.go
if m.Header.Addrs&RTA_IFP == 0 { return nil, nil } sa, err := parseSockaddrLink(m.Data[:]) if err != nil { return nil, err } sas[RTAX_IFP] = sa return sas[:], nil } // InterfaceAddrMessage represents a routing message containing // network interface address entries. // // Deprecated: Use golang.org/x/net/route instead. type InterfaceAddrMessage struct { Header IfaMsghdr
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Feb 26 21:03:59 UTC 2024 - 9.1K bytes - Viewed (0) -
pkg/apis/rbac/v1/helpers.go
r.RoleBinding.Subjects = append(r.RoleBinding.Subjects, rbacv1.Subject{Kind: rbacv1.UserKind, APIGroup: GroupName, Name: user}) } return r } // SAs adds the specified service accounts as the subjects of the // RoleBinding. func (r *RoleBindingBuilder) SAs(namespace string, serviceAccountNames ...string) *RoleBindingBuilder { for _, saName := range serviceAccountNames {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 7.4K bytes - Viewed (0) -
pkg/apis/rbac/helpers_test.go
func TestHelpersRoundTrip(t *testing.T) { rb := rbac.NewRoleBinding("role", "ns").Groups("g").SAs("ns", "sa").Users("u").BindingOrDie() rbcr := rbac.NewRoleBindingForClusterRole("role", "ns").Groups("g").SAs("ns", "sa").Users("u").BindingOrDie() crb := rbac.NewClusterBinding("role").Groups("g").SAs("ns", "sa").Users("u").BindingOrDie() role := &rbac.Role{ Rules: []rbac.PolicyRule{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 9.2K bytes - Viewed (0) -
pkg/apis/rbac/v1alpha1/helpers.go
for _, user := range users { r.ClusterRoleBinding.Subjects = append(r.ClusterRoleBinding.Subjects, rbacv1alpha1.Subject{Kind: rbacv1alpha1.UserKind, Name: user}) } return r } func (r *ClusterRoleBindingBuilder) SAs(namespace string, serviceAccountNames ...string) *ClusterRoleBindingBuilder { for _, saName := range serviceAccountNames {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 4.4K bytes - Viewed (0) -
pkg/apis/rbac/v1beta1/helpers.go
for _, user := range users { r.ClusterRoleBinding.Subjects = append(r.ClusterRoleBinding.Subjects, rbacv1beta1.Subject{Kind: rbacv1beta1.UserKind, Name: user}) } return r } func (r *ClusterRoleBindingBuilder) SAs(namespace string, serviceAccountNames ...string) *ClusterRoleBindingBuilder { for _, saName := range serviceAccountNames {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 4.4K bytes - Viewed (0) -
fess-crawler/src/main/resources/org/codelibs/fess/crawler/mime/tika-mimetypes.xml
<mime-type type="application/x-sas-audit"> <_comment>SAS Audit</_comment> <glob pattern="*.st7"/> <glob pattern="*.sas7baud"/> </mime-type> <mime-type type="application/x-sas-data-v6"> <_comment>SAS v6 Data Set</_comment> <glob pattern="*.sd2"/> <magic priority="40"> <match value="SAS 6." type="string" offset="0" /> <match value="SAS 7." type="string" offset="0" />
Registered: Wed Jun 12 15:17:51 UTC 2024 - Last Modified: Thu Sep 21 06:46:43 UTC 2023 - 298.5K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
// This includes the issuer URL, which is already present in the SA token JWT. Similarly, SAs can // already gain this same info via introspection of their own token. Since this discovery endpoint // points to what issued all service account tokens, it seems fitting for SAs to have this access. // Defer to the cluster admin with regard to binding directly to all authenticated and/or // unauthenticated users.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 34.4K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go
} } *controllerRoles = append(*controllerRoles, role) addClusterRoleLabel(*controllerRoles) *controllerRoleBindings = append(*controllerRoleBindings, rbacv1helpers.NewClusterBinding(role.Name).SAs("kube-system", role.Name[len(saRolePrefix):]).BindingOrDie()) addClusterRoleBindingLabel(*controllerRoleBindings) } func eventsRule() rbacv1.PolicyRule {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 28.9K bytes - Viewed (0) -
pkg/printers/internalversion/printers.go
row.Cells = append(row.Cells, obj.Name, roleRef, translateTimestampSince(obj.CreationTimestamp)) if options.Wide { users, groups, sas, _ := rbac.SubjectsStrings(obj.Subjects) row.Cells = append(row.Cells, strings.Join(users, ", "), strings.Join(groups, ", "), strings.Join(sas, ", ")) } return []metav1.TableRow{row}, nil } // Prints the RoleBinding in a human-friendly format.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jun 11 14:04:15 UTC 2024 - 128.3K bytes - Viewed (0) -
okhttp/src/test/resources/okhttp3/internal/publicsuffix/public_suffix_list.dat
sandvikcoromant // sanofi : 2014-10-09 Sanofi sanofi // sap : 2014-03-27 SAP AG sap // sarl : 2014-07-03 Binky Moon, LLC sarl // sas : 2015-04-02 Research IP LLC sas // save : 2015-06-25 Amazon Registry Services, Inc. save // saxo : 2014-10-31 Saxo Bank A/S saxo // sbi : 2015-03-12 STATE BANK OF INDIA sbi
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Wed Dec 20 23:27:07 UTC 2023 - 240.3K bytes - Viewed (0)