Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 153 for rbacv1 (0.15 sec)

  1. pkg/controller/clusterroleaggregation/clusterroleaggregation_controller.go

    	return err
    }
    
    func toApplyPolicyRules(rules []rbacv1.PolicyRule) []*rbacv1ac.PolicyRuleApplyConfiguration {
    	var result []*rbacv1ac.PolicyRuleApplyConfiguration
    	for _, rule := range rules {
    		result = append(result, toApplyPolicyRule(rule))
    	}
    	return result
    }
    
    func toApplyPolicyRule(rule rbacv1.PolicyRule) *rbacv1ac.PolicyRuleApplyConfiguration {
    	result := rbacv1ac.PolicyRule()
    	result.Resources = rule.Resources
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 8K bytes
    - Viewed (0)
  2. pkg/controlplane/instance.go

    	eventsv1 "k8s.io/api/events/v1"
    	networkingapiv1 "k8s.io/api/networking/v1"
    	networkingapiv1alpha1 "k8s.io/api/networking/v1alpha1"
    	nodev1 "k8s.io/api/node/v1"
    	policyapiv1 "k8s.io/api/policy/v1"
    	rbacv1 "k8s.io/api/rbac/v1"
    	resourcev1alpha2 "k8s.io/api/resource/v1alpha2"
    	schedulingapiv1 "k8s.io/api/scheduling/v1"
    	storageapiv1 "k8s.io/api/storage/v1"
    	storageapiv1alpha1 "k8s.io/api/storage/v1alpha1"
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jun 03 11:50:04 UTC 2024
    - 21.2K bytes
    - Viewed (0)
  3. cmd/kubeadm/app/phases/kubeconfig/kubeconfig.go

    		crbExists          bool
    		clusterRoleBinding = &rbac.ClusterRoleBinding{
    			ObjectMeta: metav1.ObjectMeta{
    				Name: kubeadmconstants.ClusterAdminsGroupAndClusterRoleBinding,
    			},
    			RoleRef: rbac.RoleRef{
    				APIGroup: rbac.GroupName,
    				Kind:     "ClusterRole",
    				Name:     "cluster-admin",
    			},
    			Subjects: []rbac.Subject{
    				{
    					Kind: rbac.GroupKind,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Jun 07 17:04:18 UTC 2024
    - 27K bytes
    - Viewed (0)
  4. manifests/charts/ztunnel/templates/rbac.yaml

      verbs: ["use"]
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: ztunnel
      labels:
        app: ztunnel
        release: {{ .Release.Name }}
        istio.io/rev: {{ .Values.revision | default "default" }}
        install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: ztunnel
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat May 04 01:17:57 UTC 2024
    - 1.3K bytes
    - Viewed (0)
  5. pilot/pkg/security/authz/model/permission.go

    	return &rbacpb.Permission{
    		Rule: &rbacpb.Permission_OrRules{
    			OrRules: &rbacpb.Permission_Set{
    				Rules: permission,
    			},
    		},
    	}
    }
    
    func permissionNot(permission *rbacpb.Permission) *rbacpb.Permission {
    	return &rbacpb.Permission{
    		Rule: &rbacpb.Permission_NotRule{
    			NotRule: permission,
    		},
    	}
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Apr 20 01:58:53 UTC 2024
    - 3K bytes
    - Viewed (0)
  6. pilot/pkg/networking/grpcgen/lds.go

    //
    // nolint: unparam
    func buildRBAC(node *model.Proxy, push *model.PushContext, suffix string, context *tls.DownstreamTlsContext,
    	a rbacpb.RBAC_Action, policies []model.AuthorizationPolicy,
    ) *rbacpb.RBAC {
    	rules := &rbacpb.RBAC{
    		Action:   a,
    		Policies: map[string]*rbacpb.Policy{},
    	}
    	for _, policy := range policies {
    		for i, rule := range policy.Spec.Rules {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 14.6K bytes
    - Viewed (0)
  7. cluster/addons/kube-network-policies/kube-network-policies-rbac.yaml

          - networkpolicies
        verbs:
          - watch
          - list
    ---
    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: kube-network-policies
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:network-policies
    subjects:
    - kind: ServiceAccount
      name: kube-network-policies
      namespace: kube-system
    ---
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Apr 21 10:01:31 UTC 2024
    - 1.1K bytes
    - Viewed (0)
  8. pilot/pkg/security/authz/model/generator.go

    type generator interface {
    	permission(key, value string, forTCP bool) (*rbacpb.Permission, error)
    	principal(key, value string, forTCP bool, useAuthenticated bool) (*rbacpb.Principal, error)
    }
    
    type extendedGenerator interface {
    	extendedPermission(key string, value []string, forTCP bool) (*rbacpb.Permission, error)
    	extendedPrincipal(key string, value []string, forTCP bool) (*rbacpb.Principal, error)
    }
    
    type destIPGenerator struct{}
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri May 03 18:02:42 UTC 2024
    - 14.1K bytes
    - Viewed (0)
  9. pilot/pkg/security/authz/model/generator_test.go

    			}
    		})
    	}
    }
    
    func yamlPermission(t *testing.T, yaml string) *rbacpb.Permission {
    	t.Helper()
    	p := &rbacpb.Permission{}
    	if err := protomarshal.ApplyYAML(yaml, p); err != nil {
    		t.Fatalf("failed to parse yaml: %s", err)
    	}
    	return p
    }
    
    func yamlPrincipal(t *testing.T, yaml string) *rbacpb.Principal {
    	t.Helper()
    	p := &rbacpb.Principal{}
    	if err := protomarshal.ApplyYAML(yaml, p); err != nil {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Apr 20 01:58:53 UTC 2024
    - 13K bytes
    - Viewed (0)
  10. staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1alpha1.ClusterRole.json

    {
      "kind": "ClusterRole",
      "apiVersion": "rbac.authorization.k8s.io/v1alpha1",
      "metadata": {
        "name": "nameValue",
        "generateName": "generateNameValue",
        "namespace": "namespaceValue",
        "selfLink": "selfLinkValue",
        "uid": "uidValue",
        "resourceVersion": "resourceVersionValue",
        "generation": 7,
        "creationTimestamp": "2008-01-01T01:01:01Z",
        "deletionTimestamp": "2009-01-01T01:01:01Z",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 08:52:25 UTC 2024
    - 1.8K bytes
    - Viewed (0)
Back to top