- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 12 for Cole (0.14 sec)
-
manifests/charts/gateway/templates/role.yaml
{{/*Set up roles for Istio Gateway. Not required for gateway-api*/}} {{- if .Values.rbac.enabled }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: {{ include "gateway.serviceAccountName" . }} namespace: {{ .Release.Namespace }} labels: {{- include "gateway.labels" . | nindent 4}} annotations: {{- .Values.annotations | toYaml | nindent 4 }} rules: - apiGroups: [""] resources: ["secrets"]
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Feb 21 16:58:32 GMT 2023 - 963 bytes - Viewed (0) -
manifests/charts/gateways/istio-ingress/templates/role.yaml
{{ $gateway := index .Values "gateways" "istio-ingressgateway" }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: {{ $gateway.name }}-sds namespace: {{ .Release.Namespace }} labels: release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" | quote }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "IngressGateways" rules:
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Apr 18 18:16:49 GMT 2024 - 540 bytes - Viewed (0) -
manifests/charts/gateways/istio-egress/templates/rolebindings.yaml
install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "EgressGateways" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: {{ $gateway.name }}-sds subjects: - kind: ServiceAccount name: {{ $gateway.name }}-service-account
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Apr 18 18:16:49 GMT 2024 - 630 bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/templates/rolebinding.yaml
namespace: {{ .Values.global.istioNamespace }} labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: istiod{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }} subjects: - kind: ServiceAccount name: istiod{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Jun 09 22:42:56 GMT 2021 - 581 bytes - Viewed (0) -
manifests/charts/gateways/istio-egress/templates/role.yaml
{{ $gateway := index .Values "gateways" "istio-egressgateway" }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: {{ $gateway.name }}-sds namespace: {{ .Release.Namespace }} labels: release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" | quote }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "EgressGateways" rules:
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Apr 18 18:16:49 GMT 2024 - 538 bytes - Viewed (0) -
manifests/charts/istiod-remote/templates/role.yaml
{{- if .Values.global.configCluster }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: istiod{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }} namespace: {{ .Values.global.istioNamespace }} labels: app: istiod release: {{ .Release.Name }} rules: # permissions to verify the webhook is ready and rejecting # invalid config. We use --server-dry-run so no config is persisted.
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu May 04 16:21:31 GMT 2023 - 1021 bytes - Viewed (0) -
manifests/charts/istiod-remote/templates/rolebinding.yaml
namespace: {{ .Values.global.istioNamespace }} labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: istiod{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }} subjects: - kind: ServiceAccount name: istiod{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Jul 12 16:44:21 GMT 2021 - 631 bytes - Viewed (0) -
manifests/charts/istio-cni/templates/clusterrolebinding.yaml
subjects: - kind: ServiceAccount name: istio-cni namespace: {{ .Release.Namespace}} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istio-cni-repair-role {{- end }} --- {{- if .Values.cni.ambient.enabled }} apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istio-cni-ambient labels: k8s-app: istio-cni-repair
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed May 01 20:25:40 GMT 2024 - 1.7K bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/templates/role.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: istiod{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }} namespace: {{ .Values.global.istioNamespace }} labels: app: istiod release: {{ .Release.Name }} rules: # permissions to verify the webhook is ready and rejecting # invalid config. We use --server-dry-run so no config is persisted. - apiGroups: ["networking.istio.io"] verbs: ["create"]
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu May 04 16:21:31 GMT 2023 - 971 bytes - Viewed (0) -
manifests/charts/gateways/istio-ingress/templates/rolebindings.yaml
install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "IngressGateways" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: {{ $gateway.name }}-sds subjects: - kind: ServiceAccount name: {{ $gateway.name }}-service-account
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Apr 18 18:16:49 GMT 2024 - 632 bytes - Viewed (0)