Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for Coles (0.18 sec)

  1. common-protos/k8s.io/api/rbac/v1alpha1/generated.proto

      repeated RoleBinding items = 2;
    }
    
    // RoleList is a collection of Roles.
    // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleList, and will no longer be served in v1.22.
    message RoleList {
      // Standard object's metadata.
      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
    
      // Items is a list of Roles
      repeated Role items = 2;
    }
    
    Plain Text
    - Registered: Wed Apr 24 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 8.5K bytes
    - Viewed (0)
  2. common-protos/k8s.io/api/rbac/v1beta1/generated.proto

      repeated RoleBinding items = 2;
    }
    
    // RoleList is a collection of Roles
    // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 RoleList, and will no longer be served in v1.22.
    message RoleList {
      // Standard object's metadata.
      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
    
      // Items is a list of Roles
      repeated Role items = 2;
    }
    
    Plain Text
    - Registered: Wed Apr 24 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 8.6K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.8.md

      passed a file which contains RBAC roles, rolebindings, clusterroles, or
      clusterrolebindings, this command computes covers and adds the missing rules.
      The logic required to properly apply RBAC permissions is more complicated
      than a JSON merge because you have to compute logical covers operations between
      rule sets. This means that we cannot use `kubectl apply` to update RBAC roles
    Plain Text
    - Registered: Fri Apr 26 09:05:10 GMT 2024
    - Last Modified: Tue Feb 20 15:45:02 GMT 2024
    - 312.2K bytes
    - Viewed (1)
  4. common-protos/k8s.io/api/rbac/v1/generated.proto

      // Items is a list of RoleBindings
      repeated RoleBinding items = 2;
    }
    
    // RoleList is a collection of Roles
    message RoleList {
      // Standard object's metadata.
      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
    
      // Items is a list of Roles
      repeated Role items = 2;
    }
    
    // RoleRef contains information that points to the role being used
    // +structType=atomic
    Plain Text
    - Registered: Wed Apr 24 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 7.6K bytes
    - Viewed (0)
  5. common-protos/k8s.io/api/authorization/v1/generated.proto

      // It is entirely possible to get an error and be able to continue determine authorization status in spite of it.
      // For instance, RBAC can be missing a role, but enough roles are still present and bound to reason about the request.
      // +optional
      optional string evaluationError = 3;
    }
    
    // SubjectRulesReviewStatus contains the result of a rules check. This check can be incomplete depending on
    Plain Text
    - Registered: Wed Apr 24 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 11.9K bytes
    - Viewed (0)
  6. common-protos/k8s.io/api/authorization/v1beta1/generated.proto

      // It is entirely possible to get an error and be able to continue determine authorization status in spite of it.
      // For instance, RBAC can be missing a role, but enough roles are still present and bound to reason about the request.
      // +optional
      optional string evaluationError = 3;
    }
    
    // SubjectRulesReviewStatus contains the result of a rules check. This check can be incomplete depending on
    Plain Text
    - Registered: Wed Apr 24 22:53:08 GMT 2024
    - Last Modified: Mon Mar 11 18:43:24 GMT 2024
    - 11.9K bytes
    - Viewed (0)
  7. manifests/charts/README.md

    apps may target different 'environments' which contain different instances and variants of Istio.
    
    - Better security: separate Istio components reside in different namespaces, allowing different teams or
    roles to manage different parts of Istio. For example, a security team would maintain the
    root CA and policy, a telemetry team may only have access to Prometheus,
    Plain Text
    - Registered: Wed Apr 24 22:53:08 GMT 2024
    - Last Modified: Wed Feb 07 17:53:24 GMT 2024
    - 6.7K bytes
    - Viewed (0)
Back to top