- Sort Score
- Result 10 results
- Languages All
Results 1 - 9 of 9 for rbacpb (0.2 sec)
-
istioctl/pkg/authz/listener.go
addPolicy(action, anonymousName, "0") } } } } buf := strings.Builder{} buf.WriteString("ACTION\tAuthorizationPolicy\tRULES\n") for _, action := range []rbacpb.RBAC_Action{rbacpb.RBAC_DENY, rbacpb.RBAC_ALLOW, rbacpb.RBAC_LOG} { if names, ok := actionToPolicy[action]; ok { sortedNames := make([]string, 0, len(names)) for name := range names { sortedNames = append(sortedNames, name) }
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Sep 11 15:29:30 GMT 2023 - 6K bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/templates/clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: istiod-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} subjects:
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Sun Oct 10 17:32:44 GMT 2021 - 1.3K bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/templates/rolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: istiod{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }} namespace: {{ .Values.global.istioNamespace }} labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: istiod{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }} subjects: - kind: ServiceAccount
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Jun 09 22:42:56 GMT 2021 - 581 bytes - Viewed (0) -
istioctl/pkg/proxyconfig/testdata/config_dump.json
"request": {} }, "metadata_key": { "key": "envoy.filters.http.rbac", "path": [ { "key": "istio_dry_run_allow_shadow_effective_policy_id" }
Json - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Jan 03 23:08:06 GMT 2024 - 54.8K bytes - Viewed (1) -
manifests/charts/istio-control/istio-discovery/templates/reader-clusterrole.yaml
{{ $mcsAPIGroup := or .Values.pilot.env.MCS_API_GROUP "multicluster.x-k8s.io" }} apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }} labels: app: istio-reader release: {{ .Release.Name }} rules: - apiGroups: - "config.istio.io" - "security.istio.io" - "networking.istio.io"
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Apr 02 08:32:06 GMT 2024 - 2.2K bytes - Viewed (0) -
istioctl/pkg/writer/compare/testdata/configdump_diff.json
"request": {} }, "metadata_key": { "key": "envoy.filters.http.rbac", "path": [ { "key": "istio_dry_run_allow_shadow_effective_policy_id" }
Json - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Mar 12 10:02:09 GMT 2024 - 51.6K bytes - Viewed (1) -
cni/README.md
- [RBAC](https://docs.projectcalico.org/v3.2/getting-started/kubernetes/installation/rbac.yaml) - this creates the service account the CNI plugin is configured to use to access the kube-api-server...
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Fri May 03 19:29:42 GMT 2024 - 12.3K bytes - Viewed (0) -
common-protos/k8s.io/api/authorization/v1beta1/generated.proto
// EvaluationError is an indication that some error occurred during the authorization check. // It is entirely possible to get an error and be able to continue determine authorization status in spite of it. // For instance, RBAC can be missing a role, but enough roles are still present and bound to reason about the request. // +optional optional string evaluationError = 3; }
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 11.9K bytes - Viewed (0) -
manifests/charts/ztunnel/templates/rbac.yaml
verbs: ["use"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: ztunnel labels: app: ztunnel release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: ztunnel
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Sat May 04 01:17:57 GMT 2024 - 1.3K bytes - Viewed (0)