- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 107 for rbacv1 (0.31 sec)
-
prow/config/metrics/metrics.yaml
metadata: labels: k8s-app: metrics-server name: metrics-server namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: labels: k8s-app: metrics-server rbac.authorization.k8s.io/aggregate-to-admin: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-view: "true" name: system:aggregated-metrics-reader rules: - apiGroups:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 11 20:51:38 UTC 2024 - 4.6K bytes - Viewed (0) -
cmd/kubeadm/app/phases/kubelet/config.go
Namespace: metav1.NamespaceSystem, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "Role", Name: kubeadmconstants.KubeletBaseConfigMapRole, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind, Name: kubeadmconstants.NodesGroup, }, { Kind: rbac.GroupKind, Name: kubeadmconstants.NodeBootstrapTokenAuthGroup, }, },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Feb 02 12:34:30 UTC 2024 - 5.9K bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/extended-allow-nil-rule-out.yaml
name: envoy.filters.http.rbac typedConfig: '@type': type.googleapis.com/envoy.extensions.filters.http.rbac.v3.RBAC rules: policies: ns[foo]-policy[allow-none]-rule[0]: permissions: - notRule: any: true principals: - notId: any: true
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 25 10:39:25 UTC 2024 - 349 bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/extended-allow-empty-rule-out.yaml
name: envoy.filters.http.rbac typedConfig: '@type': type.googleapis.com/envoy.extensions.filters.http.rbac.v3.RBAC rules: policies: ns[foo]-policy[allow-all]-rule[0]: permissions: - andRules: rules: - any: true principals: - andIds: ids: - any: true
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 25 10:39:25 UTC 2024 - 390 bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/extended-dry-run-allow-and-deny-out2.yaml
name: envoy.filters.http.rbac typedConfig: '@type': type.googleapis.com/envoy.extensions.filters.http.rbac.v3.RBAC shadowRules: policies: ns[foo]-policy[httpbin-1]-rule[0]: permissions: - andRules: rules: - orRules: rules: - urlPath: path: exact: /allow principals: - andIds: ids:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 25 10:39:25 UTC 2024 - 507 bytes - Viewed (0) -
manifests/charts/istio-cni/templates/clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: {{ template "name" . }} labels: app: {{ template "name" . }} release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "Cni" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 17 21:52:29 UTC 2024 - 1.9K bytes - Viewed (0) -
pkg/config/xds/filters.go
const ( WasmHTTPFilterType = pm.WasmHTTPFilterType WasmNetworkFilterType = pm.WasmNetworkFilterType RBACHTTPFilterType = resource.APITypePrefix + "envoy.extensions.filters.http.rbac.v3.RBAC" RBACNetworkFilterType = resource.APITypePrefix + "envoy.extensions.filters.network.rbac.v3.RBAC" TypedStructType = pm.TypedStructType StatsFilterName = "istio.stats"
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed May 15 18:14:09 UTC 2024 - 1.1K bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/extended-audit-full-rule-out.yaml
name: envoy.filters.http.rbac typedConfig: '@type': type.googleapis.com/envoy.extensions.filters.http.rbac.v3.RBAC rules: action: LOG policies: ns[foo]-policy[audit-all]-rule[0]: permissions: - andRules: rules: - any: true principals: - andIds: ids: - any: true
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 25 10:39:25 UTC 2024 - 406 bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/extended-deny-empty-rule-out.yaml
name: envoy.filters.http.rbac typedConfig: '@type': type.googleapis.com/envoy.extensions.filters.http.rbac.v3.RBAC rules: action: DENY policies: ns[foo]-policy[deny-all]-rule[0]: permissions: - andRules: rules: - any: true principals: - andIds: ids: - any: true
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 25 10:39:25 UTC 2024 - 406 bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/extended-dry-run-mix-out.yaml
name: envoy.filters.http.rbac typedConfig: '@type': type.googleapis.com/envoy.extensions.filters.http.rbac.v3.RBAC rules: policies: ns[foo]-policy[httpbin-2]-rule[0]: permissions: - andRules: rules: - orRules: rules: - urlPath: path: exact: /another principals: - andIds: ids:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 25 10:39:25 UTC 2024 - 847 bytes - Viewed (0)