Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 384 for rbacv1 (0.25 sec)

  1. cluster/gce/addons/konnectivity-agent/konnectivity-rbac.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: system:konnectivity-server
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:auth-delegator
    subjects:
      - apiGroup: rbac.authorization.k8s.io
        kind: User
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Mar 02 01:24:48 UTC 2020
    - 409 bytes
    - Viewed (0)
  2. pilot/pkg/security/authz/model/permission.go

    	return &rbacpb.Permission{
    		Rule: &rbacpb.Permission_OrRules{
    			OrRules: &rbacpb.Permission_Set{
    				Rules: permission,
    			},
    		},
    	}
    }
    
    func permissionNot(permission *rbacpb.Permission) *rbacpb.Permission {
    	return &rbacpb.Permission{
    		Rule: &rbacpb.Permission_NotRule{
    			NotRule: permission,
    		},
    	}
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Apr 20 01:58:53 UTC 2024
    - 3K bytes
    - Viewed (0)
  3. pilot/pkg/security/authz/model/principal.go

    	return &rbacpb.Principal{
    		Identifier: &rbacpb.Principal_OrIds{
    			OrIds: &rbacpb.Principal_Set{
    				Ids: principals,
    			},
    		},
    	}
    }
    
    func principalAnd(principals []*rbacpb.Principal) *rbacpb.Principal {
    	return &rbacpb.Principal{
    		Identifier: &rbacpb.Principal_AndIds{
    			AndIds: &rbacpb.Principal_Set{
    				Ids: principals,
    			},
    		},
    	}
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Nov 17 18:44:57 UTC 2022
    - 2.8K bytes
    - Viewed (0)
  4. cluster/addons/fluentd-gcp/scaler-rbac.yaml

      resources:
      - scalingpolicies
      verbs:
      - get
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: fluentd-gcp-scaler-binding
      namespace: kube-system
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: system:fluentd-gcp-scaler
    subjects:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Dec 13 17:23:39 UTC 2019
    - 1009 bytes
    - Viewed (0)
  5. cluster/addons/metadata-agent/stackdriver/metadata-agent-rbac.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      name: stackdriver:metadata-agent
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    rules:
    - apiGroups:
      - "*"
      resources:
      - "*"
      verbs:
      - watch
      - get
      - list
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: stackdriver:metadata-agent
      labels:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Aug 06 15:26:35 UTC 2018
    - 685 bytes
    - Viewed (0)
  6. cluster/addons/kube-proxy/kube-proxy-rbac.yaml

    ---
    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: system:kube-proxy
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    subjects:
      - kind: ServiceAccount
        name: kube-proxy
        namespace: kube-system
    roleRef:
      kind: ClusterRole
      name: system:node-proxier
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jun 03 18:46:08 UTC 2019
    - 488 bytes
    - Viewed (0)
  7. cluster/addons/volumesnapshots/volume-snapshot-controller/rbac-volume-snapshot-controller.yaml

    # RBAC file for the volume snapshot controller.
    apiVersion: v1
    kind: ServiceAccount
    metadata:
      name: volume-snapshot-controller
      namespace: kube-system
      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    ---
    kind: ClusterRole
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      # rename if there are conflicts
      name: volume-snapshot-controller-runner
      namespace: kube-system
      labels:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Sep 16 14:09:47 UTC 2022
    - 2.9K bytes
    - Viewed (0)
  8. cluster/addons/rbac/cluster-autoscaler/cluster-autoscaler-rbac.yaml

    ---
    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: cluster-autoscaler
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    subjects:
      - kind: User
        name: cluster-autoscaler
        namespace: kube-system
    roleRef:
      kind: ClusterRole
      name: cluster-autoscaler
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 12 16:56:45 UTC 2020
    - 2K bytes
    - Viewed (0)
  9. cluster/addons/kube-network-policies/kube-network-policies-rbac.yaml

          - networkpolicies
        verbs:
          - watch
          - list
    ---
    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: kube-network-policies
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:network-policies
    subjects:
    - kind: ServiceAccount
      name: kube-network-policies
      namespace: kube-system
    ---
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Apr 21 10:01:31 UTC 2024
    - 1.1K bytes
    - Viewed (0)
  10. releasenotes/notes/invalid-rbac-filter.yaml

    apiVersion: release-notes/v2
    kind: bug-fix
    area: security
    issue:
      - https://github.com/istio/istio/issues/43785
    releaseNotes:
      - |
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Mar 07 16:16:45 UTC 2023
    - 238 bytes
    - Viewed (0)
Back to top