Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 342 for rbacv1 (0.12 sec)

  1. pkg/controlplane/instance.go

    	eventsv1 "k8s.io/api/events/v1"
    	networkingapiv1 "k8s.io/api/networking/v1"
    	networkingapiv1alpha1 "k8s.io/api/networking/v1alpha1"
    	nodev1 "k8s.io/api/node/v1"
    	policyapiv1 "k8s.io/api/policy/v1"
    	rbacv1 "k8s.io/api/rbac/v1"
    	resourcev1alpha2 "k8s.io/api/resource/v1alpha2"
    	schedulingapiv1 "k8s.io/api/scheduling/v1"
    	storageapiv1 "k8s.io/api/storage/v1"
    	storageapiv1alpha1 "k8s.io/api/storage/v1alpha1"
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jun 03 11:50:04 UTC 2024
    - 21.2K bytes
    - Viewed (0)
  2. cmd/kubeadm/app/phases/kubeconfig/kubeconfig.go

    		crbExists          bool
    		clusterRoleBinding = &rbac.ClusterRoleBinding{
    			ObjectMeta: metav1.ObjectMeta{
    				Name: kubeadmconstants.ClusterAdminsGroupAndClusterRoleBinding,
    			},
    			RoleRef: rbac.RoleRef{
    				APIGroup: rbac.GroupName,
    				Kind:     "ClusterRole",
    				Name:     "cluster-admin",
    			},
    			Subjects: []rbac.Subject{
    				{
    					Kind: rbac.GroupKind,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Jun 07 17:04:18 UTC 2024
    - 27K bytes
    - Viewed (0)
  3. pilot/pkg/security/authz/builder/builder.go

    	"istio.io/istio/pkg/wellknown"
    )
    
    var rbacPolicyMatchNever = &rbacpb.Policy{
    	Permissions: []*rbacpb.Permission{{Rule: &rbacpb.Permission_NotRule{
    		NotRule: &rbacpb.Permission{Rule: &rbacpb.Permission_Any{Any: true}},
    	}}},
    	Principals: []*rbacpb.Principal{{Identifier: &rbacpb.Principal_NotId{
    		NotId: &rbacpb.Principal{Identifier: &rbacpb.Principal_Any{Any: true}},
    	}}},
    }
    
    // General setting to control behavior
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Nov 20 22:15:12 UTC 2023
    - 12.6K bytes
    - Viewed (0)
  4. manifests/charts/ztunnel/templates/rbac.yaml

      verbs: ["use"]
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: ztunnel
      labels:
        app: ztunnel
        release: {{ .Release.Name }}
        istio.io/rev: {{ .Values.revision | default "default" }}
        install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: ztunnel
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat May 04 01:17:57 UTC 2024
    - 1.3K bytes
    - Viewed (0)
  5. istioctl/pkg/authz/listener.go

    					addPolicy(action, anonymousName, "0")
    				}
    			}
    		}
    	}
    
    	buf := strings.Builder{}
    	buf.WriteString("ACTION\tAuthorizationPolicy\tRULES\n")
    	for _, action := range []rbacpb.RBAC_Action{rbacpb.RBAC_DENY, rbacpb.RBAC_ALLOW, rbacpb.RBAC_LOG} {
    		if names, ok := actionToPolicy[action]; ok {
    			sortedNames := make([]string, 0, len(names))
    			for name := range names {
    				sortedNames = append(sortedNames, name)
    			}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Sep 11 15:29:30 UTC 2023
    - 6K bytes
    - Viewed (0)
  6. pilot/pkg/security/authz/model/permission.go

    	return &rbacpb.Permission{
    		Rule: &rbacpb.Permission_OrRules{
    			OrRules: &rbacpb.Permission_Set{
    				Rules: permission,
    			},
    		},
    	}
    }
    
    func permissionNot(permission *rbacpb.Permission) *rbacpb.Permission {
    	return &rbacpb.Permission{
    		Rule: &rbacpb.Permission_NotRule{
    			NotRule: permission,
    		},
    	}
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Apr 20 01:58:53 UTC 2024
    - 3K bytes
    - Viewed (0)
  7. pilot/pkg/networking/grpcgen/lds.go

    //
    // nolint: unparam
    func buildRBAC(node *model.Proxy, push *model.PushContext, suffix string, context *tls.DownstreamTlsContext,
    	a rbacpb.RBAC_Action, policies []model.AuthorizationPolicy,
    ) *rbacpb.RBAC {
    	rules := &rbacpb.RBAC{
    		Action:   a,
    		Policies: map[string]*rbacpb.Policy{},
    	}
    	for _, policy := range policies {
    		for i, rule := range policy.Spec.Rules {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 14.6K bytes
    - Viewed (0)
  8. pilot/pkg/security/authz/model/model.go

    	var permissions []*rbacpb.Permission
    	if r.extended != nil {
    		if len(r.values) > 0 {
    			p, err := r.extended.extendedPermission(r.key, r.values, forTCP)
    			if err := r.checkError(action, err); err != nil {
    				return nil, err
    			}
    			if p != nil {
    				permissions = append(permissions, p)
    			}
    		}
    	} else {
    		var or []*rbacpb.Permission
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 25 10:39:25 UTC 2024
    - 13.8K bytes
    - Viewed (0)
  9. pilot/pkg/security/authz/model/model_test.go

    							},
    						},
    					},
    				},
    				{
    					Identifier: &rbacpb.Principal_NotId{
    						NotId: &rbacpb.Principal{
    							Identifier: &rbacpb.Principal_OrIds{
    								OrIds: &rbacpb.Principal_Set{
    									Ids: []*rbacpb.Principal{
    										{
    											Identifier: &rbacpb.Principal_Authenticated_{
    												Authenticated: &rbacpb.Principal_Authenticated{
    													PrincipalName: &matcherv3.StringMatcher{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Nov 20 22:15:12 UTC 2023
    - 10K bytes
    - Viewed (0)
  10. cluster/addons/kube-network-policies/kube-network-policies-rbac.yaml

          - networkpolicies
        verbs:
          - watch
          - list
    ---
    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: kube-network-policies
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:network-policies
    subjects:
    - kind: ServiceAccount
      name: kube-network-policies
      namespace: kube-system
    ---
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Apr 21 10:01:31 UTC 2024
    - 1.1K bytes
    - Viewed (0)
Back to top