- Sort Score
- Result 10 results
- Languages All
Results 71 - 80 of 100 for rbacv1 (0.18 sec)
-
pilot/pkg/serviceregistry/kube/controller/multicluster.go
// webhook. if shouldLead && !configCluster && m.caBundleWatcher != nil { // Patch injection webhook cert // This requires RBAC permissions - a low-priv Istiod should not attempt to patch but rely on // operator or CI/CD if features.InjectionWebhookConfigName != "" {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 12.7K bytes - Viewed (0) -
pilot/pkg/leaderelection/leaderelection_test.go
l, stop := createElection(t, "pod1", "", watcher, true, client, func(stop <-chan struct{}) { completions.Add(1) }) // Expect to run once expectInt(t, completions.Load, 1) // drop RBAC permissions to update the configmap // This simulates loosing an active lease allowRbac.Store(false) // We should start a new cycle at this point expectInt(t, l.cycle.Load, 2)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Apr 28 04:22:19 UTC 2024 - 11.4K bytes - Viewed (0) -
tensorflow/compiler/mlir/tf2xla/internal/passes/tpu_cluster_formation.cc
// cluster op (`cluster_predecessor_ops`). auto rfront = Block::reverse_iterator(cluster_ops.front()); auto rback = Block::reverse_iterator(cluster_ops.back()); for (Operation& op : llvm::make_range(rback, rfront)) { if (cluster_ops.contains(&op)) continue; bool has_dependency_to_cluster = getOpClusterDataDependency(&op, /*incoming=*/false, cluster_ops,
Registered: Sun Jun 16 05:45:23 UTC 2024 - Last Modified: Thu May 02 22:03:30 UTC 2024 - 39.3K bytes - Viewed (0) -
pkg/printers/internalversion/printers.go
if options.Wide { users, groups, sas, _ := rbac.SubjectsStrings(obj.Subjects) row.Cells = append(row.Cells, strings.Join(users, ", "), strings.Join(groups, ", "), strings.Join(sas, ", ")) } return []metav1.TableRow{row}, nil } // Prints the RoleBinding in a human-friendly format. func printRoleBindingList(list *rbac.RoleBindingList, options printers.GenerateOptions) ([]metav1.TableRow, error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jun 11 14:04:15 UTC 2024 - 128.3K bytes - Viewed (0) -
pilot/pkg/config/kube/ingress/controller.go
// If we need more flexibility - we can add it (but likely we'll deprecate ingress support first) // - var schemas = collection.SchemasFor( collections.VirtualService, collections.Gateway) // Control needs RBAC permissions to write to Pods. type controller struct { meshWatcher mesh.Holder domainSuffix string queue controllers.Queue virtualServiceHandlers []model.EventHandler
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 06 03:53:05 UTC 2024 - 11.9K bytes - Viewed (0) -
pkg/controlplane/apiserver/config.go
"k8s.io/kubernetes/pkg/features" "k8s.io/kubernetes/pkg/kubeapiserver" "k8s.io/kubernetes/pkg/kubeapiserver/authorizer/modes" rbacrest "k8s.io/kubernetes/pkg/registry/rbac/rest" "k8s.io/kubernetes/pkg/serviceaccount" ) // Config defines configuration for the master type Config struct { Generic *genericapiserver.Config Extra } type Extra struct {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 07 17:57:37 UTC 2024 - 14.9K bytes - Viewed (0) -
pilot/pkg/networking/core/gateway.go
httpFilterChainOpts := configgen.createGatewayHTTPFilterChainOpts(builder.node, port, nil, serversForPort.RouteName, proxyConfig, istionetworking.ListenerProtocolTCP, builder.push) // In HTTP, we need to have RBAC, etc. upfront so that they can enforce policies immediately httpFilterChainOpts.networkFilters = extension.PopAppendNetwork(httpFilterChainOpts.networkFilters, wasm, extensions.PluginPhase_AUTHN)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 06 04:44:06 UTC 2024 - 46.4K bytes - Viewed (0) -
hack/local-up-cluster.sh
if [[ -n "${AUTHORIZATION_CONFIG:-}" ]]; then authorizer_args+=("--authorization-config=${AUTHORIZATION_CONFIG}") else if [[ -n "${AUTHORIZATION_MODE:-Node,RBAC}" ]]; then authorizer_args+=("--authorization-mode=${AUTHORIZATION_MODE:-Node,RBAC}") fi authorizer_args+=( "--authorization-webhook-config-file=${AUTHORIZATION_WEBHOOK_CONFIG_FILE}"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 25 02:33:52 UTC 2024 - 53.3K bytes - Viewed (0) -
cluster/gce/gci/configure-helper.sh
# prep addition kube-up specific rbac objects setup-addon-manifests "addons" "rbac/kubelet-api-auth" setup-addon-manifests "addons" "rbac/kubelet-cert-rotation" if [[ "${REGISTER_MASTER_KUBELET:-false}" == "true" ]]; then setup-addon-manifests "addons" "rbac/legacy-kubelet-user" else setup-addon-manifests "addons" "rbac/legacy-kubelet-user-disable" fi
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jun 10 22:07:47 UTC 2024 - 141.1K bytes - Viewed (0) -
pkg/workloadapi/security/authorization.pb.go
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` Namespace string `protobuf:"bytes,2,opt,name=namespace,proto3" json:"namespace,omitempty"` // Determine the scope of this RBAC policy. // If set to NAMESPACE, the 'namespace' field value will be used. Scope Scope `protobuf:"varint,3,opt,name=scope,proto3,enum=istio.security.Scope" json:"scope,omitempty"`
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 31 02:27:10 UTC 2024 - 29.7K bytes - Viewed (0)