Search Options

Results per page
Sort
Preferred Languages
Advance

Results 61 - 70 of 826 for serviceAccount (0.2 sec)

  1. prow/config/metrics/metrics.yaml

    subjects:
    - kind: ServiceAccount
      name: metrics-server
      namespace: kube-system
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        k8s-app: metrics-server
      name: system:metrics-server
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:metrics-server
    subjects:
    - kind: ServiceAccount
      name: metrics-server
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 11 20:51:38 UTC 2024
    - 4.6K bytes
    - Viewed (0)
  2. pkg/kubeapiserver/authenticator/config.go

    		}
    		allPublicKeys = append(allPublicKeys, publicKeys...)
    	}
    	validator, err := serviceaccount.NewLegacyValidator(lookup, serviceAccountGetter, secretsWriter)
    	if err != nil {
    		return nil, fmt.Errorf("while creating legacy validator, err: %w", err)
    	}
    
    	tokenAuthenticator := serviceaccount.JWTTokenAuthenticator([]string{serviceaccount.LegacyIssuer}, allPublicKeys, apiAudiences, validator)
    	return tokenAuthenticator, nil
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Mar 09 19:29:33 UTC 2024
    - 15.4K bytes
    - Viewed (0)
  3. manifests/charts/istio-cni/templates/clusterrolebinding.yaml

        operator.istio.io/component: "Cni"
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: {{ template "name" . }}
    subjects:
    - kind: ServiceAccount
      name: {{ template "name" . }}
      namespace: {{ .Release.Namespace }}
    ---
    {{- if .Values.cni.repair.enabled }}
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri May 17 21:52:29 UTC 2024
    - 1.9K bytes
    - Viewed (0)
  4. pilot/pkg/serviceregistry/serviceentry/conversion.go

    		Addresses: svc.GetAddresses(proxy),
    
    		// This is based on alpha.istio.io/canonical-serviceaccounts and
    		//  alpha.istio.io/kubernetes-serviceaccounts.
    		SubjectAltNames: svc.ServiceAccounts,
    	}
    
    	if len(svc.Attributes.LabelSelectors) > 0 {
    		se.WorkloadSelector = &networking.WorkloadSelector{Labels: svc.Attributes.LabelSelectors}
    	}
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 29 02:03:58 UTC 2024
    - 16.9K bytes
    - Viewed (0)
  5. istioctl/pkg/writer/ztunnel/configdump/api.go

    	Protocol              string            `json:"protocol"`
    	Name                  string            `json:"name"`
    	Namespace             string            `json:"namespace"`
    	ServiceAccount        string            `json:"serviceAccount"`
    	WorkloadName          string            `json:"workloadName"`
    	WorkloadType          string            `json:"workloadType"`
    	CanonicalName         string            `json:"canonicalName"`
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 16:51:29 UTC 2024
    - 5.5K bytes
    - Viewed (0)
  6. tests/integration/security/egress_sidecar_tls_origination_test.go

    					},
    				},
    			}
    			for _, tc := range testCases {
    				t.NewSubTest(tc.name).Run(func(t framework.TestContext) {
    					if tc.authorizeSidecar {
    						serviceAccount := tc.from.Config().ServiceAccountName()
    						serviceAccountName := serviceAccount[strings.LastIndex(serviceAccount, "/")+1:]
    						authorizeSidecar(t, tc.from.Config().Namespace, serviceAccountName)
    					}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Apr 08 22:02:59 UTC 2024
    - 10.4K bytes
    - Viewed (0)
  7. manifests/charts/ztunnel/templates/rbac.yaml

    apiVersion: v1
    kind: ServiceAccount
      {{- with .Values.imagePullSecrets }}
    imagePullSecrets:
      {{- range . }}
      - name: {{ . }}
      {{- end }}
      {{- end }}
    metadata:
      name: ztunnel
      namespace: {{ .Release.Namespace }}
      labels:
        {{- .Values.labels | toYaml | nindent 4}}
      annotations:
        {{- .Values.annotations | toYaml | nindent 4 }}
    ---
    {{- if (eq .Values.platform "openshift") }}
    apiVersion: rbac.authorization.k8s.io/v1
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat May 04 01:17:57 UTC 2024
    - 1.3K bytes
    - Viewed (0)
  8. cni/pkg/nodeagent/testdata/localhost.yaml

    # This allows local testing by sending requests through the local ztunnel to other servers running on localhost.
    workloads:
    - uid: cluster1//v1/Pod/default/local
      name: local
      namespace: default
      serviceAccount: default
      workloadIps: ["127.0.0.1"]
      protocol: HBONE
      node: local
      network: ""
      services:
        "default/example.com":
          80: 8080
        "default/example2.com":
          80: 8080
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jan 26 20:34:28 UTC 2024
    - 1.2K bytes
    - Viewed (0)
  9. pkg/test/framework/components/echo/kube/deployment.go

    	}
    	return config, nil
    }
    
    func createServiceAccount(client kubernetes.Interface, ns string, serviceAccount string) error {
    	scopes.Framework.Debugf("Creating service account for: %s/%s", ns, serviceAccount)
    	_, err := client.CoreV1().ServiceAccounts(ns).Create(context.TODO(), &corev1.ServiceAccount{
    		ObjectMeta: metav1.ObjectMeta{Name: serviceAccount},
    	}, metav1.CreateOptions{})
    	return err
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 09 12:26:52 UTC 2024
    - 24.1K bytes
    - Viewed (0)
  10. cluster/addons/cloud-controller-manager/cloud-node-controller-binding.yaml

      name: system::leader-locking-cloud-controller-manager
      namespace: kube-system
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: system::leader-locking-cloud-controller-manager
    subjects:
    - kind: ServiceAccount
      name: cloud-controller-manager
      namespace: kube-system
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 03 17:38:23 UTC 2022
    - 1.2K bytes
    - Viewed (0)
Back to top