Search Options

Results per page
Sort
Preferred Languages
Advance

Results 161 - 170 of 597 for rbacv1 (0.31 sec)

  1. pkg/registry/rbac/role/storage/storage.go

    	store := &genericregistry.Store{
    		NewFunc:                   func() runtime.Object { return &rbac.Role{} },
    		NewListFunc:               func() runtime.Object { return &rbac.RoleList{} },
    		DefaultQualifiedResource:  rbac.Resource("roles"),
    		SingularQualifiedResource: rbac.Resource("role"),
    
    		CreateStrategy: role.Strategy,
    		UpdateStrategy: role.Strategy,
    		DeleteStrategy: role.Strategy,
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Nov 18 09:21:13 UTC 2022
    - 1.8K bytes
    - Viewed (0)
  2. cluster/addons/rbac/legacy-kubelet-user-disable/kubelet-binding.yaml

    # kubelets to function.
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: kubelet-cluster-admin
      labels:
        addonmanager.kubernetes.io/mode: EnsureExists
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: system:node
    subjects: []
    ---
    # This is required so that new clusters still have bootstrap permissions
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Mar 24 04:11:47 UTC 2019
    - 782 bytes
    - Viewed (0)
  3. cmd/kubeadm/app/phases/uploadconfig/uploadconfig.go

    	return apiclient.CreateOrUpdateRoleBinding(client, &rbac.RoleBinding{
    		ObjectMeta: metav1.ObjectMeta{
    			Name:      NodesKubeadmConfigClusterRoleName,
    			Namespace: metav1.NamespaceSystem,
    		},
    		RoleRef: rbac.RoleRef{
    			APIGroup: rbac.GroupName,
    			Kind:     "Role",
    			Name:     NodesKubeadmConfigClusterRoleName,
    		},
    		Subjects: []rbac.Subject{
    			{
    				Kind: rbac.GroupKind,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jul 04 07:20:43 UTC 2023
    - 4.4K bytes
    - Viewed (0)
  4. pilot/pkg/security/authz/builder/testdata/http/extended-allow-nil-rule-out.yaml

    name: envoy.filters.http.rbac
    typedConfig:
      '@type': type.googleapis.com/envoy.extensions.filters.http.rbac.v3.RBAC
      rules:
        policies:
          ns[foo]-policy[allow-none]-rule[0]:
            permissions:
            - notRule:
                any: true
            principals:
            - notId:
                any: true
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 25 10:39:25 UTC 2024
    - 349 bytes
    - Viewed (0)
  5. pilot/pkg/security/authz/builder/testdata/http/extended-allow-empty-rule-out.yaml

    name: envoy.filters.http.rbac
    typedConfig:
      '@type': type.googleapis.com/envoy.extensions.filters.http.rbac.v3.RBAC
      rules:
        policies:
          ns[foo]-policy[allow-all]-rule[0]:
            permissions:
            - andRules:
                rules:
                - any: true
            principals:
            - andIds:
                ids:
                - any: true
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 25 10:39:25 UTC 2024
    - 390 bytes
    - Viewed (0)
  6. pkg/registry/rbac/clusterrolebinding/strategy.go

    func (strategy) PrepareForCreate(ctx context.Context, obj runtime.Object) {
    	_ = obj.(*rbac.ClusterRoleBinding)
    }
    
    // PrepareForUpdate clears fields that are not allowed to be set by end users on update.
    func (strategy) PrepareForUpdate(ctx context.Context, obj, old runtime.Object) {
    	newClusterRoleBinding := obj.(*rbac.ClusterRoleBinding)
    	oldClusterRoleBinding := old.(*rbac.ClusterRoleBinding)
    
    	_, _ = newClusterRoleBinding, oldClusterRoleBinding
    }
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 18 14:42:36 UTC 2021
    - 3.6K bytes
    - Viewed (0)
  7. pilot/pkg/security/authz/builder/testdata/http/extended-dry-run-allow-and-deny-out2.yaml

    name: envoy.filters.http.rbac
    typedConfig:
      '@type': type.googleapis.com/envoy.extensions.filters.http.rbac.v3.RBAC
      shadowRules:
        policies:
          ns[foo]-policy[httpbin-1]-rule[0]:
            permissions:
            - andRules:
                rules:
                - orRules:
                    rules:
                    - urlPath:
                        path:
                          exact: /allow
            principals:
            - andIds:
                ids:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 25 10:39:25 UTC 2024
    - 507 bytes
    - Viewed (0)
  8. manifests/charts/istio-cni/templates/clusterrolebinding.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: {{ template "name" . }}
      labels:
        app: {{ template "name" . }}
        release: {{ .Release.Name }}
        istio.io/rev: {{ .Values.revision | default "default" }}
        install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
        operator.istio.io/component: "Cni"
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri May 17 21:52:29 UTC 2024
    - 1.9K bytes
    - Viewed (0)
  9. manifests/charts/gateway/templates/role.yaml

    {{/*Set up roles for Istio Gateway. Not required for gateway-api*/}}
    {{- if .Values.rbac.enabled }}
    apiVersion: rbac.authorization.k8s.io/v1
    kind: Role
    metadata:
      name: {{ include "gateway.serviceAccountName" . }}
      namespace: {{ .Release.Namespace }}
      labels:
        {{- include "gateway.labels" . | nindent 4}}
      annotations:
        {{- .Values.annotations | toYaml | nindent 4 }}
    rules:
    - apiGroups: [""]
      resources: ["secrets"]
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Feb 21 16:58:32 UTC 2023
    - 963 bytes
    - Viewed (0)
  10. pkg/apis/rbac/v1/doc.go

    limitations under the License.
    */
    
    // +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/rbac
    // +k8s:conversion-gen-external-types=k8s.io/api/rbac/v1
    // +k8s:defaulter-gen=TypeMeta
    // +k8s:defaulter-gen-input=k8s.io/api/rbac/v1
    // +k8s:deepcopy-gen=package
    
    // +groupName=rbac.authorization.k8s.io
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Aug 14 15:00:18 UTC 2021
    - 890 bytes
    - Viewed (0)
Back to top