- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 597 for rbacv1 (0.16 sec)
-
cluster/gce/addons/konnectivity-agent/konnectivity-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: system:konnectivity-server labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects: - apiGroup: rbac.authorization.k8s.io kind: User
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Mar 02 01:24:48 UTC 2020 - 409 bytes - Viewed (0) -
pilot/pkg/security/authz/model/permission.go
return &rbacpb.Permission{ Rule: &rbacpb.Permission_OrRules{ OrRules: &rbacpb.Permission_Set{ Rules: permission, }, }, } } func permissionNot(permission *rbacpb.Permission) *rbacpb.Permission { return &rbacpb.Permission{ Rule: &rbacpb.Permission_NotRule{ NotRule: permission, }, } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 20 01:58:53 UTC 2024 - 3K bytes - Viewed (0) -
pilot/pkg/security/authz/model/principal.go
return &rbacpb.Principal{ Identifier: &rbacpb.Principal_OrIds{ OrIds: &rbacpb.Principal_Set{ Ids: principals, }, }, } } func principalAnd(principals []*rbacpb.Principal) *rbacpb.Principal { return &rbacpb.Principal{ Identifier: &rbacpb.Principal_AndIds{ AndIds: &rbacpb.Principal_Set{ Ids: principals, }, }, } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Nov 17 18:44:57 UTC 2022 - 2.8K bytes - Viewed (0) -
cluster/addons/fluentd-gcp/scaler-rbac.yaml
resources: - scalingpolicies verbs: - get --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: fluentd-gcp-scaler-binding namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system:fluentd-gcp-scaler subjects:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Dec 13 17:23:39 UTC 2019 - 1009 bytes - Viewed (0) -
pilot/pkg/networking/grpcgen/lds.go
// // nolint: unparam func buildRBAC(node *model.Proxy, push *model.PushContext, suffix string, context *tls.DownstreamTlsContext, a rbacpb.RBAC_Action, policies []model.AuthorizationPolicy, ) *rbacpb.RBAC { rules := &rbacpb.RBAC{ Action: a, Policies: map[string]*rbacpb.Policy{}, } for _, policy := range policies { for i, rule := range policy.Spec.Rules {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 22:20:44 UTC 2024 - 14.6K bytes - Viewed (0) -
cluster/addons/metadata-agent/stackdriver/metadata-agent-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: stackdriver:metadata-agent labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile rules: - apiGroups: - "*" resources: - "*" verbs: - watch - get - list --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: stackdriver:metadata-agent labels:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Aug 06 15:26:35 UTC 2018 - 685 bytes - Viewed (0) -
cluster/addons/kube-proxy/kube-proxy-rbac.yaml
--- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: system:kube-proxy labels: addonmanager.kubernetes.io/mode: Reconcile subjects: - kind: ServiceAccount name: kube-proxy namespace: kube-system roleRef: kind: ClusterRole name: system:node-proxier
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jun 03 18:46:08 UTC 2019 - 488 bytes - Viewed (0) -
pilot/pkg/security/authz/model/model.go
var permissions []*rbacpb.Permission if r.extended != nil { if len(r.values) > 0 { p, err := r.extended.extendedPermission(r.key, r.values, forTCP) if err := r.checkError(action, err); err != nil { return nil, err } if p != nil { permissions = append(permissions, p) } } } else { var or []*rbacpb.Permission
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 25 10:39:25 UTC 2024 - 13.8K bytes - Viewed (0) -
cluster/addons/volumesnapshots/volume-snapshot-controller/rbac-volume-snapshot-controller.yaml
# RBAC file for the volume snapshot controller. apiVersion: v1 kind: ServiceAccount metadata: name: volume-snapshot-controller namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: # rename if there are conflicts name: volume-snapshot-controller-runner namespace: kube-system labels:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 16 14:09:47 UTC 2022 - 2.9K bytes - Viewed (0) -
cluster/addons/rbac/cluster-autoscaler/cluster-autoscaler-rbac.yaml
--- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: cluster-autoscaler labels: addonmanager.kubernetes.io/mode: Reconcile subjects: - kind: User name: cluster-autoscaler namespace: kube-system roleRef: kind: ClusterRole name: cluster-autoscaler
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 12 16:56:45 UTC 2020 - 2K bytes - Viewed (0)