- Sort Score
- Result 10 results
- Languages All
Results 61 - 70 of 3,660 for subjects (0.12 sec)
-
src/crypto/x509/cert_pool.go
}) return lazyCert.v, nil }, nil) ok = true } return ok } // Subjects returns a list of the DER-encoded subjects of // all of the certificates in the pool. // // Deprecated: if s was returned by [SystemCertPool], Subjects // will not include the system roots. func (s *CertPool) Subjects() [][]byte { res := make([][]byte, s.len()) for i, lc := range s.lazyCerts { res[i] = lc.rawSubject
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Nov 09 19:41:40 UTC 2023 - 8.9K bytes - Viewed (0) -
pkg/apis/abac/v0/conversion.go
out.Spec.Resource = in.Resource out.Spec.Readonly = in.Readonly // In v0, unspecified user and group matches all authenticated subjects if len(in.User) == 0 && len(in.Group) == 0 { out.Spec.Group = allAuthenticated } // In v0, user or group of * matches all authenticated subjects if in.User == "*" || in.Group == "*" { out.Spec.Group = allAuthenticated out.Spec.User = "" }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Oct 28 20:14:20 UTC 2019 - 1.9K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/generated.pb.go
} var xxx_messageInfo_RoleRef proto.InternalMessageInfo func (m *Subject) Reset() { *m = Subject{} } func (*Subject) ProtoMessage() {} func (*Subject) Descriptor() ([]byte, []int) { return fileDescriptor_c8ba2e7dd472de66, []int{11} } func (m *Subject) XXX_Unmarshal(b []byte) error { return m.Unmarshal(b) } func (m *Subject) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { b = b[:cap(b)]
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 06:06:37 UTC 2024 - 77.5K bytes - Viewed (0) -
manifests/charts/istiod-remote/templates/reader-clusterrolebinding.yaml
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jul 12 16:44:21 UTC 2021 - 589 bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/templates/rolebinding.yaml
labels: app: istiod release: {{ .Release.Name }} roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: istiod{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }} subjects: - kind: ServiceAccount name: istiod{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 09 22:42:56 UTC 2021 - 581 bytes - Viewed (0) -
cluster/addons/metadata-agent/stackdriver/metadata-agent-rbac.yaml
labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: stackdriver:metadata-agent subjects: - kind: ServiceAccount name: metadata-agent
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Aug 06 15:26:35 UTC 2018 - 685 bytes - Viewed (0) -
pkg/registry/rbac/validation/rule.go
if s == ele { return true } } return false } func appliesToUser(user user.Info, subject rbacv1.Subject, namespace string) bool { switch subject.Kind { case rbacv1.UserKind: return user.GetName() == subject.Name case rbacv1.GroupKind: return has(user.GetGroups(), subject.Name) case rbacv1.ServiceAccountKind:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 02 16:51:16 UTC 2020 - 11.6K bytes - Viewed (0) -
cluster/addons/calico-policy-controller/calico-cpva-clusterrolebinding.yaml
kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: calico-cpva labels: addonmanager.kubernetes.io/mode: Reconcile subjects: - kind: ServiceAccount name: calico-cpva namespace: kube-system roleRef: kind: ClusterRole name: calico-cpva
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 14 15:32:57 UTC 2019 - 324 bytes - Viewed (0) -
cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-clusterrolebinding.yaml
kind: ClusterRoleBinding metadata: name: typha-cpha labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: typha-cpha subjects: - kind: ServiceAccount name: typha-cpha
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 14 15:32:57 UTC 2019 - 321 bytes - Viewed (0) -
cluster/addons/calico-policy-controller/typha-vertical-autoscaler-clusterrolebinding.yaml
kind: ClusterRoleBinding metadata: name: typha-cpva labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: typha-cpva subjects: - kind: ServiceAccount name: typha-cpva
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 14 15:32:57 UTC 2019 - 321 bytes - Viewed (0)