Search Options

Results per page
Sort
Preferred Languages
Advance

Results 61 - 70 of 3,660 for subjects (0.12 sec)

  1. src/crypto/x509/cert_pool.go

    			})
    			return lazyCert.v, nil
    		}, nil)
    		ok = true
    	}
    
    	return ok
    }
    
    // Subjects returns a list of the DER-encoded subjects of
    // all of the certificates in the pool.
    //
    // Deprecated: if s was returned by [SystemCertPool], Subjects
    // will not include the system roots.
    func (s *CertPool) Subjects() [][]byte {
    	res := make([][]byte, s.len())
    	for i, lc := range s.lazyCerts {
    		res[i] = lc.rawSubject
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Nov 09 19:41:40 UTC 2023
    - 8.9K bytes
    - Viewed (0)
  2. pkg/apis/abac/v0/conversion.go

    	out.Spec.Resource = in.Resource
    	out.Spec.Readonly = in.Readonly
    
    	// In v0, unspecified user and group matches all authenticated subjects
    	if len(in.User) == 0 && len(in.Group) == 0 {
    		out.Spec.Group = allAuthenticated
    	}
    	// In v0, user or group of * matches all authenticated subjects
    	if in.User == "*" || in.Group == "*" {
    		out.Spec.Group = allAuthenticated
    		out.Spec.User = ""
    	}
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Oct 28 20:14:20 UTC 2019
    - 1.9K bytes
    - Viewed (0)
  3. staging/src/k8s.io/api/rbac/v1/generated.pb.go

    }
    
    var xxx_messageInfo_RoleRef proto.InternalMessageInfo
    
    func (m *Subject) Reset()      { *m = Subject{} }
    func (*Subject) ProtoMessage() {}
    func (*Subject) Descriptor() ([]byte, []int) {
    	return fileDescriptor_c8ba2e7dd472de66, []int{11}
    }
    func (m *Subject) XXX_Unmarshal(b []byte) error {
    	return m.Unmarshal(b)
    }
    func (m *Subject) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
    	b = b[:cap(b)]
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 01 06:06:37 UTC 2024
    - 77.5K bytes
    - Viewed (0)
  4. manifests/charts/istiod-remote/templates/reader-clusterrolebinding.yaml

        release: {{ .Release.Name }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: istio-reader-clusterrole{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}-{{ .Release.Namespace }}
    subjects:
      - kind: ServiceAccount
        name: istio-reader-service-account
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jul 12 16:44:21 UTC 2021
    - 589 bytes
    - Viewed (0)
  5. manifests/charts/istio-control/istio-discovery/templates/rolebinding.yaml

      labels:
        app: istiod
        release: {{ .Release.Name }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: istiod{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }}
    subjects:
      - kind: ServiceAccount
        name: istiod{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 09 22:42:56 UTC 2021
    - 581 bytes
    - Viewed (0)
  6. cluster/addons/metadata-agent/stackdriver/metadata-agent-rbac.yaml

      labels:
        kubernetes.io/cluster-service: "true"
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: stackdriver:metadata-agent
    subjects:
    - kind: ServiceAccount
      name: metadata-agent
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Aug 06 15:26:35 UTC 2018
    - 685 bytes
    - Viewed (0)
  7. pkg/registry/rbac/validation/rule.go

    		if s == ele {
    			return true
    		}
    	}
    	return false
    }
    
    func appliesToUser(user user.Info, subject rbacv1.Subject, namespace string) bool {
    	switch subject.Kind {
    	case rbacv1.UserKind:
    		return user.GetName() == subject.Name
    
    	case rbacv1.GroupKind:
    		return has(user.GetGroups(), subject.Name)
    
    	case rbacv1.ServiceAccountKind:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Nov 02 16:51:16 UTC 2020
    - 11.6K bytes
    - Viewed (0)
  8. cluster/addons/calico-policy-controller/calico-cpva-clusterrolebinding.yaml

    kind: ClusterRoleBinding
    apiVersion: rbac.authorization.k8s.io/v1
    metadata:
      name: calico-cpva
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    subjects:
      - kind: ServiceAccount
        name: calico-cpva
        namespace: kube-system
    roleRef:
      kind: ClusterRole
      name: calico-cpva
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 14 15:32:57 UTC 2019
    - 324 bytes
    - Viewed (0)
  9. cluster/addons/calico-policy-controller/typha-horizontal-autoscaler-clusterrolebinding.yaml

    kind: ClusterRoleBinding
    metadata:
      name: typha-cpha
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: typha-cpha
    subjects:
      - kind: ServiceAccount
        name: typha-cpha
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 14 15:32:57 UTC 2019
    - 321 bytes
    - Viewed (0)
  10. cluster/addons/calico-policy-controller/typha-vertical-autoscaler-clusterrolebinding.yaml

    kind: ClusterRoleBinding
    metadata:
      name: typha-cpva
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: typha-cpva
    subjects:
      - kind: ServiceAccount
        name: typha-cpva
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Nov 14 15:32:57 UTC 2019
    - 321 bytes
    - Viewed (0)
Back to top