- Sort Score
- Result 10 results
- Languages All
Results 71 - 80 of 898 for serviceAccount (0.26 sec)
-
pilot/pkg/serviceregistry/kube/controller/ambient/ambientindex_serviceentry_test.go
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Mar 27 03:01:04 UTC 2024 - 12.9K bytes - Viewed (0) -
cluster/addons/kube-network-policies/kube-network-policies-rbac.yaml
roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:network-policies subjects: - kind: ServiceAccount name: kube-network-policies namespace: kube-system --- apiVersion: v1 kind: ServiceAccount metadata: name: kube-network-policies namespace: kube-system labels: k8s-app: kube-network-policies kubernetes.io/cluster-service: "true"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Apr 21 10:01:31 UTC 2024 - 1.1K bytes - Viewed (0) -
manifests/charts/gateway/templates/_helpers.tpl
{{- with .Values.revision }} istio.io/rev: {{ . | quote }} {{- end }} {{- end }} {{- define "gateway.serviceAccountName" -}} {{- if .Values.serviceAccount.create }} {{- .Values.serviceAccount.name | default (include "gateway.name" .) }} {{- else }} {{- .Values.serviceAccount.name | default "default" }} {{- end }}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 22:42:29 UTC 2024 - 1.7K bytes - Viewed (0) -
pkg/test/framework/components/echo/common/deployment/echos.go
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 20 16:01:31 UTC 2024 - 16K bytes - Viewed (0) -
prow/config/metrics/metrics.yaml
subjects: - kind: ServiceAccount name: metrics-server namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: k8s-app: metrics-server name: system:metrics-server roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:metrics-server subjects: - kind: ServiceAccount name: metrics-server
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 11 20:51:38 UTC 2024 - 4.6K bytes - Viewed (0) -
manifests/charts/istio-cni/templates/clusterrolebinding.yaml
operator.istio.io/component: "Cni" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: {{ template "name" . }} subjects: - kind: ServiceAccount name: {{ template "name" . }} namespace: {{ .Release.Namespace }} --- {{- if .Values.cni.repair.enabled }} apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 17 21:52:29 UTC 2024 - 1.9K bytes - Viewed (0) -
pkg/controller/serviceaccount/config/v1alpha1/doc.go
limitations under the License. */ // +k8s:deepcopy-gen=package // +k8s:conversion-gen=k8s.io/kubernetes/pkg/controller/serviceaccount/config // +k8s:conversion-gen-external-types=k8s.io/kube-controller-manager/config/v1alpha1
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Mar 02 04:54:33 UTC 2019 - 857 bytes - Viewed (0) -
cluster/addons/fluentd-gcp/scaler-rbac.yaml
apiVersion: v1 kind: ServiceAccount metadata: name: fluentd-gcp-scaler namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: system:fluentd-gcp-scaler namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile rules:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Dec 13 17:23:39 UTC 2019 - 1009 bytes - Viewed (0) -
manifests/charts/ztunnel/templates/rbac.yaml
apiVersion: v1 kind: ServiceAccount {{- with .Values.imagePullSecrets }} imagePullSecrets: {{- range . }} - name: {{ . }} {{- end }} {{- end }} metadata: name: ztunnel namespace: {{ .Release.Namespace }} labels: {{- .Values.labels | toYaml | nindent 4}} annotations: {{- .Values.annotations | toYaml | nindent 4 }} --- {{- if (eq .Values.platform "openshift") }} apiVersion: rbac.authorization.k8s.io/v1
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat May 04 01:17:57 UTC 2024 - 1.3K bytes - Viewed (0) -
pkg/kubeapiserver/authenticator/config.go
} allPublicKeys = append(allPublicKeys, publicKeys...) } validator, err := serviceaccount.NewLegacyValidator(lookup, serviceAccountGetter, secretsWriter) if err != nil { return nil, fmt.Errorf("while creating legacy validator, err: %w", err) } tokenAuthenticator := serviceaccount.JWTTokenAuthenticator([]string{serviceaccount.LegacyIssuer}, allPublicKeys, apiAudiences, validator) return tokenAuthenticator, nil }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Mar 09 19:29:33 UTC 2024 - 15.4K bytes - Viewed (0)