- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 411 for rbacv1 (0.15 sec)
-
manifests/charts/ztunnel/templates/rbac.yaml
verbs: ["use"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: ztunnel labels: app: ztunnel release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: ztunnel
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat May 04 01:17:57 UTC 2024 - 1.3K bytes - Viewed (0) -
istioctl/pkg/authz/listener.go
addPolicy(action, anonymousName, "0") } } } } buf := strings.Builder{} buf.WriteString("ACTION\tAuthorizationPolicy\tRULES\n") for _, action := range []rbacpb.RBAC_Action{rbacpb.RBAC_DENY, rbacpb.RBAC_ALLOW, rbacpb.RBAC_LOG} { if names, ok := actionToPolicy[action]; ok { sortedNames := make([]string, 0, len(names)) for name := range names { sortedNames = append(sortedNames, name) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Sep 11 15:29:30 UTC 2023 - 6K bytes - Viewed (0) -
pilot/pkg/security/authz/model/permission.go
return &rbacpb.Permission{ Rule: &rbacpb.Permission_OrRules{ OrRules: &rbacpb.Permission_Set{ Rules: permission, }, }, } } func permissionNot(permission *rbacpb.Permission) *rbacpb.Permission { return &rbacpb.Permission{ Rule: &rbacpb.Permission_NotRule{ NotRule: permission, }, } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 20 01:58:53 UTC 2024 - 3K bytes - Viewed (0) -
pilot/pkg/security/authz/model/principal.go
return &rbacpb.Principal{ Identifier: &rbacpb.Principal_OrIds{ OrIds: &rbacpb.Principal_Set{ Ids: principals, }, }, } } func principalAnd(principals []*rbacpb.Principal) *rbacpb.Principal { return &rbacpb.Principal{ Identifier: &rbacpb.Principal_AndIds{ AndIds: &rbacpb.Principal_Set{ Ids: principals, }, }, } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Nov 17 18:44:57 UTC 2022 - 2.8K bytes - Viewed (0) -
pilot/pkg/networking/grpcgen/lds.go
// // nolint: unparam func buildRBAC(node *model.Proxy, push *model.PushContext, suffix string, context *tls.DownstreamTlsContext, a rbacpb.RBAC_Action, policies []model.AuthorizationPolicy, ) *rbacpb.RBAC { rules := &rbacpb.RBAC{ Action: a, Policies: map[string]*rbacpb.Policy{}, } for _, policy := range policies { for i, rule := range policy.Spec.Rules {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 22:20:44 UTC 2024 - 14.6K bytes - Viewed (0) -
pilot/pkg/security/authz/model/model.go
var permissions []*rbacpb.Permission if r.extended != nil { if len(r.values) > 0 { p, err := r.extended.extendedPermission(r.key, r.values, forTCP) if err := r.checkError(action, err); err != nil { return nil, err } if p != nil { permissions = append(permissions, p) } } } else { var or []*rbacpb.Permission
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 25 10:39:25 UTC 2024 - 13.8K bytes - Viewed (0) -
cluster/addons/volumesnapshots/volume-snapshot-controller/rbac-volume-snapshot-controller.yaml
# RBAC file for the volume snapshot controller. apiVersion: v1 kind: ServiceAccount metadata: name: volume-snapshot-controller namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: # rename if there are conflicts name: volume-snapshot-controller-runner namespace: kube-system labels:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 16 14:09:47 UTC 2022 - 2.9K bytes - Viewed (0) -
pilot/pkg/security/authz/model/model_test.go
}, }, }, }, { Identifier: &rbacpb.Principal_NotId{ NotId: &rbacpb.Principal{ Identifier: &rbacpb.Principal_OrIds{ OrIds: &rbacpb.Principal_Set{ Ids: []*rbacpb.Principal{ { Identifier: &rbacpb.Principal_Authenticated_{ Authenticated: &rbacpb.Principal_Authenticated{ PrincipalName: &matcherv3.StringMatcher{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 20 22:15:12 UTC 2023 - 10K bytes - Viewed (0) -
cluster/addons/kube-network-policies/kube-network-policies-rbac.yaml
- networkpolicies verbs: - watch - list --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: kube-network-policies labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:network-policies subjects: - kind: ServiceAccount name: kube-network-policies namespace: kube-system ---
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Apr 21 10:01:31 UTC 2024 - 1.1K bytes - Viewed (0) -
releasenotes/notes/invalid-rbac-filter.yaml
apiVersion: release-notes/v2 kind: bug-fix area: security issue: - https://github.com/istio/istio/issues/43785 releaseNotes: - |
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Mar 07 16:16:45 UTC 2023 - 238 bytes - Viewed (0)