- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 384 for rbacv1 (0.15 sec)
-
cluster/gce/addons/konnectivity-agent/konnectivity-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: system:konnectivity-server labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:auth-delegator subjects: - apiGroup: rbac.authorization.k8s.io kind: User
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Mar 02 01:24:48 UTC 2020 - 409 bytes - Viewed (0) -
pilot/pkg/security/authz/model/permission.go
return &rbacpb.Permission{ Rule: &rbacpb.Permission_OrRules{ OrRules: &rbacpb.Permission_Set{ Rules: permission, }, }, } } func permissionNot(permission *rbacpb.Permission) *rbacpb.Permission { return &rbacpb.Permission{ Rule: &rbacpb.Permission_NotRule{ NotRule: permission, }, } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 20 01:58:53 UTC 2024 - 3K bytes - Viewed (0) -
pilot/pkg/security/authz/model/principal.go
return &rbacpb.Principal{ Identifier: &rbacpb.Principal_OrIds{ OrIds: &rbacpb.Principal_Set{ Ids: principals, }, }, } } func principalAnd(principals []*rbacpb.Principal) *rbacpb.Principal { return &rbacpb.Principal{ Identifier: &rbacpb.Principal_AndIds{ AndIds: &rbacpb.Principal_Set{ Ids: principals, }, }, } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Nov 17 18:44:57 UTC 2022 - 2.8K bytes - Viewed (0) -
cluster/addons/fluentd-gcp/scaler-rbac.yaml
resources: - scalingpolicies verbs: - get --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: fluentd-gcp-scaler-binding namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system:fluentd-gcp-scaler subjects:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Dec 13 17:23:39 UTC 2019 - 1009 bytes - Viewed (0) -
cluster/addons/metadata-agent/stackdriver/metadata-agent-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: stackdriver:metadata-agent labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile rules: - apiGroups: - "*" resources: - "*" verbs: - watch - get - list --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: stackdriver:metadata-agent labels:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Aug 06 15:26:35 UTC 2018 - 685 bytes - Viewed (0) -
cluster/addons/kube-proxy/kube-proxy-rbac.yaml
--- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: system:kube-proxy labels: addonmanager.kubernetes.io/mode: Reconcile subjects: - kind: ServiceAccount name: kube-proxy namespace: kube-system roleRef: kind: ClusterRole name: system:node-proxier
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jun 03 18:46:08 UTC 2019 - 488 bytes - Viewed (0) -
cluster/addons/volumesnapshots/volume-snapshot-controller/rbac-volume-snapshot-controller.yaml
# RBAC file for the volume snapshot controller. apiVersion: v1 kind: ServiceAccount metadata: name: volume-snapshot-controller namespace: kube-system labels: kubernetes.io/cluster-service: "true" addonmanager.kubernetes.io/mode: Reconcile --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: # rename if there are conflicts name: volume-snapshot-controller-runner namespace: kube-system labels:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 16 14:09:47 UTC 2022 - 2.9K bytes - Viewed (0) -
cluster/addons/rbac/cluster-autoscaler/cluster-autoscaler-rbac.yaml
--- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: cluster-autoscaler labels: addonmanager.kubernetes.io/mode: Reconcile subjects: - kind: User name: cluster-autoscaler namespace: kube-system roleRef: kind: ClusterRole name: cluster-autoscaler
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 12 16:56:45 UTC 2020 - 2K bytes - Viewed (0) -
cluster/addons/kube-network-policies/kube-network-policies-rbac.yaml
- networkpolicies verbs: - watch - list --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: kube-network-policies labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:network-policies subjects: - kind: ServiceAccount name: kube-network-policies namespace: kube-system ---
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Apr 21 10:01:31 UTC 2024 - 1.1K bytes - Viewed (0) -
releasenotes/notes/invalid-rbac-filter.yaml
apiVersion: release-notes/v2 kind: bug-fix area: security issue: - https://github.com/istio/istio/issues/43785 releaseNotes: - |
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Mar 07 16:16:45 UTC 2023 - 238 bytes - Viewed (0)