- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 66 for role (0.1 sec)
-
manifests/charts/istio-control/istio-discovery/templates/role.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: istiod{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }} namespace: {{ .Values.global.istioNamespace }} labels: app: istiod release: {{ .Release.Name }} rules: # permissions to verify the webhook is ready and rejecting # invalid config. We use --server-dry-run so no config is persisted. - apiGroups: ["networking.istio.io"] verbs: ["create"]
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 04 16:21:31 UTC 2023 - 971 bytes - Viewed (0) -
manifests/charts/istiod-remote/templates/role.yaml
{{- if .Values.global.configCluster }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: istiod{{- if not (eq .Values.revision "")}}-{{ .Values.revision }}{{- end }} namespace: {{ .Values.global.istioNamespace }} labels: app: istiod release: {{ .Release.Name }} rules: # permissions to verify the webhook is ready and rejecting # invalid config. We use --server-dry-run so no config is persisted.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 04 16:21:31 UTC 2023 - 1021 bytes - Viewed (0) -
manifests/charts/gateway/templates/role.yaml
{{/*Set up roles for Istio Gateway. Not required for gateway-api*/}} {{- if .Values.rbac.enabled }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: {{ include "gateway.serviceAccountName" . }} namespace: {{ .Release.Namespace }} labels: {{- include "gateway.labels" . | nindent 4}} annotations: {{- .Values.annotations | toYaml | nindent 4 }} rules: - apiGroups: [""] resources: ["secrets"]
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Feb 21 16:58:32 UTC 2023 - 963 bytes - Viewed (0) -
manifests/charts/gateways/istio-egress/templates/role.yaml
{{ $gateway := index .Values "gateways" "istio-egressgateway" }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: {{ $gateway.name }}-sds namespace: {{ .Release.Namespace }} labels: release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" | quote }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "EgressGateways" rules:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 18 18:16:49 UTC 2024 - 538 bytes - Viewed (0) -
manifests/charts/gateways/istio-ingress/templates/role.yaml
{{ $gateway := index .Values "gateways" "istio-ingressgateway" }} apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: {{ $gateway.name }}-sds namespace: {{ .Release.Namespace }} labels: release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" | quote }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "IngressGateways" rules:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 18 18:16:49 UTC 2024 - 540 bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1beta1/generated.proto
repeated ClusterRole items = 2; } // PolicyRule holds information that describes a policy rule, but does not contain information // about who the rule applies to or which namespace the rule applies to. message PolicyRule { // Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs. repeated string verbs = 1;
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8.6K bytes - Viewed (0) -
releasenotes/notes/manifest-base-cleanup.yaml
| `ClusterRole istiod-reader` | `ClusterRole istio-reader-clusterrole` | | `ClusterRoleBinding istiod` | `ClusterRoleBinding istiod-clusterrole` | | `Role istiod` | `Role istiod` | | `RoleBinding istiod` | `RoleBinding istiod` |
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jul 27 04:26:43 UTC 2023 - 1.7K bytes - Viewed (0) -
prow/config/ambient-sc.yaml
# similar to default, but multi-node kind: Cluster apiVersion: kind.x-k8s.io/v1alpha4 nodes: - role: control-plane - role: worker - role: worker kubeadmConfigPatches: - | apiVersion: kubeadm.k8s.io/v1beta3 kind: ClusterConfiguration metadata: name: config etcd: local: # Run etcd in a tmpfs (in RAM) for performance improvements dataDir: /tmp/kind-cluster-etcd apiServer: extraArgs:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Nov 29 19:17:14 UTC 2023 - 693 bytes - Viewed (0) -
samples/security/spire/README.md
1. Delete the ClusterRole, ClusterRoleBinding, Role, RoleBindings, ValidatingWebhookConfiguration, CSIDriver, and CustomResourceDefinition: ```bash $ kubectl delete clusterrole spire-server-cluster-role spire-agent-cluster-role manager-role $ kubectl delete clusterrolebinding spire-server-cluster-role-binding spire-agent-cluster-role-binding manager-role-binding $ kubectl delete role spire-server-role leader-election-role
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Feb 24 22:08:56 UTC 2023 - 4.1K bytes - Viewed (0) -
pilot/cmd/pilot-agent/app/cmd_test.go
. "github.com/onsi/gomega" "istio.io/istio/pilot/cmd/pilot-agent/options" ) func TestPilotDefaultDomainKubernetes(t *testing.T) { g := NewWithT(t) role := &options.ProxyArgs{} role.DNSDomain = "" domain := getDNSDomain("default", role.DNSDomain) g.Expect(domain).To(Equal("default.svc.cluster.local"))
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 05 23:51:52 UTC 2024 - 935 bytes - Viewed (0)