- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 257 for rbacv1 (0.3 sec)
-
pilot/pkg/security/authz/model/permission.go
return &rbacpb.Permission{ Rule: &rbacpb.Permission_OrRules{ OrRules: &rbacpb.Permission_Set{ Rules: permission, }, }, } } func permissionNot(permission *rbacpb.Permission) *rbacpb.Permission { return &rbacpb.Permission{ Rule: &rbacpb.Permission_NotRule{ NotRule: permission, }, } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 20 01:58:53 UTC 2024 - 3K bytes - Viewed (0) -
pilot/pkg/networking/grpcgen/lds.go
// // nolint: unparam func buildRBAC(node *model.Proxy, push *model.PushContext, suffix string, context *tls.DownstreamTlsContext, a rbacpb.RBAC_Action, policies []model.AuthorizationPolicy, ) *rbacpb.RBAC { rules := &rbacpb.RBAC{ Action: a, Policies: map[string]*rbacpb.Policy{}, } for _, policy := range policies { for i, rule := range policy.Spec.Rules {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 22:20:44 UTC 2024 - 14.6K bytes - Viewed (0) -
pilot/pkg/security/authz/model/model.go
var permissions []*rbacpb.Permission if r.extended != nil { if len(r.values) > 0 { p, err := r.extended.extendedPermission(r.key, r.values, forTCP) if err := r.checkError(action, err); err != nil { return nil, err } if p != nil { permissions = append(permissions, p) } } } else { var or []*rbacpb.Permission
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 25 10:39:25 UTC 2024 - 13.8K bytes - Viewed (0) -
cluster/addons/kube-network-policies/kube-network-policies-rbac.yaml
- networkpolicies verbs: - watch - list --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: kube-network-policies labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:network-policies subjects: - kind: ServiceAccount name: kube-network-policies namespace: kube-system ---
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Apr 21 10:01:31 UTC 2024 - 1.1K bytes - Viewed (0) -
pilot/pkg/security/authz/model/generator.go
type generator interface { permission(key, value string, forTCP bool) (*rbacpb.Permission, error) principal(key, value string, forTCP bool, useAuthenticated bool) (*rbacpb.Principal, error) } type extendedGenerator interface { extendedPermission(key string, value []string, forTCP bool) (*rbacpb.Permission, error) extendedPrincipal(key string, value []string, forTCP bool) (*rbacpb.Principal, error) } type destIPGenerator struct{}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 03 18:02:42 UTC 2024 - 14.1K bytes - Viewed (0) -
pilot/pkg/security/authz/model/generator_test.go
} }) } } func yamlPermission(t *testing.T, yaml string) *rbacpb.Permission { t.Helper() p := &rbacpb.Permission{} if err := protomarshal.ApplyYAML(yaml, p); err != nil { t.Fatalf("failed to parse yaml: %s", err) } return p } func yamlPrincipal(t *testing.T, yaml string) *rbacpb.Principal { t.Helper() p := &rbacpb.Principal{} if err := protomarshal.ApplyYAML(yaml, p); err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 20 01:58:53 UTC 2024 - 13K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1alpha1.ClusterRole.json
{ "kind": "ClusterRole", "apiVersion": "rbac.authorization.k8s.io/v1alpha1", "metadata": { "name": "nameValue", "generateName": "generateNameValue", "namespace": "namespaceValue", "selfLink": "selfLinkValue", "uid": "uidValue", "resourceVersion": "resourceVersionValue", "generation": 7, "creationTimestamp": "2008-01-01T01:01:01Z", "deletionTimestamp": "2009-01-01T01:01:01Z",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 08:52:25 UTC 2024 - 1.8K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1alpha1.Role.yaml
apiVersion: rbac.authorization.k8s.io/v1alpha1 kind: Role metadata: annotations: annotationsKey: annotationsValue creationTimestamp: "2008-01-01T01:01:01Z" deletionGracePeriodSeconds: 10 deletionTimestamp: "2009-01-01T01:01:01Z" finalizers: - finalizersValue generateName: generateNameValue generation: 7 labels: labelsKey: labelsValue managedFields: - apiVersion: apiVersionValue
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 08:52:25 UTC 2024 - 1K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1beta1.Role.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1 kind: Role metadata: annotations: annotationsKey: annotationsValue creationTimestamp: "2008-01-01T01:01:01Z" deletionGracePeriodSeconds: 10 deletionTimestamp: "2009-01-01T01:01:01Z" finalizers: - finalizersValue generateName: generateNameValue generation: 7 labels: labelsKey: labelsValue managedFields: - apiVersion: apiVersionValue
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 08:52:25 UTC 2024 - 1K bytes - Viewed (0) -
staging/src/k8s.io/api/testdata/v1.30.0/rbac.authorization.k8s.io.v1.Role.json
{ "kind": "Role", "apiVersion": "rbac.authorization.k8s.io/v1", "metadata": { "name": "nameValue", "generateName": "generateNameValue", "namespace": "namespaceValue", "selfLink": "selfLinkValue", "uid": "uidValue", "resourceVersion": "resourceVersionValue", "generation": 7, "creationTimestamp": "2008-01-01T01:01:01Z", "deletionTimestamp": "2009-01-01T01:01:01Z", "deletionGracePeriodSeconds": 10,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 08:52:25 UTC 2024 - 1.5K bytes - Viewed (0)