- Sort Score
- Num 10 results
- Language All
Results 21 - 30 of 418 for roles (0.05 seconds)
-
CHANGELOG/CHANGELOG-1.22.md
- The `system:aggregate-to-edit` role no longer includes write access to the Endpoints API. For new Kubernetes 1.22 clusters, the `edit` and `admin` roles will no longer include that access in newly created Kubernetes 1.22 clusters. This will have no affect on existing clusters upgrading to Kubernetes 1.22. To retain write access to Endpoints in the aggregated `edit` and `admin` roles for newly created 1.22 clusters, refer to https://github.com/kubernetes/website/pull/29025....
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Tue Dec 13 12:43:45 GMT 2022 - 454.1K bytes - Click Count (0) -
cmd/iam.go
// expiry. The permissions for these STS credentials is determined in one of the // following ways: // // - RoleARN - if a role-arn is specified in the request, the STS credential's // policy is the role's policy. // // - inherited from parent - this is the case for AssumeRole API, where the // parent user is an actual real user with their own (permanent) credentials and
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed Oct 15 17:00:45 GMT 2025 - 76.5K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.8.md
passed a file which contains RBAC roles, rolebindings, clusterroles, or clusterrolebindings, this command computes covers and adds the missing rules. The logic required to properly apply RBAC permissions is more complicated than a JSON merge because you have to compute logical covers operations between rule sets. This means that we cannot use `kubectl apply` to update RBAC roles
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Tue Feb 20 15:45:02 GMT 2024 - 312.2K bytes - Click Count (0) -
docs/changelogs/changelog_3x.md
it keeps your `HeldCertificate` and its chain. On the client it keeps the root certificates that are trusted to sign a server's certificate chain. `HandshakeCertificates` also works with mutual TLS where these roles are reversed. These classes make it possible to enable HTTPS in MockWebServer in [just a few lines of code][https_server_sample].Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Sun Feb 06 14:55:54 GMT 2022 - 50.8K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.6.md
s://kubernetes.io/docs/concepts/configuration/assign-pod-node/). Node affinity/anti-affinity allow you to specify rules for restricting which node(s) a pod can schedule onto, based on the labels on the node. Pod affinity/anti-affinity allow you to specify rules for spreading and packing pods relative to one another, across arbitrary topologies (node, zone, etc.) These affinity rules are now be specified in a new-in-1.6 `affinity` field of the PodSpec. Kubernetes 1.6 continues to support the alpha...
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu Dec 24 02:28:26 GMT 2020 - 304K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.5.md
- **Auth** - [alpha] Further polishing of the Role-based access control alpha API including a default set of cluster roles. ([docs](http://kubernetes.io/docs/admin/authorization/)) ([kubernetes/features#2](https://github.com/kubernetes/enhancements/issues/2))
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu Dec 24 02:28:26 GMT 2020 - 136.4K bytes - Click Count (0) -
internal/event/rules.go
return pattern } // Rules - event rules type Rules map[string]TargetIDSet // Add - adds pattern and target ID. func (rules Rules) Add(pattern string, targetID TargetID) { rules[pattern] = NewTargetIDSet(targetID).Union(rules[pattern]) } // MatchSimple - returns true one of the matching object name in rules. func (rules Rules) MatchSimple(objectName string) bool { for pattern := range rules {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri May 24 23:05:23 GMT 2024 - 2.7K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.10.md
as well as hostIPC and hostPID. hostNetwork is also checked to deny exec /attach. ([#56839](https://github.com/kubernetes/kubernetes/pull/56839), [@hzxuzhonghu](https://github.com/hzxuzhonghu)) * When using Role-Based Access Control, the "admin", "edit", and "view" roles now have the expected permissions on NetworkPolicy resources, rather than reserving those permissions to only cluster-admin. ([#56650](https://github.com/kubernetes/kubernetes/pull/56650), [@danwinship](https://github.com/danwinship))...
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 341.8K bytes - Click Count (0) -
docs/sts/assume-role.md
``` > NOTE: In the following commands `--role-arn` and `--role-session-name` are not meaningful for MinIO and can be set to any value satisfying the command line requirements. ``` $ aws --profile foobar --endpoint-url http://localhost:9000 sts assume-role --policy '{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:*","Resource":"arn:aws:s3:::*"}]}' --role-arn arn:xxx:xxx:xxx:xxxx --role-session-name anything {Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 7.2K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.35.md
- Fixed a bug that caused duplicate validation when updating role and role binding resources. ([#132550](https://github.com/kubernetes/kubernetes/pull/132550), [@gavinkflam](https://github.com/gavinkflam)) [SIG Auth]
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Wed Dec 17 13:01:55 GMT 2025 - 228.5K bytes - Click Count (0)