Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 230 for rbacv1 (0.4 sec)

  1. pkg/controller/clusterroleaggregation/clusterroleaggregation_controller_test.go

    		return []rbacv1.PolicyRule{
    			{Verbs: []string{"saw"}, Resources: []string{"boards"}},
    		}
    	}
    	role := func(name string, labels map[string]string, rules []rbacv1.PolicyRule) *rbacv1.ClusterRole {
    		return &rbacv1.ClusterRole{
    			ObjectMeta: metav1.ObjectMeta{Name: name, Labels: labels},
    			Rules:      rules,
    		}
    	}
    	combinedRole := func(selectors []map[string]string, rules ...[]rbacv1.PolicyRule) *rbacv1.ClusterRole {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:46:12 UTC 2023
    - 9K bytes
    - Viewed (0)
  2. pkg/registry/rbac/validation/rule_test.go

    				Rules:      []rbacv1.PolicyRule{ruleWriteNodes},
    			},
    		},
    		roleBindings: []*rbacv1.RoleBinding{
    			{
    				ObjectMeta: metav1.ObjectMeta{Namespace: "namespace1"},
    				Subjects: []rbacv1.Subject{
    					{Kind: rbacv1.UserKind, Name: "foobar"},
    					{Kind: rbacv1.GroupKind, Name: "group1"},
    				},
    				RoleRef: rbacv1.RoleRef{APIGroup: rbacv1.GroupName, Kind: "Role", Name: "readthings"},
    			},
    		},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:46:12 UTC 2023
    - 7.9K bytes
    - Viewed (0)
  3. pkg/apis/rbac/v1/helpers.go

    	}
    	return r
    }
    
    func (r *ClusterRoleBindingBuilder) Users(users ...string) *ClusterRoleBindingBuilder {
    	for _, user := range users {
    		r.ClusterRoleBinding.Subjects = append(r.ClusterRoleBinding.Subjects, rbacv1.Subject{APIGroup: rbacv1.GroupName, Kind: rbacv1.UserKind, Name: user})
    	}
    	return r
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 18 15:37:57 UTC 2023
    - 7.4K bytes
    - Viewed (0)
  4. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go

    	"k8s.io/kubernetes/plugin/pkg/auth/authorizer/rbac/bootstrappolicy"
    )
    
    // semanticRoles is a few enumerated roles for which the relationships are well established
    // and we want to maintain symmetric roles
    type semanticRoles struct {
    	admin *rbacv1.ClusterRole
    	edit  *rbacv1.ClusterRole
    	view  *rbacv1.ClusterRole
    }
    
    func getSemanticRoles(roles []rbacv1.ClusterRole) semanticRoles {
    	ret := semanticRoles{}
    	for i := range roles {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:45:31 UTC 2023
    - 9.5K bytes
    - Viewed (0)
  5. pkg/apis/rbac/v1/evaluation_helpers.go

    package v1
    
    import (
    	"fmt"
    	"strings"
    
    	rbacv1 "k8s.io/api/rbac/v1"
    )
    
    func VerbMatches(rule *rbacv1.PolicyRule, requestedVerb string) bool {
    	for _, ruleVerb := range rule.Verbs {
    		if ruleVerb == rbacv1.VerbAll {
    			return true
    		}
    		if ruleVerb == requestedVerb {
    			return true
    		}
    	}
    
    	return false
    }
    
    func APIGroupMatches(rule *rbacv1.PolicyRule, requestedGroup string) bool {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 18 15:37:57 UTC 2023
    - 3.8K bytes
    - Viewed (0)
  6. pkg/controller/clusterroleaggregation/clusterroleaggregation_controller.go

    	return err
    }
    
    func toApplyPolicyRules(rules []rbacv1.PolicyRule) []*rbacv1ac.PolicyRuleApplyConfiguration {
    	var result []*rbacv1ac.PolicyRuleApplyConfiguration
    	for _, rule := range rules {
    		result = append(result, toApplyPolicyRule(rule))
    	}
    	return result
    }
    
    func toApplyPolicyRule(rule rbacv1.PolicyRule) *rbacv1ac.PolicyRuleApplyConfiguration {
    	result := rbacv1ac.PolicyRule()
    	result.Resources = rule.Resources
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 8K bytes
    - Viewed (0)
  7. cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap_test.go

    }
    
    func newMockRbacClientForTest(t *testing.T, clusterRole *rbac.ClusterRole, clusterRoleBinding *rbac.ClusterRoleBinding) *clientsetfake.Clientset {
    	client := clientsetfake.NewSimpleClientset()
    	_, err := client.RbacV1().ClusterRoles().Create(context.TODO(), clusterRole, metav1.CreateOptions{})
    	if err != nil {
    		t.Fatalf("error creating ClusterRoles: %v", err)
    	}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Oct 18 04:16:31 UTC 2023
    - 8.1K bytes
    - Viewed (0)
  8. pkg/registry/rbac/clusterrolebinding/policybased/storage.go

    package policybased
    
    import (
    	"context"
    
    	rbacv1 "k8s.io/api/rbac/v1"
    	"k8s.io/apimachinery/pkg/api/errors"
    	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
    	"k8s.io/apimachinery/pkg/runtime"
    	"k8s.io/apiserver/pkg/authorization/authorizer"
    	"k8s.io/apiserver/pkg/registry/rest"
    	kapihelper "k8s.io/kubernetes/pkg/apis/core/helper"
    	"k8s.io/kubernetes/pkg/apis/rbac"
    	rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1"
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Nov 18 10:11:16 UTC 2022
    - 4.9K bytes
    - Viewed (0)
  9. pkg/registry/rbac/rolebinding/policybased/storage.go

    	"k8s.io/apiserver/pkg/registry/rest"
    	kapihelper "k8s.io/kubernetes/pkg/apis/core/helper"
    	"k8s.io/kubernetes/pkg/apis/rbac"
    	rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1"
    	rbacregistry "k8s.io/kubernetes/pkg/registry/rbac"
    	rbacregistryvalidation "k8s.io/kubernetes/pkg/registry/rbac/validation"
    )
    
    var groupResource = rbac.Resource("rolebindings")
    
    type Storage struct {
    	rest.StandardStorage
    
    	authorizer authorizer.Authorizer
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Nov 18 10:11:16 UTC 2022
    - 5.5K bytes
    - Viewed (0)
  10. cmd/kube-controller-manager/app/rbac.go

    	go clusterroleaggregation.NewClusterRoleAggregation(
    		controllerContext.InformerFactory.Rbac().V1().ClusterRoles(),
    		controllerContext.ClientBuilder.ClientOrDie("clusterrole-aggregation-controller").RbacV1(),
    	).Run(ctx, 5)
    	return nil, true, nil
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Oct 27 11:28:02 UTC 2023
    - 1.4K bytes
    - Viewed (0)
Back to top