- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 35 for clusterRoleBindings (0.4 sec)
-
cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap_test.go
) func TestAllowBootstrapTokensToPostCSRs(t *testing.T) { tests := []struct { name string client clientset.Interface }{ { name: "ClusterRoleBindings is empty", client: clientsetfake.NewSimpleClientset(), }, { name: "ClusterRoleBindings already exists", client: newMockClusterRoleBinddingClientForTest(t, &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 04:16:31 UTC 2023 - 8.1K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/subject_locator_test.go
clusterRoles []*rbacv1.ClusterRole clusterRoleBindings []*rbacv1.ClusterRoleBinding superUser string actionsToSubjects []actionToSubjects }{ { name: "no super user, star matches star", clusterRoles: []*rbacv1.ClusterRole{ newClusterRole("admin", newRule("*", "*", "*", "*")), }, clusterRoleBindings: []*rbacv1.ClusterRoleBinding{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 5.6K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/subject_locator.go
subjectLocator := &SubjectAccessEvaluator{ superUser: superUser, roleBindingLister: roleBindings, clusterRoleBindingLister: clusterRoleBindings, roleToRuleMapper: rbacregistryvalidation.NewDefaultRuleResolver(
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 4.7K bytes - Viewed (0) -
pkg/registry/rbac/rest/storage_rbac_test.go
for n := 0; n < b.N; n++ { var policy = &PolicyData{ ClusterRoles: append(bootstrappolicy.ClusterRoles(), bootstrappolicy.ControllerRoles()...), ClusterRoleBindings: append(bootstrappolicy.ClusterRoleBindings(), bootstrappolicy.ControllerRoleBindings()...), Roles: bootstrappolicy.NamespaceRoles(), RoleBindings: bootstrappolicy.NamespaceRoleBindings(),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jan 02 03:03:06 UTC 2021 - 1.4K bytes - Viewed (0) -
pkg/registry/rbac/clusterrolebinding/strategy.go
// Strategy should implement rest.RESTUpdateStrategy var _ rest.RESTUpdateStrategy = Strategy // NamespaceScoped is false for ClusterRoleBindings. func (strategy) NamespaceScoped() bool { return false } // AllowCreateOnUpdate is true for ClusterRoleBindings. func (strategy) AllowCreateOnUpdate() bool { return true } // PrepareForCreate clears fields that are not allowed to be set by end users
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 18 14:42:36 UTC 2021 - 3.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/audit/policy/reader_test.go
users: ["tim"] userGroups: ["testers", "developers"] verbs: ["patch", "delete", "create"] resources: - group: "" - group: "rbac.authorization.k8s.io" resources: ["clusterroles", "clusterrolebindings"] namespaces: ["default", "kube-system"] - level: Metadata ` const policyWithNoVersionOrKind = ` rules: - level: None nonResourceURLs: - /healthz* - /version
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 4.2K bytes - Viewed (0) -
cmd/kubeadm/app/util/apiclient/dryrunclient_test.go
[dryrun] Resource name: "kubernetes" `), }, { name: "action GET on clusterrolebindings", action: core.NewRootGetAction(schema.GroupVersionResource{Group: rbac.GroupName, Version: rbac.SchemeGroupVersion.Version, Resource: "clusterrolebindings"}, "system:node"), expectedBytes: []byte(`[dryrun] Would perform action GET on resource "clusterrolebindings" in API group "rbac.authorization.k8s.io/v1" [dryrun] Resource name: "system:node" `),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Dec 21 09:49:59 UTC 2022 - 4.5K bytes - Viewed (0) -
tests/integration/create_cluster_gke.sh
--no-enable-legacy-authorization # This is a hack to handle the case where clusterrolebinding creation returns: # # Error from server (Forbidden): clusterrolebindings.rbac.authorization.k8s.io is forbidden: User "client" cannot # create clusterrolebindings.rbac.authorization.k8s.io at the cluster scope gcloud config set container/use_client_certificate False # Download the credentials for the cluster.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Mar 12 16:02:51 UTC 2022 - 3.8K bytes - Viewed (0) -
api/discovery/apis__rbac.authorization.k8s.io__v1.json
{ "apiVersion": "v1", "groupVersion": "rbac.authorization.k8s.io/v1", "kind": "APIResourceList", "resources": [ { "kind": "ClusterRoleBinding", "name": "clusterrolebindings", "namespaced": false, "singularName": "clusterrolebinding", "storageVersionHash": "48tpQ8gZHFc=", "verbs": [ "create", "delete", "deletecollection", "get", "list",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon May 15 18:18:19 UTC 2023 - 1.5K bytes - Viewed (0) -
operator/cmd/mesh/testdata/operator/output/operator-dump.json
"*" ] }, { "apiGroups": [ "rbac.authorization.k8s.io" ], "resources": [ "clusterrolebindings", "clusterroles", "roles", "rolebindings" ], "verbs": [ "*" ] }, {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Feb 10 01:35:08 UTC 2023 - 4.1K bytes - Viewed (0)