- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 117 for roleRef (0.27 sec)
-
pkg/apis/rbac/v1alpha1/conversion_test.go
expected *rbacapi.RoleBinding }{ "specific user": { old: &v1alpha1.RoleBinding{ RoleRef: v1alpha1.RoleRef{Name: "foo", APIGroup: v1alpha1.GroupName}, Subjects: []v1alpha1.Subject{{Kind: "User", APIVersion: v1alpha1.SchemeGroupVersion.String(), Name: "bob"}}, }, expected: &rbacapi.RoleBinding{ RoleRef: rbacapi.RoleRef{Name: "foo", APIGroup: v1alpha1.GroupName},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 15:23:55 UTC 2017 - 4K bytes - Viewed (0) -
cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap_test.go
name: "ClusterRoleBindings already exists", client: newMockClusterRoleBinddingClientForTest(t, &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: constants.NodeKubeletBootstrap, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: constants.NodeBootstrapperClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 04:16:31 UTC 2023 - 8.1K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml
metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: cluster-admin roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:masters
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 11 19:01:47 UTC 2020 - 5.7K bytes - Viewed (0) -
pkg/registry/rbac/escalation_check.go
// This occurs after defaulting and conversion, so values pulled from the roleRef won't change // Invalid APIGroup or Name values will fail validation switch roleRef.Kind { case "ClusterRole": attrs.APIGroup = roleRef.APIGroup attrs.APIVersion = "*" attrs.Resource = "clusterroles" attrs.Name = roleRef.Name case "Role": attrs.APIGroup = roleRef.APIGroup attrs.APIVersion = "*" attrs.Resource = "roles"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 4.3K bytes - Viewed (0) -
cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap.go
return apiclient.CreateOrUpdateClusterRoleBinding(client, &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: constants.NodeKubeletBootstrap, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: constants.NodeBootstrapperClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Oct 15 10:49:52 UTC 2023 - 4.2K bytes - Viewed (0) -
pkg/apis/rbac/v1alpha1/defaults.go
return RegisterDefaults(scheme) } func SetDefaults_ClusterRoleBinding(obj *rbacv1alpha1.ClusterRoleBinding) { if len(obj.RoleRef.APIGroup) == 0 { obj.RoleRef.APIGroup = GroupName } } func SetDefaults_RoleBinding(obj *rbacv1alpha1.RoleBinding) { if len(obj.RoleRef.APIGroup) == 0 { obj.RoleRef.APIGroup = GroupName } } func SetDefaults_Subject(obj *rbacv1alpha1.Subject) { if len(obj.APIVersion) == 0 {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jun 22 18:30:51 UTC 2017 - 1.4K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1/generated.proto
// Subjects holds references to the objects the role applies to. // +optional repeated Subject subjects = 2; // RoleRef can only reference a ClusterRole in the global namespace. // If the RoleRef cannot be resolved, the Authorizer must return an error. optional RoleRef roleRef = 3; } // ClusterRoleBindingList is a collection of ClusterRoleBindings message ClusterRoleBindingList { // Standard object's metadata.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 7.6K bytes - Viewed (0) -
pkg/registry/rbac/clusterrolebinding/policybased/storage.go
clusterRoleBinding := obj.(*rbac.ClusterRoleBinding) if rbacregistry.BindingAuthorized(ctx, clusterRoleBinding.RoleRef, metav1.NamespaceNone, s.authorizer) { return s.StandardStorage.Create(ctx, obj, createValidation, options) } v1RoleRef := rbacv1.RoleRef{} err := rbacv1helpers.Convert_rbac_RoleRef_To_v1_RoleRef(&clusterRoleBinding.RoleRef, &v1RoleRef, nil) if err != nil { return nil, err }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 4.9K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/namespace-role-bindings.yaml
rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:bootstrap-signer namespace: kube-public roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system:controller:bootstrap-signer subjects: - kind: ServiceAccount name: bootstrap-signer namespace: kube-system
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Feb 08 16:15:52 UTC 2019 - 3.9K bytes - Viewed (0) -
pkg/apis/rbac/v1/defaults.go
return RegisterDefaults(scheme) } func SetDefaults_ClusterRoleBinding(obj *rbacv1.ClusterRoleBinding) { if len(obj.RoleRef.APIGroup) == 0 { obj.RoleRef.APIGroup = GroupName } } func SetDefaults_RoleBinding(obj *rbacv1.RoleBinding) { if len(obj.RoleRef.APIGroup) == 0 { obj.RoleRef.APIGroup = GroupName } } func SetDefaults_Subject(obj *rbacv1.Subject) { if len(obj.APIGroup) == 0 { switch obj.Kind {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Aug 09 21:04:54 UTC 2017 - 1.3K bytes - Viewed (0)