Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 10 for PolicyRule (0.17 sec)

  1. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go

    		Rules: []rbacv1.PolicyRule{
    			rbacv1helpers.NewRule("create").Groups(legacyGroup).Resources("serviceaccounts").RuleOrDie(),
    			eventsRule(),
    		},
    	})
    	addControllerRole(&controllerRoles, &controllerRoleBindings, rbacv1.ClusterRole{
    		ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "service-controller"},
    		Rules: []rbacv1.PolicyRule{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 28.9K bytes
    - Viewed (0)
  2. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go

    	for i := range rolebindings {
    		addDefaultMetadata(&rolebindings[i])
    	}
    	return
    }
    
    // NodeRules returns node policy rules, it is slice of rbacv1.PolicyRule.
    func NodeRules() []rbacv1.PolicyRule {
    	nodePolicyRules := []rbacv1.PolicyRule{
    		// Needed to check API access.  These creates are non-mutating
    		rbacv1helpers.NewRule("create").Groups(authenticationGroup).Resources("tokenreviews").RuleOrDie(),
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 34.4K bytes
    - Viewed (0)
  3. staging/src/k8s.io/apiserver/pkg/util/flowcontrol/match_test.go

    				if !matchesPolicyRule(digest, &policyRule) {
    					t.Errorf("Fail: expected %s to match %#+v but it did not", fcfmt.Fmt(policyRule), digest)
    				}
    			}
    			for _, digest := range append(skippingRDigests, skippingNDigests...) {
    				if matchesPolicyRule(digest, &policyRule) {
    					t.Errorf("Fail: expected %s to not match %#+v but it did", fcfmt.Fmt(policyRule), digest)
    				}
    			}
    		})
    	}
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Oct 30 12:18:35 UTC 2023
    - 13.3K bytes
    - Viewed (0)
  4. staging/src/k8s.io/api/rbac/v1/types.go

    // 2. evaluation of RoleBindings in the namespace requested - short circuit on match
    // 3. deny by default
    
    // PolicyRule holds information that describes a policy rule, but does not contain information
    // about who the rule applies to or which namespace the rule applies to.
    type PolicyRule struct {
    	// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
    	// +listType=atomic
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 23 17:42:49 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  5. staging/src/k8s.io/api/rbac/v1alpha1/types.go

    // 2. evaluation of RoleBindings in the namespace requested - short circuit on match
    // 3. deny by default
    
    // PolicyRule holds information that describes a policy rule, but does not contain information
    // about who the rule applies to or which namespace the rule applies to.
    type PolicyRule struct {
    	// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
    	// +listType=atomic
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 22:49:19 UTC 2024
    - 11.2K bytes
    - Viewed (0)
  6. staging/src/k8s.io/api/rbac/v1beta1/types.go

    // 2. evaluation of RoleBindings in the namespace requested - short circuit on match
    // 3. deny by default
    
    // PolicyRule holds information that describes a policy rule, but does not contain information
    // about who the rule applies to or which namespace the rule applies to.
    type PolicyRule struct {
    	// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
    	// +listType=atomic
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 22:49:19 UTC 2024
    - 13.1K bytes
    - Viewed (0)
  7. staging/src/k8s.io/apiserver/pkg/apis/audit/v1/generated.proto

      // +optional
      optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
    
      repeated Policy items = 2;
    }
    
    // PolicyRule maps requests based off metadata to an audit Level.
    // Requests must match the rules of every field (an intersection of rules).
    message PolicyRule {
      // The Level that requests matching this rule are recorded at.
      optional string level = 1;
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 15:34:11 UTC 2024
    - 10.6K bytes
    - Viewed (0)
  8. staging/src/k8s.io/apiserver/pkg/apis/audit/types.go

    type PolicyList struct {
    	metav1.TypeMeta
    	// +optional
    	metav1.ListMeta
    
    	Items []Policy
    }
    
    // PolicyRule maps requests based off metadata to an audit Level.
    // Requests must match the rules of every field (an intersection of rules).
    type PolicyRule struct {
    	// The Level that requests matching this rule are recorded at.
    	Level Level
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Oct 03 09:18:23 UTC 2023
    - 11.8K bytes
    - Viewed (0)
  9. staging/src/k8s.io/apiserver/pkg/apis/audit/v1/types.go

    	Items []Policy `json:"items" protobuf:"bytes,2,rep,name=items"`
    }
    
    // PolicyRule maps requests based off metadata to an audit Level.
    // Requests must match the rules of every field (an intersection of rules).
    type PolicyRule struct {
    	// The Level that requests matching this rule are recorded at.
    	Level Level `json:"level" protobuf:"bytes,1,opt,name=level,casttype=Level"`
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Nov 27 20:24:10 UTC 2023
    - 14.5K bytes
    - Viewed (0)
  10. plugin/pkg/auth/authorizer/node/node_authorizer.go

    	nodeRules  []rbacv1.PolicyRule
    
    	// allows overriding for testing
    	features featuregate.FeatureGate
    }
    
    var _ = authorizer.Authorizer(&NodeAuthorizer{})
    var _ = authorizer.RuleResolver(&NodeAuthorizer{})
    
    // NewAuthorizer returns a new node authorizer
    func NewAuthorizer(graph *Graph, identifier nodeidentifier.NodeIdentifier, rules []rbacv1.PolicyRule) *NodeAuthorizer {
    	return &NodeAuthorizer{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 07 21:22:55 UTC 2024
    - 16K bytes
    - Viewed (0)
Back to top