- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 13 for PolicyRule (0.15 sec)
-
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go
Rules: []rbacv1.PolicyRule{ rbacv1helpers.NewRule("create").Groups(legacyGroup).Resources("serviceaccounts").RuleOrDie(), eventsRule(), }, }) addControllerRole(&controllerRoles, &controllerRoleBindings, rbacv1.ClusterRole{ ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "service-controller"}, Rules: []rbacv1.PolicyRule{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 28.9K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
for i := range rolebindings { addDefaultMetadata(&rolebindings[i]) } return } // NodeRules returns node policy rules, it is slice of rbacv1.PolicyRule. func NodeRules() []rbacv1.PolicyRule { nodePolicyRules := []rbacv1.PolicyRule{ // Needed to check API access. These creates are non-mutating rbacv1helpers.NewRule("create").Groups(authenticationGroup).Resources("tokenreviews").RuleOrDie(),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 34.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/util/flowcontrol/match_test.go
if !matchesPolicyRule(digest, &policyRule) { t.Errorf("Fail: expected %s to match %#+v but it did not", fcfmt.Fmt(policyRule), digest) } } for _, digest := range append(skippingRDigests, skippingNDigests...) { if matchesPolicyRule(digest, &policyRule) { t.Errorf("Fail: expected %s to not match %#+v but it did", fcfmt.Fmt(policyRule), digest) } } }) } }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Oct 30 12:18:35 UTC 2023 - 13.3K bytes - Viewed (0) -
pkg/apis/rbac/validation/validation_test.go
}.test(t) } func TestValidateRoleNonResourceURL(t *testing.T) { ValidateClusterRoleTest{ role: rbac.ClusterRole{ ObjectMeta: metav1.ObjectMeta{ Name: "default", }, Rules: []rbac.PolicyRule{{ Verbs: []string{"get"}, NonResourceURLs: []string{"/*"}, }}, }, wantErr: false, }.test(t) } func TestValidateRoleNamespacedNonResourceURL(t *testing.T) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 02 07:48:42 UTC 2023 - 14.1K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/types.go
// 2. evaluation of RoleBindings in the namespace requested - short circuit on match // 3. deny by default // PolicyRule holds information that describes a policy rule, but does not contain information // about who the rule applies to or which namespace the rule applies to. type PolicyRule struct { // Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs. // +listType=atomic
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 23 17:42:49 UTC 2024 - 10.7K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1alpha1/types.go
// 2. evaluation of RoleBindings in the namespace requested - short circuit on match // 3. deny by default // PolicyRule holds information that describes a policy rule, but does not contain information // about who the rule applies to or which namespace the rule applies to. type PolicyRule struct { // Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs. // +listType=atomic
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 22:49:19 UTC 2024 - 11.2K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1beta1/types.go
// 2. evaluation of RoleBindings in the namespace requested - short circuit on match // 3. deny by default // PolicyRule holds information that describes a policy rule, but does not contain information // about who the rule applies to or which namespace the rule applies to. type PolicyRule struct { // Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs. // +listType=atomic
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 22:49:19 UTC 2024 - 13.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/apis/audit/v1/generated.proto
// +optional optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; repeated Policy items = 2; } // PolicyRule maps requests based off metadata to an audit Level. // Requests must match the rules of every field (an intersection of rules). message PolicyRule { // The Level that requests matching this rule are recorded at. optional string level = 1;
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 15:34:11 UTC 2024 - 10.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/apis/audit/types.go
type PolicyList struct { metav1.TypeMeta // +optional metav1.ListMeta Items []Policy } // PolicyRule maps requests based off metadata to an audit Level. // Requests must match the rules of every field (an intersection of rules). type PolicyRule struct { // The Level that requests matching this rule are recorded at. Level Level
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Oct 03 09:18:23 UTC 2023 - 11.8K bytes - Viewed (0) -
pkg/apis/rbac/validation/validation.go
return allErrs } // ValidatePolicyRule is exported to allow types outside of the RBAC API group to embed a rbac.PolicyRule and reuse this validation logic func ValidatePolicyRule(rule rbac.PolicyRule, isNamespaced bool, fldPath *field.Path) field.ErrorList { allErrs := field.ErrorList{} if len(rule.Verbs) == 0 {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Nov 08 01:48:21 UTC 2022 - 10.4K bytes - Viewed (0)