Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for PolicyRule (0.4 sec)

  1. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go

    		Rules: []rbacv1.PolicyRule{
    			rbacv1helpers.NewRule("create").Groups(legacyGroup).Resources("serviceaccounts").RuleOrDie(),
    			eventsRule(),
    		},
    	})
    	addControllerRole(&controllerRoles, &controllerRoleBindings, rbacv1.ClusterRole{
    		ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "service-controller"},
    		Rules: []rbacv1.PolicyRule{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 28.9K bytes
    - Viewed (0)
  2. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go

    	for i := range rolebindings {
    		addDefaultMetadata(&rolebindings[i])
    	}
    	return
    }
    
    // NodeRules returns node policy rules, it is slice of rbacv1.PolicyRule.
    func NodeRules() []rbacv1.PolicyRule {
    	nodePolicyRules := []rbacv1.PolicyRule{
    		// Needed to check API access.  These creates are non-mutating
    		rbacv1helpers.NewRule("create").Groups(authenticationGroup).Resources("tokenreviews").RuleOrDie(),
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 34.4K bytes
    - Viewed (0)
  3. staging/src/k8s.io/api/rbac/v1/types.go

    // 2. evaluation of RoleBindings in the namespace requested - short circuit on match
    // 3. deny by default
    
    // PolicyRule holds information that describes a policy rule, but does not contain information
    // about who the rule applies to or which namespace the rule applies to.
    type PolicyRule struct {
    	// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
    	// +listType=atomic
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 23 17:42:49 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  4. staging/src/k8s.io/api/rbac/v1alpha1/types.go

    // 2. evaluation of RoleBindings in the namespace requested - short circuit on match
    // 3. deny by default
    
    // PolicyRule holds information that describes a policy rule, but does not contain information
    // about who the rule applies to or which namespace the rule applies to.
    type PolicyRule struct {
    	// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
    	// +listType=atomic
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 22:49:19 UTC 2024
    - 11.2K bytes
    - Viewed (0)
  5. staging/src/k8s.io/api/rbac/v1beta1/types.go

    // 2. evaluation of RoleBindings in the namespace requested - short circuit on match
    // 3. deny by default
    
    // PolicyRule holds information that describes a policy rule, but does not contain information
    // about who the rule applies to or which namespace the rule applies to.
    type PolicyRule struct {
    	// Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
    	// +listType=atomic
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 22:49:19 UTC 2024
    - 13.1K bytes
    - Viewed (0)
  6. staging/src/k8s.io/apiserver/pkg/apis/audit/v1/generated.proto

      // +optional
      optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
    
      repeated Policy items = 2;
    }
    
    // PolicyRule maps requests based off metadata to an audit Level.
    // Requests must match the rules of every field (an intersection of rules).
    message PolicyRule {
      // The Level that requests matching this rule are recorded at.
      optional string level = 1;
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 15:34:11 UTC 2024
    - 10.6K bytes
    - Viewed (0)
  7. plugin/pkg/auth/authorizer/node/node_authorizer.go

    	nodeRules  []rbacv1.PolicyRule
    
    	// allows overriding for testing
    	features featuregate.FeatureGate
    }
    
    var _ = authorizer.Authorizer(&NodeAuthorizer{})
    var _ = authorizer.RuleResolver(&NodeAuthorizer{})
    
    // NewAuthorizer returns a new node authorizer
    func NewAuthorizer(graph *Graph, identifier nodeidentifier.NodeIdentifier, rules []rbacv1.PolicyRule) *NodeAuthorizer {
    	return &NodeAuthorizer{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 07 21:22:55 UTC 2024
    - 16K bytes
    - Viewed (0)
Back to top