Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 40 for clusterRoles (0.38 sec)

  1. pkg/registry/rbac/rest/storage_rbac.go

    }
    
    type PolicyData struct {
    	ClusterRoles        []rbacapiv1.ClusterRole
    	ClusterRoleBindings []rbacapiv1.ClusterRoleBinding
    	Roles               map[string][]rbacapiv1.Role
    	RoleBindings        map[string][]rbacapiv1.RoleBinding
    	// ClusterRolesToAggregate maps from previous clusterrole name to the new clusterrole name
    	ClusterRolesToAggregate map[string]string
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jul 14 03:25:19 UTC 2022
    - 18.5K bytes
    - Viewed (0)
  2. plugin/pkg/auth/authorizer/rbac/rbac_test.go

    	bootstrapBindings = append(bootstrapBindings, bootstrappolicy.ControllerRoleBindings()...)
    
    	clusterRoles := []*rbacv1.ClusterRole{}
    	for i := range bootstrapRoles {
    		clusterRoles = append(clusterRoles, &bootstrapRoles[i])
    	}
    	clusterRoleBindings := []*rbacv1.ClusterRoleBinding{}
    	for i := range bootstrapBindings {
    		clusterRoleBindings = append(clusterRoleBindings, &bootstrapBindings[i])
    	}
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Sep 24 15:14:54 UTC 2019
    - 21.1K bytes
    - Viewed (0)
  3. staging/src/k8s.io/api/rbac/v1alpha1/types.go

    }
    
    // AggregationRule describes how to locate ClusterRoles to aggregate into the ClusterRole
    type AggregationRule struct {
    	// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
    	// If any of the selectors match, then the ClusterRole's permissions will be added
    	// +optional
    	// +listType=atomic
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 22:49:19 UTC 2024
    - 11.2K bytes
    - Viewed (0)
  4. staging/src/k8s.io/api/rbac/v1/types.go

    }
    
    // AggregationRule describes how to locate ClusterRoles to aggregate into the ClusterRole
    type AggregationRule struct {
    	// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
    	// If any of the selectors match, then the ClusterRole's permissions will be added
    	// +optional
    	// +listType=atomic
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 23 17:42:49 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  5. pkg/registry/rbac/validation/rule.go

    		}
    	}
    	return nil, errors.New("role not found")
    }
    
    func (r *StaticRoles) GetClusterRole(name string) (*rbacv1.ClusterRole, error) {
    	for _, clusterRole := range r.clusterRoles {
    		if clusterRole.Name == name {
    			return clusterRole, nil
    		}
    	}
    	return nil, errors.New("clusterrole not found")
    }
    
    func (r *StaticRoles) ListRoleBindings(namespace string) ([]*rbacv1.RoleBinding, error) {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Nov 02 16:51:16 UTC 2020
    - 11.6K bytes
    - Viewed (0)
  6. staging/src/k8s.io/api/rbac/v1beta1/types.go

    }
    
    // AggregationRule describes how to locate ClusterRoles to aggregate into the ClusterRole
    type AggregationRule struct {
    	// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
    	// If any of the selectors match, then the ClusterRole's permissions will be added
    	// +optional
    	// +listType=atomic
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 22:49:19 UTC 2024
    - 13.1K bytes
    - Viewed (0)
  7. cluster/gce/gci/audit_policy_test.go

    		secrets         = resource("secrets", "default")
    		tokenReviews    = resource("tokenreviews", "", "authentication.k8s.io")
    		deployments     = resource("deployments", "default", "apps")
    		clusterRoles    = resource("clusterroles", "", "rbac.authorization.k8s.io")
    		events          = resource("events", "default")
    		foobars         = resource("foos", "default", "example.com")
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Oct 30 06:23:50 UTC 2021
    - 9.8K bytes
    - Viewed (0)
  8. staging/src/k8s.io/apiserver/pkg/audit/policy/checker_test.go

    			Verb:            "get",
    			APIGroup:        "rbac.authorization.k8s.io", // Core
    			APIVersion:      "v1beta1",
    			Resource:        "clusterroles",
    			Name:            "edit",
    			ResourceRequest: true,
    			Path:            "/apis/rbac.authorization.k8s.io/v1beta1/clusterroles/edit",
    		},
    		"nonResource": &authorizer.AttributesRecord{
    			User:            tim,
    			Verb:            "get",
    			ResourceRequest: false,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Oct 12 15:06:14 UTC 2021
    - 15.1K bytes
    - Viewed (0)
  9. cmd/kubeadm/app/util/apiclient/idempotency_test.go

    				client.PrependReactor("create", "clusterroles", func(clientgotesting.Action) (bool, runtime.Object, error) {
    					return true, nil, errors.New("unknown error")
    				})
    			},
    			expectedError: true,
    		},
    		{
    			name: "clusterrole exists, update it",
    			setupClient: func(client *clientsetfake.Clientset) {
    				client.PrependReactor("create", "clusterroles", func(clientgotesting.Action) (bool, runtime.Object, error) {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Feb 18 11:14:32 UTC 2024
    - 33.2K bytes
    - Viewed (0)
  10. cmd/kubeadm/app/util/apiclient/idempotency.go

    			ctx := context.Background()
    			if _, err := client.RbacV1().ClusterRoles().Create(ctx, clusterRole, metav1.CreateOptions{}); err != nil {
    				if !apierrors.IsAlreadyExists(err) {
    					lastError = errors.Wrap(err, "unable to create ClusterRole")
    					return false, nil
    				}
    				if _, err := client.RbacV1().ClusterRoles().Update(ctx, clusterRole, metav1.UpdateOptions{}); err != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Feb 18 11:14:32 UTC 2024
    - 18.4K bytes
    - Viewed (0)
Back to top