- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 342 for rbacv1 (0.55 sec)
-
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go
} func eventsRule() rbacv1.PolicyRule { return rbacv1helpers.NewRule("create", "update", "patch").Groups(legacyGroup, eventsGroup).Resources("events").RuleOrDie() } func buildControllerRoles() ([]rbacv1.ClusterRole, []rbacv1.ClusterRoleBinding) { // controllerRoles is a slice of roles used for controllers controllerRoles := []rbacv1.ClusterRole{}
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 28.9K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
} func addClusterRoleLabel(roles []rbacv1.ClusterRole) { for i := range roles { addDefaultMetadata(&roles[i]) } return } func addClusterRoleBindingLabel(rolebindings []rbacv1.ClusterRoleBinding) { for i := range rolebindings { addDefaultMetadata(&rolebindings[i]) } return } // NodeRules returns node policy rules, it is slice of rbacv1.PolicyRule. func NodeRules() []rbacv1.PolicyRule {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 34.4K bytes - Viewed (0) -
pkg/controller/clusterroleaggregation/clusterroleaggregation_controller.go
return err } func toApplyPolicyRules(rules []rbacv1.PolicyRule) []*rbacv1ac.PolicyRuleApplyConfiguration { var result []*rbacv1ac.PolicyRuleApplyConfiguration for _, rule := range rules { result = append(result, toApplyPolicyRule(rule)) } return result } func toApplyPolicyRule(rule rbacv1.PolicyRule) *rbacv1ac.PolicyRuleApplyConfiguration { result := rbacv1ac.PolicyRule() result.Resources = rule.Resources
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 8K bytes - Viewed (0) -
cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap_test.go
} func newMockRbacClientForTest(t *testing.T, clusterRole *rbac.ClusterRole, clusterRoleBinding *rbac.ClusterRoleBinding) *clientsetfake.Clientset { client := clientsetfake.NewSimpleClientset() _, err := client.RbacV1().ClusterRoles().Create(context.TODO(), clusterRole, metav1.CreateOptions{}) if err != nil { t.Fatalf("error creating ClusterRoles: %v", err) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 04:16:31 UTC 2023 - 8.1K bytes - Viewed (0) -
cmd/kubeadm/app/util/apiclient/idempotency.go
func CreateOrUpdateRole(client clientset.Interface, role *rbac.Role) error { var lastError error err := wait.PollUntilContextTimeout(context.Background(), apiCallRetryInterval, kubeadmapi.GetActiveTimeouts().KubernetesAPICall.Duration, true, func(_ context.Context) (bool, error) { ctx := context.Background()
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 18.4K bytes - Viewed (0) -
cmd/kube-controller-manager/app/rbac.go
go clusterroleaggregation.NewClusterRoleAggregation( controllerContext.InformerFactory.Rbac().V1().ClusterRoles(), controllerContext.ClientBuilder.ClientOrDie("clusterrole-aggregation-controller").RbacV1(), ).Run(ctx, 5) return nil, true, nil
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Oct 27 11:28:02 UTC 2023 - 1.4K bytes - Viewed (0) -
cmd/kubeadm/app/phases/bootstraptoken/clusterinfo/clusterinfo_test.go
if err != nil { t.Fatalf("error creating role: %v", err) } _, err = client.RbacV1().RoleBindings(metav1.NamespacePublic).Create(context.TODO(), &rbac.RoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: BootstrapSignerClusterRoleName, Namespace: metav1.NamespacePublic, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "Role", Name: BootstrapSignerClusterRoleName, },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 5.3K bytes - Viewed (0) -
staging/src/k8s.io/api/roundtrip_test.go
nodev1alpha1 "k8s.io/api/node/v1alpha1" nodev1beta1 "k8s.io/api/node/v1beta1" policyv1 "k8s.io/api/policy/v1" policyv1beta1 "k8s.io/api/policy/v1beta1" rbacv1 "k8s.io/api/rbac/v1" rbacv1alpha1 "k8s.io/api/rbac/v1alpha1" rbacv1beta1 "k8s.io/api/rbac/v1beta1" resourcev1alpha2 "k8s.io/api/resource/v1alpha2" schedulingv1 "k8s.io/api/scheduling/v1" schedulingv1alpha1 "k8s.io/api/scheduling/v1alpha1"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 04:18:56 UTC 2024 - 5.9K bytes - Viewed (0) -
hack/.import-aliases
"k8s.io/api/node/v1beta1": "nodev1beta1", "k8s.io/api/node/v1": "nodev1", "k8s.io/api/policy/v1": "policyv1", "k8s.io/api/policy/v1beta1": "policyv1beta1", "k8s.io/api/rbac/v1": "rbacv1", "k8s.io/api/rbac/v1alpha1": "rbacv1alpha1", "k8s.io/api/rbac/v1beta1": "rbacv1beta1", "k8s.io/api/scheduling/v1": "schedulingv1", "k8s.io/api/scheduling/v1alpha1": "schedulingv1alpha1", "k8s.io/api/scheduling/v1beta1": "schedulingv1beta1",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Aug 17 05:27:21 UTC 2023 - 3.3K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/node/node_authorizer.go
identifier nodeidentifier.NodeIdentifier nodeRules []rbacv1.PolicyRule // allows overriding for testing features featuregate.FeatureGate } var _ = authorizer.Authorizer(&NodeAuthorizer{}) var _ = authorizer.RuleResolver(&NodeAuthorizer{}) // NewAuthorizer returns a new node authorizer func NewAuthorizer(graph *Graph, identifier nodeidentifier.NodeIdentifier, rules []rbacv1.PolicyRule) *NodeAuthorizer { return &NodeAuthorizer{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 07 21:22:55 UTC 2024 - 16K bytes - Viewed (0)