Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 481 for rbacv1 (0.12 sec)

  1. pkg/controller/clusterroleaggregation/clusterroleaggregation_controller_test.go

    		return []rbacv1.PolicyRule{
    			{Verbs: []string{"saw"}, Resources: []string{"boards"}},
    		}
    	}
    	role := func(name string, labels map[string]string, rules []rbacv1.PolicyRule) *rbacv1.ClusterRole {
    		return &rbacv1.ClusterRole{
    			ObjectMeta: metav1.ObjectMeta{Name: name, Labels: labels},
    			Rules:      rules,
    		}
    	}
    	combinedRole := func(selectors []map[string]string, rules ...[]rbacv1.PolicyRule) *rbacv1.ClusterRole {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:46:12 UTC 2023
    - 9K bytes
    - Viewed (0)
  2. plugin/pkg/auth/authorizer/rbac/rbac.go

    See the License for the specific language governing permissions and
    limitations under the License.
    */
    
    // Package rbac implements the authorizer.Authorizer interface using roles base access control.
    package rbac
    
    import (
    	"bytes"
    	"context"
    	"fmt"
    
    	"k8s.io/klog/v2"
    
    	rbacv1 "k8s.io/api/rbac/v1"
    	"k8s.io/apimachinery/pkg/labels"
    	utilerrors "k8s.io/apimachinery/pkg/util/errors"
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 24 10:13:50 UTC 2022
    - 7.8K bytes
    - Viewed (0)
  3. pkg/registry/rbac/validation/rule_test.go

    				Rules:      []rbacv1.PolicyRule{ruleWriteNodes},
    			},
    		},
    		roleBindings: []*rbacv1.RoleBinding{
    			{
    				ObjectMeta: metav1.ObjectMeta{Namespace: "namespace1"},
    				Subjects: []rbacv1.Subject{
    					{Kind: rbacv1.UserKind, Name: "foobar"},
    					{Kind: rbacv1.GroupKind, Name: "group1"},
    				},
    				RoleRef: rbacv1.RoleRef{APIGroup: rbacv1.GroupName, Kind: "Role", Name: "readthings"},
    			},
    		},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:46:12 UTC 2023
    - 7.9K bytes
    - Viewed (0)
  4. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go

    }
    
    func eventsRule() rbacv1.PolicyRule {
    	return rbacv1helpers.NewRule("create", "update", "patch").Groups(legacyGroup, eventsGroup).Resources("events").RuleOrDie()
    }
    
    func buildControllerRoles() ([]rbacv1.ClusterRole, []rbacv1.ClusterRoleBinding) {
    	// controllerRoles is a slice of roles used for controllers
    	controllerRoles := []rbacv1.ClusterRole{}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 28.9K bytes
    - Viewed (0)
  5. pkg/apis/rbac/v1/helpers.go

    	}
    	return r
    }
    
    func (r *ClusterRoleBindingBuilder) Users(users ...string) *ClusterRoleBindingBuilder {
    	for _, user := range users {
    		r.ClusterRoleBinding.Subjects = append(r.ClusterRoleBinding.Subjects, rbacv1.Subject{APIGroup: rbacv1.GroupName, Kind: rbacv1.UserKind, Name: user})
    	}
    	return r
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 18 15:37:57 UTC 2023
    - 7.4K bytes
    - Viewed (0)
  6. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go

    }
    
    func addClusterRoleLabel(roles []rbacv1.ClusterRole) {
    	for i := range roles {
    		addDefaultMetadata(&roles[i])
    	}
    	return
    }
    
    func addClusterRoleBindingLabel(rolebindings []rbacv1.ClusterRoleBinding) {
    	for i := range rolebindings {
    		addDefaultMetadata(&rolebindings[i])
    	}
    	return
    }
    
    // NodeRules returns node policy rules, it is slice of rbacv1.PolicyRule.
    func NodeRules() []rbacv1.PolicyRule {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 34.4K bytes
    - Viewed (0)
  7. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go

    	"k8s.io/kubernetes/plugin/pkg/auth/authorizer/rbac/bootstrappolicy"
    )
    
    // semanticRoles is a few enumerated roles for which the relationships are well established
    // and we want to maintain symmetric roles
    type semanticRoles struct {
    	admin *rbacv1.ClusterRole
    	edit  *rbacv1.ClusterRole
    	view  *rbacv1.ClusterRole
    }
    
    func getSemanticRoles(roles []rbacv1.ClusterRole) semanticRoles {
    	ret := semanticRoles{}
    	for i := range roles {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:45:31 UTC 2023
    - 9.5K bytes
    - Viewed (0)
  8. pkg/apis/rbac/v1/evaluation_helpers.go

    package v1
    
    import (
    	"fmt"
    	"strings"
    
    	rbacv1 "k8s.io/api/rbac/v1"
    )
    
    func VerbMatches(rule *rbacv1.PolicyRule, requestedVerb string) bool {
    	for _, ruleVerb := range rule.Verbs {
    		if ruleVerb == rbacv1.VerbAll {
    			return true
    		}
    		if ruleVerb == requestedVerb {
    			return true
    		}
    	}
    
    	return false
    }
    
    func APIGroupMatches(rule *rbacv1.PolicyRule, requestedGroup string) bool {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 18 15:37:57 UTC 2023
    - 3.8K bytes
    - Viewed (0)
  9. pkg/controller/clusterroleaggregation/clusterroleaggregation_controller.go

    	return err
    }
    
    func toApplyPolicyRules(rules []rbacv1.PolicyRule) []*rbacv1ac.PolicyRuleApplyConfiguration {
    	var result []*rbacv1ac.PolicyRuleApplyConfiguration
    	for _, rule := range rules {
    		result = append(result, toApplyPolicyRule(rule))
    	}
    	return result
    }
    
    func toApplyPolicyRule(rule rbacv1.PolicyRule) *rbacv1ac.PolicyRuleApplyConfiguration {
    	result := rbacv1ac.PolicyRule()
    	result.Resources = rule.Resources
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 8K bytes
    - Viewed (0)
  10. cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap_test.go

    }
    
    func newMockRbacClientForTest(t *testing.T, clusterRole *rbac.ClusterRole, clusterRoleBinding *rbac.ClusterRoleBinding) *clientsetfake.Clientset {
    	client := clientsetfake.NewSimpleClientset()
    	_, err := client.RbacV1().ClusterRoles().Create(context.TODO(), clusterRole, metav1.CreateOptions{})
    	if err != nil {
    		t.Fatalf("error creating ClusterRoles: %v", err)
    	}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Oct 18 04:16:31 UTC 2023
    - 8.1K bytes
    - Viewed (0)
Back to top