Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 263 for rbacv1 (0.14 sec)

  1. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go

    }
    
    func eventsRule() rbacv1.PolicyRule {
    	return rbacv1helpers.NewRule("create", "update", "patch").Groups(legacyGroup, eventsGroup).Resources("events").RuleOrDie()
    }
    
    func buildControllerRoles() ([]rbacv1.ClusterRole, []rbacv1.ClusterRoleBinding) {
    	// controllerRoles is a slice of roles used for controllers
    	controllerRoles := []rbacv1.ClusterRole{}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 28.9K bytes
    - Viewed (0)
  2. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go

    }
    
    func addClusterRoleLabel(roles []rbacv1.ClusterRole) {
    	for i := range roles {
    		addDefaultMetadata(&roles[i])
    	}
    	return
    }
    
    func addClusterRoleBindingLabel(rolebindings []rbacv1.ClusterRoleBinding) {
    	for i := range rolebindings {
    		addDefaultMetadata(&rolebindings[i])
    	}
    	return
    }
    
    // NodeRules returns node policy rules, it is slice of rbacv1.PolicyRule.
    func NodeRules() []rbacv1.PolicyRule {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 34.4K bytes
    - Viewed (0)
  3. pkg/controller/clusterroleaggregation/clusterroleaggregation_controller.go

    	return err
    }
    
    func toApplyPolicyRules(rules []rbacv1.PolicyRule) []*rbacv1ac.PolicyRuleApplyConfiguration {
    	var result []*rbacv1ac.PolicyRuleApplyConfiguration
    	for _, rule := range rules {
    		result = append(result, toApplyPolicyRule(rule))
    	}
    	return result
    }
    
    func toApplyPolicyRule(rule rbacv1.PolicyRule) *rbacv1ac.PolicyRuleApplyConfiguration {
    	result := rbacv1ac.PolicyRule()
    	result.Resources = rule.Resources
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 8K bytes
    - Viewed (0)
  4. cmd/kubeadm/app/util/apiclient/idempotency.go

    func CreateOrUpdateRole(client clientset.Interface, role *rbac.Role) error {
    	var lastError error
    	err := wait.PollUntilContextTimeout(context.Background(),
    		apiCallRetryInterval, kubeadmapi.GetActiveTimeouts().KubernetesAPICall.Duration,
    		true, func(_ context.Context) (bool, error) {
    			ctx := context.Background()
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Feb 18 11:14:32 UTC 2024
    - 18.4K bytes
    - Viewed (0)
  5. cmd/kubeadm/app/phases/bootstraptoken/clusterinfo/clusterinfo_test.go

    	if err != nil {
    		t.Fatalf("error creating role: %v", err)
    	}
    
    	_, err = client.RbacV1().RoleBindings(metav1.NamespacePublic).Create(context.TODO(), &rbac.RoleBinding{
    		ObjectMeta: metav1.ObjectMeta{
    			Name:      BootstrapSignerClusterRoleName,
    			Namespace: metav1.NamespacePublic,
    		},
    		RoleRef: rbac.RoleRef{
    			APIGroup: rbac.GroupName,
    			Kind:     "Role",
    			Name:     BootstrapSignerClusterRoleName,
    		},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Feb 18 11:14:32 UTC 2024
    - 5.3K bytes
    - Viewed (0)
  6. staging/src/k8s.io/api/roundtrip_test.go

    	nodev1alpha1 "k8s.io/api/node/v1alpha1"
    	nodev1beta1 "k8s.io/api/node/v1beta1"
    	policyv1 "k8s.io/api/policy/v1"
    	policyv1beta1 "k8s.io/api/policy/v1beta1"
    	rbacv1 "k8s.io/api/rbac/v1"
    	rbacv1alpha1 "k8s.io/api/rbac/v1alpha1"
    	rbacv1beta1 "k8s.io/api/rbac/v1beta1"
    	resourcev1alpha2 "k8s.io/api/resource/v1alpha2"
    	schedulingv1 "k8s.io/api/scheduling/v1"
    	schedulingv1alpha1 "k8s.io/api/scheduling/v1alpha1"
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 04:18:56 UTC 2024
    - 5.9K bytes
    - Viewed (0)
  7. plugin/pkg/auth/authorizer/node/node_authorizer.go

    	identifier nodeidentifier.NodeIdentifier
    	nodeRules  []rbacv1.PolicyRule
    
    	// allows overriding for testing
    	features featuregate.FeatureGate
    }
    
    var _ = authorizer.Authorizer(&NodeAuthorizer{})
    var _ = authorizer.RuleResolver(&NodeAuthorizer{})
    
    // NewAuthorizer returns a new node authorizer
    func NewAuthorizer(graph *Graph, identifier nodeidentifier.NodeIdentifier, rules []rbacv1.PolicyRule) *NodeAuthorizer {
    	return &NodeAuthorizer{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 07 21:22:55 UTC 2024
    - 16K bytes
    - Viewed (0)
  8. pkg/controlplane/instance.go

    	eventsv1 "k8s.io/api/events/v1"
    	networkingapiv1 "k8s.io/api/networking/v1"
    	networkingapiv1alpha1 "k8s.io/api/networking/v1alpha1"
    	nodev1 "k8s.io/api/node/v1"
    	policyapiv1 "k8s.io/api/policy/v1"
    	rbacv1 "k8s.io/api/rbac/v1"
    	resourcev1alpha2 "k8s.io/api/resource/v1alpha2"
    	schedulingapiv1 "k8s.io/api/scheduling/v1"
    	storageapiv1 "k8s.io/api/storage/v1"
    	storageapiv1alpha1 "k8s.io/api/storage/v1alpha1"
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jun 03 11:50:04 UTC 2024
    - 21.2K bytes
    - Viewed (0)
  9. cmd/kubeadm/app/phases/kubeconfig/kubeconfig.go

    		crbExists          bool
    		clusterRoleBinding = &rbac.ClusterRoleBinding{
    			ObjectMeta: metav1.ObjectMeta{
    				Name: kubeadmconstants.ClusterAdminsGroupAndClusterRoleBinding,
    			},
    			RoleRef: rbac.RoleRef{
    				APIGroup: rbac.GroupName,
    				Kind:     "ClusterRole",
    				Name:     "cluster-admin",
    			},
    			Subjects: []rbac.Subject{
    				{
    					Kind: rbac.GroupKind,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Jun 07 17:04:18 UTC 2024
    - 27K bytes
    - Viewed (0)
  10. manifests/charts/ztunnel/templates/rbac.yaml

      verbs: ["use"]
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
      name: ztunnel
      labels:
        app: ztunnel
        release: {{ .Release.Name }}
        istio.io/rev: {{ .Values.revision | default "default" }}
        install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: ztunnel
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat May 04 01:17:57 UTC 2024
    - 1.3K bytes
    - Viewed (0)
Back to top