- Sort Score
- Result 10 results
- Languages All
Results 1 - 8 of 8 for BindingOrDie (0.21 sec)
-
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/namespace_policy.go
addNamespaceRoleBinding(metav1.NamespaceSystem, rbacv1helpers.NewRoleBinding("system::leader-locking-kube-scheduler", metav1.NamespaceSystem).Users(user.KubeScheduler).SAs(metav1.NamespaceSystem, "kube-scheduler").BindingOrDie()) addNamespaceRoleBinding(metav1.NamespaceSystem,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 16 11:54:27 UTC 2020 - 7.4K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
rbacv1helpers.NewClusterBinding("system:node-proxier").Users(user.KubeProxy).BindingOrDie(), rbacv1helpers.NewClusterBinding("system:kube-controller-manager").Users(user.KubeControllerManager).BindingOrDie(), rbacv1helpers.NewClusterBinding("system:kube-dns").SAs("kube-system", "kube-dns").BindingOrDie(), rbacv1helpers.NewClusterBinding("system:kube-scheduler").Users(user.KubeScheduler).BindingOrDie(),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 34.4K bytes - Viewed (0) -
pkg/apis/rbac/helpers_test.go
func TestHelpersRoundTrip(t *testing.T) { rb := rbac.NewRoleBinding("role", "ns").Groups("g").SAs("ns", "sa").Users("u").BindingOrDie() rbcr := rbac.NewRoleBindingForClusterRole("role", "ns").Groups("g").SAs("ns", "sa").Users("u").BindingOrDie() crb := rbac.NewClusterBinding("role").Groups("g").SAs("ns", "sa").Users("u").BindingOrDie() role := &rbac.Role{ Rules: []rbac.PolicyRule{ rbac.NewRule("verb").Groups("g").Resources("foo").RuleOrDie(),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 9.2K bytes - Viewed (0) -
pkg/apis/rbac/v1/helpers.go
r.RoleBinding.Subjects = append(r.RoleBinding.Subjects, rbacv1.Subject{Kind: rbacv1.ServiceAccountKind, Namespace: namespace, Name: saName}) } return r } // BindingOrDie calls the binding method and panics if there is an error. func (r *RoleBindingBuilder) BindingOrDie() rbacv1.RoleBinding { ret, err := r.Binding() if err != nil { panic(err) } return ret }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 7.4K bytes - Viewed (0) -
pkg/apis/rbac/helpers.go
r.ClusterRoleBinding.Subjects = append(r.ClusterRoleBinding.Subjects, Subject{Kind: ServiceAccountKind, Namespace: namespace, Name: saName}) } return r } // BindingOrDie calls the binding method and panics if there is an error. func (r *ClusterRoleBindingBuilder) BindingOrDie() ClusterRoleBinding { ret, err := r.Binding() if err != nil { panic(err) } return ret }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 23 15:11:00 UTC 2020 - 12.1K bytes - Viewed (0) -
pkg/apis/rbac/v1beta1/helpers.go
r.ClusterRoleBinding.Subjects = append(r.ClusterRoleBinding.Subjects, rbacv1beta1.Subject{Kind: rbacv1beta1.ServiceAccountKind, Namespace: namespace, Name: saName}) } return r } func (r *ClusterRoleBindingBuilder) BindingOrDie() rbacv1beta1.ClusterRoleBinding { ret, err := r.Binding() if err != nil { panic(err) } return ret } func (r *ClusterRoleBindingBuilder) Binding() (rbacv1beta1.ClusterRoleBinding, error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 4.4K bytes - Viewed (0) -
pkg/apis/rbac/v1alpha1/helpers.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 4.4K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go
addClusterRoleLabel(*controllerRoles) *controllerRoleBindings = append(*controllerRoleBindings, rbacv1helpers.NewClusterBinding(role.Name).SAs("kube-system", role.Name[len(saRolePrefix):]).BindingOrDie()) addClusterRoleBindingLabel(*controllerRoleBindings) } func eventsRule() rbacv1.PolicyRule { return rbacv1helpers.NewRule("create", "update", "patch").Groups(legacyGroup, eventsGroup).Resources("events").RuleOrDie()
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 28.9K bytes - Viewed (0)