- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 79 for PolicyRule (0.2 sec)
-
pkg/apis/rbac/v1/helpers.go
} default: return rbacv1.PolicyRule{}, fmt.Errorf("a rule must have either nonResourceURLs or resources: %#v", r.PolicyRule) } sort.Strings(r.PolicyRule.Resources) sort.Strings(r.PolicyRule.ResourceNames) sort.Strings(r.PolicyRule.APIGroups) sort.Strings(r.PolicyRule.NonResourceURLs) sort.Strings(r.PolicyRule.Verbs) return r.PolicyRule, nil } // +k8s:deepcopy-gen=false
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 7.4K bytes - Viewed (0) -
pkg/apis/rbac/helpers.go
return s.List() } // Rule returns PolicyRule and error. func (r *PolicyRuleBuilder) Rule() (PolicyRule, error) { if len(r.PolicyRule.Verbs) == 0 { return PolicyRule{}, fmt.Errorf("verbs are required: %#v", r.PolicyRule) } switch { case len(r.PolicyRule.NonResourceURLs) > 0: if len(r.PolicyRule.APIGroups) != 0 || len(r.PolicyRule.Resources) != 0 || len(r.PolicyRule.ResourceNames) != 0 {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 23 15:11:00 UTC 2020 - 12.1K bytes - Viewed (0) -
pkg/apis/rbac/v1alpha1/helpers.go
func (r *PolicyRuleBuilder) Rule() (rbacv1alpha1.PolicyRule, error) { if len(r.PolicyRule.Verbs) == 0 { return rbacv1alpha1.PolicyRule{}, fmt.Errorf("verbs are required: %#v", r.PolicyRule) } switch { case len(r.PolicyRule.NonResourceURLs) > 0: if len(r.PolicyRule.APIGroups) != 0 || len(r.PolicyRule.Resources) != 0 || len(r.PolicyRule.ResourceNames) != 0 {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 4.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/util/flowcontrol/rule.go
for _, policyRule := range flowSchema.Spec.Rules { if matchesPolicyRule(digest, &policyRule) { return true } } return false } func matchesPolicyRule(digest RequestDigest, policyRule *flowcontrol.PolicyRulesWithSubjects) bool { if !matchesASubject(digest.User, policyRule.Subjects) { return false } if digest.RequestInfo.IsResourceRequest {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Oct 30 12:18:35 UTC 2023 - 6.3K bytes - Viewed (0) -
pkg/apis/rbac/v1beta1/helpers.go
} func (r *PolicyRuleBuilder) Rule() (rbacv1beta1.PolicyRule, error) { if len(r.PolicyRule.Verbs) == 0 { return rbacv1beta1.PolicyRule{}, fmt.Errorf("verbs are required: %#v", r.PolicyRule) } switch { case len(r.PolicyRule.NonResourceURLs) > 0: if len(r.PolicyRule.APIGroups) != 0 || len(r.PolicyRule.Resources) != 0 || len(r.PolicyRule.ResourceNames) != 0 {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 4.4K bytes - Viewed (0) -
pkg/apis/rbac/helpers_test.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 9.2K bytes - Viewed (0) -
pkg/registry/rbac/validation/policy_compact_test.go
) func TestCompactRules(t *testing.T) { testcases := map[string]struct { Rules []rbacv1.PolicyRule Expected []rbacv1.PolicyRule }{ "empty": { Rules: []rbacv1.PolicyRule{}, Expected: []rbacv1.PolicyRule{}, }, "simple": { Rules: []rbacv1.PolicyRule{ {Verbs: []string{"get"}, APIGroups: []string{""}, Resources: []string{"builds"}},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 02 16:51:16 UTC 2020 - 9.5K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/rbac.go
) policyRules, err := r.authorizationRuleResolver.RulesFor(user, namespace) for _, policyRule := range policyRules { if len(policyRule.Resources) > 0 { r := authorizer.DefaultResourceRuleInfo{ Verbs: policyRule.Verbs, APIGroups: policyRule.APIGroups, Resources: policyRule.Resources, ResourceNames: policyRule.ResourceNames, } var resourceRule authorizer.ResourceRuleInfo = &r
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 24 10:13:50 UTC 2022 - 7.8K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go
Rules: []rbacv1.PolicyRule{ rbacv1helpers.NewRule("create").Groups(legacyGroup).Resources("serviceaccounts").RuleOrDie(), eventsRule(), }, }) addControllerRole(&controllerRoles, &controllerRoleBindings, rbacv1.ClusterRole{ ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "service-controller"}, Rules: []rbacv1.PolicyRule{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 28.9K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
for i := range rolebindings { addDefaultMetadata(&rolebindings[i]) } return } // NodeRules returns node policy rules, it is slice of rbacv1.PolicyRule. func NodeRules() []rbacv1.PolicyRule { nodePolicyRules := []rbacv1.PolicyRule{ // Needed to check API access. These creates are non-mutating rbacv1helpers.NewRule("create").Groups(authenticationGroup).Resources("tokenreviews").RuleOrDie(),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 34.4K bytes - Viewed (0)