Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 60 for clusterRoleBindings (0.34 sec)

  1. cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap_test.go

    )
    
    func TestAllowBootstrapTokensToPostCSRs(t *testing.T) {
    	tests := []struct {
    		name   string
    		client clientset.Interface
    	}{
    		{
    			name:   "ClusterRoleBindings is empty",
    			client: clientsetfake.NewSimpleClientset(),
    		},
    		{
    			name: "ClusterRoleBindings already exists",
    			client: newMockClusterRoleBinddingClientForTest(t, &rbac.ClusterRoleBinding{
    				ObjectMeta: metav1.ObjectMeta{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Oct 18 04:16:31 UTC 2023
    - 8.1K bytes
    - Viewed (0)
  2. plugin/pkg/auth/authorizer/rbac/subject_locator_test.go

    		clusterRoles        []*rbacv1.ClusterRole
    		clusterRoleBindings []*rbacv1.ClusterRoleBinding
    
    		superUser string
    
    		actionsToSubjects []actionToSubjects
    	}{
    		{
    			name: "no super user, star matches star",
    			clusterRoles: []*rbacv1.ClusterRole{
    				newClusterRole("admin", newRule("*", "*", "*", "*")),
    			},
    			clusterRoleBindings: []*rbacv1.ClusterRoleBinding{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 5.6K bytes
    - Viewed (0)
  3. plugin/pkg/auth/authorizer/rbac/subject_locator.go

    	subjectLocator := &SubjectAccessEvaluator{
    		superUser:                superUser,
    		roleBindingLister:        roleBindings,
    		clusterRoleBindingLister: clusterRoleBindings,
    		roleToRuleMapper: rbacregistryvalidation.NewDefaultRuleResolver(
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 4.7K bytes
    - Viewed (0)
  4. pkg/registry/rbac/rest/storage_rbac.go

    		storage[resource] = clusterrolepolicybased.NewStorage(clusterRolesStorage, p.Authorizer, authorizationRuleResolver)
    	}
    
    	// clusterrolebindings
    	if resource := "clusterrolebindings"; apiResourceConfigSource.ResourceEnabled(rbacapiv1.SchemeGroupVersion.WithResource(resource)) {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jul 14 03:25:19 UTC 2022
    - 18.5K bytes
    - Viewed (0)
  5. pkg/registry/rbac/rest/storage_rbac_test.go

    	for n := 0; n < b.N; n++ {
    		var policy = &PolicyData{
    			ClusterRoles:               append(bootstrappolicy.ClusterRoles(), bootstrappolicy.ControllerRoles()...),
    			ClusterRoleBindings:        append(bootstrappolicy.ClusterRoleBindings(), bootstrappolicy.ControllerRoleBindings()...),
    			Roles:                      bootstrappolicy.NamespaceRoles(),
    			RoleBindings:               bootstrappolicy.NamespaceRoleBindings(),
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Jan 02 03:03:06 UTC 2021
    - 1.4K bytes
    - Viewed (0)
  6. pkg/registry/rbac/validation/rule.go

    	r := StaticRoles{
    		roles:               roles,
    		roleBindings:        roleBindings,
    		clusterRoles:        clusterRoles,
    		clusterRoleBindings: clusterRoleBindings,
    	}
    	return newMockRuleResolver(&r), &r
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Nov 02 16:51:16 UTC 2020
    - 11.6K bytes
    - Viewed (0)
  7. pkg/registry/rbac/clusterrolebinding/strategy.go

    // Strategy should implement rest.RESTUpdateStrategy
    var _ rest.RESTUpdateStrategy = Strategy
    
    // NamespaceScoped is false for ClusterRoleBindings.
    func (strategy) NamespaceScoped() bool {
    	return false
    }
    
    // AllowCreateOnUpdate is true for ClusterRoleBindings.
    func (strategy) AllowCreateOnUpdate() bool {
    	return true
    }
    
    // PrepareForCreate clears fields that are not allowed to be set by end users
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 18 14:42:36 UTC 2021
    - 3.6K bytes
    - Viewed (0)
  8. staging/src/k8s.io/apiserver/pkg/audit/policy/reader_test.go

        users: ["tim"]
        userGroups: ["testers", "developers"]
        verbs: ["patch", "delete", "create"]
        resources:
          - group: ""
          - group: "rbac.authorization.k8s.io"
            resources: ["clusterroles", "clusterrolebindings"]
        namespaces: ["default", "kube-system"]
      - level: Metadata
    `
    
    const policyWithNoVersionOrKind = `
    rules:
      - level: None
        nonResourceURLs:
          - /healthz*
          - /version
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:46:12 UTC 2023
    - 4.2K bytes
    - Viewed (0)
  9. plugin/pkg/auth/authorizer/rbac/rbac_test.go

    	bootstrapBindings = append(bootstrapBindings, bootstrappolicy.ClusterRoleBindings()...)
    	bootstrapBindings = append(bootstrapBindings, bootstrappolicy.ControllerRoleBindings()...)
    
    	clusterRoles := []*rbacv1.ClusterRole{}
    	for i := range bootstrapRoles {
    		clusterRoles = append(clusterRoles, &bootstrapRoles[i])
    	}
    	clusterRoleBindings := []*rbacv1.ClusterRoleBinding{}
    	for i := range bootstrapBindings {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Sep 24 15:14:54 UTC 2019
    - 21.1K bytes
    - Viewed (0)
  10. cmd/kubeadm/app/util/apiclient/dryrunclient_test.go

    [dryrun] Resource name: "kubernetes"
    `),
    		},
    		{
    			name:   "action GET on clusterrolebindings",
    			action: core.NewRootGetAction(schema.GroupVersionResource{Group: rbac.GroupName, Version: rbac.SchemeGroupVersion.Version, Resource: "clusterrolebindings"}, "system:node"),
    			expectedBytes: []byte(`[dryrun] Would perform action GET on resource "clusterrolebindings" in API group "rbac.authorization.k8s.io/v1"
    [dryrun] Resource name: "system:node"
    `),
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Dec 21 09:49:59 UTC 2022
    - 4.5K bytes
    - Viewed (0)
Back to top