- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 60 for clusterRoleBindings (0.34 sec)
-
cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap_test.go
) func TestAllowBootstrapTokensToPostCSRs(t *testing.T) { tests := []struct { name string client clientset.Interface }{ { name: "ClusterRoleBindings is empty", client: clientsetfake.NewSimpleClientset(), }, { name: "ClusterRoleBindings already exists", client: newMockClusterRoleBinddingClientForTest(t, &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 04:16:31 UTC 2023 - 8.1K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/subject_locator_test.go
clusterRoles []*rbacv1.ClusterRole clusterRoleBindings []*rbacv1.ClusterRoleBinding superUser string actionsToSubjects []actionToSubjects }{ { name: "no super user, star matches star", clusterRoles: []*rbacv1.ClusterRole{ newClusterRole("admin", newRule("*", "*", "*", "*")), }, clusterRoleBindings: []*rbacv1.ClusterRoleBinding{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 5.6K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/subject_locator.go
subjectLocator := &SubjectAccessEvaluator{ superUser: superUser, roleBindingLister: roleBindings, clusterRoleBindingLister: clusterRoleBindings, roleToRuleMapper: rbacregistryvalidation.NewDefaultRuleResolver(
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 4.7K bytes - Viewed (0) -
pkg/registry/rbac/rest/storage_rbac.go
storage[resource] = clusterrolepolicybased.NewStorage(clusterRolesStorage, p.Authorizer, authorizationRuleResolver) } // clusterrolebindings if resource := "clusterrolebindings"; apiResourceConfigSource.ResourceEnabled(rbacapiv1.SchemeGroupVersion.WithResource(resource)) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jul 14 03:25:19 UTC 2022 - 18.5K bytes - Viewed (0) -
pkg/registry/rbac/rest/storage_rbac_test.go
for n := 0; n < b.N; n++ { var policy = &PolicyData{ ClusterRoles: append(bootstrappolicy.ClusterRoles(), bootstrappolicy.ControllerRoles()...), ClusterRoleBindings: append(bootstrappolicy.ClusterRoleBindings(), bootstrappolicy.ControllerRoleBindings()...), Roles: bootstrappolicy.NamespaceRoles(), RoleBindings: bootstrappolicy.NamespaceRoleBindings(),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jan 02 03:03:06 UTC 2021 - 1.4K bytes - Viewed (0) -
pkg/registry/rbac/validation/rule.go
r := StaticRoles{ roles: roles, roleBindings: roleBindings, clusterRoles: clusterRoles, clusterRoleBindings: clusterRoleBindings, } return newMockRuleResolver(&r), &r }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 02 16:51:16 UTC 2020 - 11.6K bytes - Viewed (0) -
pkg/registry/rbac/clusterrolebinding/strategy.go
// Strategy should implement rest.RESTUpdateStrategy var _ rest.RESTUpdateStrategy = Strategy // NamespaceScoped is false for ClusterRoleBindings. func (strategy) NamespaceScoped() bool { return false } // AllowCreateOnUpdate is true for ClusterRoleBindings. func (strategy) AllowCreateOnUpdate() bool { return true } // PrepareForCreate clears fields that are not allowed to be set by end users
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 18 14:42:36 UTC 2021 - 3.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/audit/policy/reader_test.go
users: ["tim"] userGroups: ["testers", "developers"] verbs: ["patch", "delete", "create"] resources: - group: "" - group: "rbac.authorization.k8s.io" resources: ["clusterroles", "clusterrolebindings"] namespaces: ["default", "kube-system"] - level: Metadata ` const policyWithNoVersionOrKind = ` rules: - level: None nonResourceURLs: - /healthz* - /version
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 4.2K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/rbac_test.go
bootstrapBindings = append(bootstrapBindings, bootstrappolicy.ClusterRoleBindings()...) bootstrapBindings = append(bootstrapBindings, bootstrappolicy.ControllerRoleBindings()...) clusterRoles := []*rbacv1.ClusterRole{} for i := range bootstrapRoles { clusterRoles = append(clusterRoles, &bootstrapRoles[i]) } clusterRoleBindings := []*rbacv1.ClusterRoleBinding{} for i := range bootstrapBindings {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 21.1K bytes - Viewed (0) -
cmd/kubeadm/app/util/apiclient/dryrunclient_test.go
[dryrun] Resource name: "kubernetes" `), }, { name: "action GET on clusterrolebindings", action: core.NewRootGetAction(schema.GroupVersionResource{Group: rbac.GroupName, Version: rbac.SchemeGroupVersion.Version, Resource: "clusterrolebindings"}, "system:node"), expectedBytes: []byte(`[dryrun] Would perform action GET on resource "clusterrolebindings" in API group "rbac.authorization.k8s.io/v1" [dryrun] Resource name: "system:node" `),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Dec 21 09:49:59 UTC 2022 - 4.5K bytes - Viewed (0)