Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for eventsRule (0.26 sec)

  1. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go

    			eventsRule(),
    		},
    	})
    	addControllerRole(&controllerRoles, &controllerRoleBindings, rbacv1.ClusterRole{
    		ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "service-account-controller"},
    		Rules: []rbacv1.PolicyRule{
    			rbacv1helpers.NewRule("create").Groups(legacyGroup).Resources("serviceaccounts").RuleOrDie(),
    			eventsRule(),
    		},
    	})
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 28.9K bytes
    - Viewed (0)
  2. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/namespace_policy.go

    		ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "token-cleaner"},
    		Rules: []rbacv1.PolicyRule{
    			rbacv1helpers.NewRule("get", "list", "watch", "delete").Groups(legacyGroup).Resources("secrets").RuleOrDie(),
    			eventsRule(),
    		},
    	})
    	// TODO: Create util on Role+Binding for leader locking if more cases evolve.
    	addNamespaceRole(metav1.NamespaceSystem, rbacv1.Role{
    		// role for the leader locking on supplied configmap
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 16 11:54:27 UTC 2020
    - 7.4K bytes
    - Viewed (0)
  3. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go

    			Rules: []rbacv1.PolicyRule{
    				rbacv1helpers.NewRule("get").Groups(legacyGroup).Resources("nodes").RuleOrDie(),
    				rbacv1helpers.NewRule("patch").Groups(legacyGroup).Resources("nodes/status").RuleOrDie(),
    				eventsRule(),
    			},
    		},
    		{
    			// a role to use for full access to the kubelet API
    			ObjectMeta: metav1.ObjectMeta{Name: "system:kubelet-api-admin"},
    			Rules: []rbacv1.PolicyRule{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 34.4K bytes
    - Viewed (0)
Back to top