- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 245 for roleBindings (0.18 sec)
-
manifests/charts/gateways/istio-ingress/templates/rolebindings.yaml
{{ $gateway := index .Values "gateways" "istio-ingressgateway" }} apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: {{ $gateway.name }}-sds namespace: {{ .Release.Namespace }} labels: release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" | quote }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "IngressGateways"
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 18 18:16:49 UTC 2024 - 632 bytes - Viewed (0) -
manifests/charts/gateways/istio-egress/templates/rolebindings.yaml
{{ $gateway := index .Values "gateways" "istio-egressgateway" }} apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: {{ $gateway.name }}-sds namespace: {{ .Release.Namespace }} labels: release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" | quote }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} operator.istio.io/component: "EgressGateways"
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 18 18:16:49 UTC 2024 - 630 bytes - Viewed (0) -
cluster/addons/rbac/cluster-loadbalancing/glbc/user-rolebindings.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: system:controller:glbc namespace: kube-system labels: addonmanager.kubernetes.io/mode: Reconcile roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: system:controller:glbc subjects: - kind: User name: system:controller:glbc --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 02 05:24:48 UTC 2019 - 647 bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go
names := sets.NewString() roleBindings := map[string]runtime.Object{} bootstrapRoleBindings := bootstrappolicy.ControllerRoleBindings() for i := range bootstrapRoleBindings { roleBinding := bootstrapRoleBindings[i] names.Insert(roleBinding.Name) roleBindings[roleBinding.Name] = &roleBinding } for _, name := range names.List() { list.Items = append(list.Items, roleBindings[name]) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:45:31 UTC 2023 - 9.5K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/subject_locator.go
errorlist = append(errorlist, err) } else { for _, roleBinding := range roleBindings { rules, err := r.roleToRuleMapper.GetRoleReferenceRules(roleBinding.RoleRef, namespace) if err != nil { // if we have an error, just keep track of it and keep processing. Since rules are additive, // missing a reference is bad, but we can continue with other rolebindings and still have a list // that does not contain any invalid values
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 4.7K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/subject_locator_test.go
type actionToSubjects struct { action authorizer.Attributes subjects []rbacv1.Subject } tests := []struct { name string roles []*rbacv1.Role roleBindings []*rbacv1.RoleBinding clusterRoles []*rbacv1.ClusterRole clusterRoleBindings []*rbacv1.ClusterRoleBinding superUser string actionsToSubjects []actionToSubjects }{ {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 5.6K bytes - Viewed (0) -
pkg/registry/rbac/validation/rule.go
} func (r *StaticRoles) ListRoleBindings(namespace string) ([]*rbacv1.RoleBinding, error) { if len(namespace) == 0 { return nil, errors.New("must provide namespace when listing role bindings") } roleBindingList := []*rbacv1.RoleBinding{} for _, roleBinding := range r.roleBindings { if roleBinding.Namespace != namespace { continue } // TODO(ericchiang): need to implement label selectors?
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 02 16:51:16 UTC 2020 - 11.6K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy_test.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 24 05:24:17 UTC 2019 - 2.9K bytes - Viewed (0) -
pkg/registry/rbac/rest/storage_rbac.go
failedReconciliation = true } } } // ensure bootstrap namespaced rolebindings are created or reconciled for namespace, roleBindings := range p.RoleBindings { for _, roleBinding := range roleBindings { opts := reconciliation.ReconcileRoleBindingOptions{ RoleBinding: reconciliation.RoleBindingAdapter{RoleBinding: &roleBinding},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jul 14 03:25:19 UTC 2022 - 18.5K bytes - Viewed (0) -
pkg/registry/rbac/rolebinding/strategy.go
_ = obj.(*rbac.RoleBinding) } // PrepareForUpdate clears fields that are not allowed to be set by end users on update. func (strategy) PrepareForUpdate(ctx context.Context, obj, old runtime.Object) { newRoleBinding := obj.(*rbac.RoleBinding) oldRoleBinding := old.(*rbac.RoleBinding) _, _ = newRoleBinding, oldRoleBinding } // Validate validates a new RoleBinding. Validation must check for a correct signature.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 18 14:42:36 UTC 2021 - 3.5K bytes - Viewed (0)