Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 245 for roleBindings (0.18 sec)

  1. manifests/charts/gateways/istio-ingress/templates/rolebindings.yaml

    {{ $gateway := index .Values "gateways" "istio-ingressgateway" }}
    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: {{ $gateway.name }}-sds
      namespace: {{ .Release.Namespace }}
      labels:
        release: {{ .Release.Name }}
        istio.io/rev: {{ .Values.revision | default "default" | quote }}
        install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
        operator.istio.io/component: "IngressGateways"
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 18 18:16:49 UTC 2024
    - 632 bytes
    - Viewed (0)
  2. manifests/charts/gateways/istio-egress/templates/rolebindings.yaml

    {{ $gateway := index .Values "gateways" "istio-egressgateway" }}
    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: {{ $gateway.name }}-sds
      namespace: {{ .Release.Namespace }}
      labels:
        release: {{ .Release.Name }}
        istio.io/rev: {{ .Values.revision | default "default" | quote }}
        install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
        operator.istio.io/component: "EgressGateways"
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 18 18:16:49 UTC 2024
    - 630 bytes
    - Viewed (0)
  3. cluster/addons/rbac/cluster-loadbalancing/glbc/user-rolebindings.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: system:controller:glbc
      namespace: kube-system
      labels:
        addonmanager.kubernetes.io/mode: Reconcile
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: system:controller:glbc
    subjects:
    - kind: User
      name: system:controller:glbc
    ---
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRoleBinding
    metadata:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 02 05:24:48 UTC 2019
    - 647 bytes
    - Viewed (0)
  4. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go

    	names := sets.NewString()
    	roleBindings := map[string]runtime.Object{}
    	bootstrapRoleBindings := bootstrappolicy.ControllerRoleBindings()
    	for i := range bootstrapRoleBindings {
    		roleBinding := bootstrapRoleBindings[i]
    		names.Insert(roleBinding.Name)
    		roleBindings[roleBinding.Name] = &roleBinding
    	}
    	for _, name := range names.List() {
    		list.Items = append(list.Items, roleBindings[name])
    	}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:45:31 UTC 2023
    - 9.5K bytes
    - Viewed (0)
  5. plugin/pkg/auth/authorizer/rbac/subject_locator.go

    			errorlist = append(errorlist, err)
    
    		} else {
    			for _, roleBinding := range roleBindings {
    				rules, err := r.roleToRuleMapper.GetRoleReferenceRules(roleBinding.RoleRef, namespace)
    				if err != nil {
    					// if we have an error, just keep track of it and keep processing.  Since rules are additive,
    					// missing a reference is bad, but we can continue with other rolebindings and still have a list
    					// that does not contain any invalid values
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 4.7K bytes
    - Viewed (0)
  6. plugin/pkg/auth/authorizer/rbac/subject_locator_test.go

    	type actionToSubjects struct {
    		action   authorizer.Attributes
    		subjects []rbacv1.Subject
    	}
    
    	tests := []struct {
    		name                string
    		roles               []*rbacv1.Role
    		roleBindings        []*rbacv1.RoleBinding
    		clusterRoles        []*rbacv1.ClusterRole
    		clusterRoleBindings []*rbacv1.ClusterRoleBinding
    
    		superUser string
    
    		actionsToSubjects []actionToSubjects
    	}{
    		{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 5.6K bytes
    - Viewed (0)
  7. pkg/registry/rbac/validation/rule.go

    }
    
    func (r *StaticRoles) ListRoleBindings(namespace string) ([]*rbacv1.RoleBinding, error) {
    	if len(namespace) == 0 {
    		return nil, errors.New("must provide namespace when listing role bindings")
    	}
    
    	roleBindingList := []*rbacv1.RoleBinding{}
    	for _, roleBinding := range r.roleBindings {
    		if roleBinding.Namespace != namespace {
    			continue
    		}
    		// TODO(ericchiang): need to implement label selectors?
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Nov 02 16:51:16 UTC 2020
    - 11.6K bytes
    - Viewed (0)
  8. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy_test.go

    			t.Errorf("ClusterRole: %s GetLabels() = %s, want %s", accessor.GetName(), got, want)
    		}
    	}
    
    	rolebindings := ControllerRoleBindings()
    	for i := range rolebindings {
    		rolebinding := rolebindings[i]
    		accessor, err := meta.Accessor(&rolebinding)
    		if err != nil {
    			t.Fatalf("unexpected error: %v", err)
    		}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri May 24 05:24:17 UTC 2019
    - 2.9K bytes
    - Viewed (0)
  9. pkg/registry/rbac/rest/storage_rbac.go

    				failedReconciliation = true
    			}
    		}
    	}
    
    	// ensure bootstrap namespaced rolebindings are created or reconciled
    	for namespace, roleBindings := range p.RoleBindings {
    		for _, roleBinding := range roleBindings {
    			opts := reconciliation.ReconcileRoleBindingOptions{
    				RoleBinding: reconciliation.RoleBindingAdapter{RoleBinding: &roleBinding},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jul 14 03:25:19 UTC 2022
    - 18.5K bytes
    - Viewed (0)
  10. pkg/registry/rbac/rolebinding/strategy.go

    	_ = obj.(*rbac.RoleBinding)
    }
    
    // PrepareForUpdate clears fields that are not allowed to be set by end users on update.
    func (strategy) PrepareForUpdate(ctx context.Context, obj, old runtime.Object) {
    	newRoleBinding := obj.(*rbac.RoleBinding)
    	oldRoleBinding := old.(*rbac.RoleBinding)
    
    	_, _ = newRoleBinding, oldRoleBinding
    }
    
    // Validate validates a new RoleBinding. Validation must check for a correct signature.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 18 14:42:36 UTC 2021
    - 3.5K bytes
    - Viewed (0)
Back to top