Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 165 for roleRef (0.25 sec)

  1. pkg/apis/rbac/validation/validation.go

    	if roleBinding.RoleRef.APIGroup != rbac.GroupName {
    		allErrs = append(allErrs, field.NotSupported(field.NewPath("roleRef", "apiGroup"), roleBinding.RoleRef.APIGroup, []string{rbac.GroupName}))
    	}
    
    	switch roleBinding.RoleRef.Kind {
    	case "Role", "ClusterRole":
    	default:
    		allErrs = append(allErrs, field.NotSupported(field.NewPath("roleRef", "kind"), roleBinding.RoleRef.Kind, []string{"Role", "ClusterRole"}))
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Nov 08 01:48:21 UTC 2022
    - 10.4K bytes
    - Viewed (0)
  2. pkg/apis/rbac/v1alpha1/conversion_test.go

    		expected *rbacapi.RoleBinding
    	}{
    		"specific user": {
    			old: &v1alpha1.RoleBinding{
    				RoleRef:  v1alpha1.RoleRef{Name: "foo", APIGroup: v1alpha1.GroupName},
    				Subjects: []v1alpha1.Subject{{Kind: "User", APIVersion: v1alpha1.SchemeGroupVersion.String(), Name: "bob"}},
    			},
    			expected: &rbacapi.RoleBinding{
    				RoleRef:  rbacapi.RoleRef{Name: "foo", APIGroup: v1alpha1.GroupName},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Oct 18 15:23:55 UTC 2017
    - 4K bytes
    - Viewed (0)
  3. cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap_test.go

    			name: "ClusterRoleBindings already exists",
    			client: newMockClusterRoleBinddingClientForTest(t, &rbac.ClusterRoleBinding{
    				ObjectMeta: metav1.ObjectMeta{
    					Name: constants.NodeKubeletBootstrap,
    				},
    				RoleRef: rbac.RoleRef{
    					APIGroup: rbac.GroupName,
    					Kind:     "ClusterRole",
    					Name:     constants.NodeBootstrapperClusterRoleName,
    				},
    				Subjects: []rbac.Subject{
    					{
    						Kind: rbac.GroupKind,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Oct 18 04:16:31 UTC 2023
    - 8.1K bytes
    - Viewed (0)
  4. pkg/apis/rbac/validation/validation_test.go

    			F: "roleRef.kind",
    		},
    		"reference role": {
    			A: rbac.ClusterRoleBinding{
    				ObjectMeta: metav1.ObjectMeta{Name: "default"},
    				RoleRef:    rbac.RoleRef{APIGroup: rbac.GroupName, Kind: "Role", Name: "valid"},
    			},
    			T: field.ErrorTypeNotSupported,
    			F: "roleRef.kind",
    		},
    		"zero-length name": {
    			A: rbac.ClusterRoleBinding{
    				ObjectMeta: metav1.ObjectMeta{},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 02 07:48:42 UTC 2023
    - 14.1K bytes
    - Viewed (0)
  5. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml

      metadata:
        annotations:
          rbac.authorization.kubernetes.io/autoupdate: "true"
        creationTimestamp: null
        labels:
          kubernetes.io/bootstrapping: rbac-defaults
        name: cluster-admin
      roleRef:
        apiGroup: rbac.authorization.k8s.io
        kind: ClusterRole
        name: cluster-admin
      subjects:
      - apiGroup: rbac.authorization.k8s.io
        kind: Group
        name: system:masters
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Sep 11 19:01:47 UTC 2020
    - 5.7K bytes
    - Viewed (0)
  6. pkg/registry/rbac/escalation_check.go

    	// This occurs after defaulting and conversion, so values pulled from the roleRef won't change
    	// Invalid APIGroup or Name values will fail validation
    	switch roleRef.Kind {
    	case "ClusterRole":
    		attrs.APIGroup = roleRef.APIGroup
    		attrs.APIVersion = "*"
    		attrs.Resource = "clusterroles"
    		attrs.Name = roleRef.Name
    	case "Role":
    		attrs.APIGroup = roleRef.APIGroup
    		attrs.APIVersion = "*"
    		attrs.Resource = "roles"
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Sep 24 15:14:54 UTC 2019
    - 4.3K bytes
    - Viewed (0)
  7. cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap.go

    	return apiclient.CreateOrUpdateClusterRoleBinding(client, &rbac.ClusterRoleBinding{
    		ObjectMeta: metav1.ObjectMeta{
    			Name: constants.NodeKubeletBootstrap,
    		},
    		RoleRef: rbac.RoleRef{
    			APIGroup: rbac.GroupName,
    			Kind:     "ClusterRole",
    			Name:     constants.NodeBootstrapperClusterRoleName,
    		},
    		Subjects: []rbac.Subject{
    			{
    				Kind: rbac.GroupKind,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Oct 15 10:49:52 UTC 2023
    - 4.2K bytes
    - Viewed (0)
  8. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml

        annotations:
          rbac.authorization.kubernetes.io/autoupdate: "true"
        creationTimestamp: null
        labels:
          kubernetes.io/bootstrapping: rbac-defaults
        name: system:controller:attachdetach-controller
      roleRef:
        apiGroup: rbac.authorization.k8s.io
        kind: ClusterRole
        name: system:controller:attachdetach-controller
      subjects:
      - kind: ServiceAccount
        name: attachdetach-controller
        namespace: kube-system
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Mar 06 00:00:21 UTC 2024
    - 16.9K bytes
    - Viewed (0)
  9. pkg/apis/rbac/v1alpha1/defaults.go

    	return RegisterDefaults(scheme)
    }
    
    func SetDefaults_ClusterRoleBinding(obj *rbacv1alpha1.ClusterRoleBinding) {
    	if len(obj.RoleRef.APIGroup) == 0 {
    		obj.RoleRef.APIGroup = GroupName
    	}
    }
    func SetDefaults_RoleBinding(obj *rbacv1alpha1.RoleBinding) {
    	if len(obj.RoleRef.APIGroup) == 0 {
    		obj.RoleRef.APIGroup = GroupName
    	}
    }
    func SetDefaults_Subject(obj *rbacv1alpha1.Subject) {
    	if len(obj.APIVersion) == 0 {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jun 22 18:30:51 UTC 2017
    - 1.4K bytes
    - Viewed (0)
  10. staging/src/k8s.io/api/rbac/v1/types.go

    	Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"`
    
    	// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
    	// If the RoleRef cannot be resolved, the Authorizer must return an error.
    	// This field is immutable.
    	RoleRef RoleRef `json:"roleRef" protobuf:"bytes,3,opt,name=roleRef"`
    }
    
    // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 23 17:42:49 UTC 2024
    - 10.7K bytes
    - Viewed (0)
Back to top