- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 140 for clusterRoles (0.17 sec)
-
staging/src/k8s.io/api/rbac/v1/types_swagger_doc_generated.go
var map_AggregationRule = map[string]string{ "": "AggregationRule describes how to locate ClusterRoles to aggregate into the ClusterRole", "clusterRoleSelectors": "ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules. If any of the selectors match, then the ClusterRole's permissions will be added", } func (AggregationRule) SwaggerDoc() map[string]string {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 24 20:35:20 UTC 2023 - 7.8K bytes - Viewed (0) -
pkg/registry/rbac/escalation_check.go
Verb: "bind", // check against the namespace where the binding is being created (or the empty namespace for clusterrolebindings). // this allows delegation to bind particular clusterroles in rolebindings within particular namespaces, // and to authorize binding a clusterrole across all namespaces in a clusterrolebinding. Namespace: bindingNamespace, ResourceRequest: true, }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 4.3K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1/generated.proto
option go_package = "k8s.io/api/rbac/v1"; // AggregationRule describes how to locate ClusterRoles to aggregate into the ClusterRole message AggregationRule { // ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules. // If any of the selectors match, then the ClusterRole's permissions will be added // +optional
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 7.6K bytes - Viewed (0) -
pkg/registry/rbac/rest/storage_rbac_test.go
"k8s.io/kubernetes/plugin/pkg/auth/authorizer/rbac/bootstrappolicy" ) func BenchmarkEnsureRBACPolicy(b *testing.B) { for n := 0; n < b.N; n++ { var policy = &PolicyData{ ClusterRoles: append(bootstrappolicy.ClusterRoles(), bootstrappolicy.ControllerRoles()...), ClusterRoleBindings: append(bootstrappolicy.ClusterRoleBindings(), bootstrappolicy.ControllerRoleBindings()...),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jan 02 03:03:06 UTC 2021 - 1.4K bytes - Viewed (0) -
pkg/registry/rbac/clusterrole/storage/storage.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 09:21:13 UTC 2022 - 1.8K bytes - Viewed (0) -
pkg/registry/rbac/clusterrole/strategy.go
_ = obj.(*rbac.ClusterRole) } // PrepareForUpdate clears fields that are not allowed to be set by end users on update. func (strategy) PrepareForUpdate(ctx context.Context, obj, old runtime.Object) { newClusterRole := obj.(*rbac.ClusterRole) oldClusterRole := old.(*rbac.ClusterRole) _, _ = newClusterRole, oldClusterRole } // Validate validates a new ClusterRole. Validation must check for a correct signature.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Nov 08 01:52:02 UTC 2022 - 4.2K bytes - Viewed (0) -
manifests/charts/istio-operator/templates/clusterrole.yaml
- create - update - apiGroups: - policy resources: - poddisruptionbudgets verbs: - '*' - apiGroups: - rbac.authorization.k8s.io resources: - clusterrolebindings - clusterroles - roles - rolebindings verbs: - '*' - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - create - update - apiGroups: - ""
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 02 08:32:06 UTC 2024 - 1.9K bytes - Viewed (0) -
api/discovery/apis__rbac.authorization.k8s.io__v1.json
"deletecollection", "get", "list", "patch", "update", "watch" ] }, { "kind": "ClusterRole", "name": "clusterroles", "namespaced": false, "singularName": "clusterrole", "storageVersionHash": "bYE5ZWDrJ44=", "verbs": [ "create", "delete", "deletecollection", "get", "list",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon May 15 18:18:19 UTC 2023 - 1.5K bytes - Viewed (0) -
pkg/controller/clusterroleaggregation/clusterroleaggregation_controller_test.go
} role := func(name string, labels map[string]string, rules []rbacv1.PolicyRule) *rbacv1.ClusterRole { return &rbacv1.ClusterRole{ ObjectMeta: metav1.ObjectMeta{Name: name, Labels: labels}, Rules: rules, } } combinedRole := func(selectors []map[string]string, rules ...[]rbacv1.PolicyRule) *rbacv1.ClusterRole { ret := &rbacv1.ClusterRole{ ObjectMeta: metav1.ObjectMeta{Name: "combined"},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 9K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/audit/policy/reader_test.go
users: ["tim"] userGroups: ["testers", "developers"] verbs: ["patch", "delete", "create"] resources: - group: "" - group: "rbac.authorization.k8s.io" resources: ["clusterroles", "clusterrolebindings"] namespaces: ["default", "kube-system"] - level: Metadata ` const policyWithNoVersionOrKind = ` rules: - level: None nonResourceURLs: - /healthz*
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 4.2K bytes - Viewed (0)