Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 384 for rbacv1 (0.13 sec)

  1. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go

    	"k8s.io/kubernetes/plugin/pkg/auth/authorizer/rbac/bootstrappolicy"
    )
    
    // semanticRoles is a few enumerated roles for which the relationships are well established
    // and we want to maintain symmetric roles
    type semanticRoles struct {
    	admin *rbacv1.ClusterRole
    	edit  *rbacv1.ClusterRole
    	view  *rbacv1.ClusterRole
    }
    
    func getSemanticRoles(roles []rbacv1.ClusterRole) semanticRoles {
    	ret := semanticRoles{}
    	for i := range roles {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:45:31 UTC 2023
    - 9.5K bytes
    - Viewed (0)
  2. plugin/pkg/auth/authorizer/rbac/subject_locator.go

    func (r *SubjectAccessEvaluator) AllowedSubjects(requestAttributes authorizer.Attributes) ([]rbacv1.Subject, error) {
    	subjects := []rbacv1.Subject{{Kind: rbacv1.GroupKind, APIGroup: rbacv1.GroupName, Name: user.SystemPrivilegedGroup}}
    	if len(r.superUser) > 0 {
    		subjects = append(subjects, rbacv1.Subject{Kind: rbacv1.UserKind, APIGroup: rbacv1.GroupName, Name: r.superUser})
    	}
    	errorlist := []error{}
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 4.7K bytes
    - Viewed (0)
  3. pkg/apis/rbac/v1/evaluation_helpers.go

    package v1
    
    import (
    	"fmt"
    	"strings"
    
    	rbacv1 "k8s.io/api/rbac/v1"
    )
    
    func VerbMatches(rule *rbacv1.PolicyRule, requestedVerb string) bool {
    	for _, ruleVerb := range rule.Verbs {
    		if ruleVerb == rbacv1.VerbAll {
    			return true
    		}
    		if ruleVerb == requestedVerb {
    			return true
    		}
    	}
    
    	return false
    }
    
    func APIGroupMatches(rule *rbacv1.PolicyRule, requestedGroup string) bool {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 18 15:37:57 UTC 2023
    - 3.8K bytes
    - Viewed (0)
  4. pkg/registry/rbac/rolebinding/registry.go

    limitations under the License.
    */
    
    package rolebinding
    
    import (
    	"context"
    
    	rbacv1 "k8s.io/api/rbac/v1"
    	metainternalversion "k8s.io/apimachinery/pkg/apis/meta/internalversion"
    	genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
    	"k8s.io/apiserver/pkg/registry/rest"
    	"k8s.io/kubernetes/pkg/apis/rbac"
    	rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1"
    )
    
    // Registry is an interface for things that know how to store RoleBindings.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 2.3K bytes
    - Viewed (0)
  5. pkg/controller/clusterroleaggregation/clusterroleaggregation_controller.go

    	return err
    }
    
    func toApplyPolicyRules(rules []rbacv1.PolicyRule) []*rbacv1ac.PolicyRuleApplyConfiguration {
    	var result []*rbacv1ac.PolicyRuleApplyConfiguration
    	for _, rule := range rules {
    		result = append(result, toApplyPolicyRule(rule))
    	}
    	return result
    }
    
    func toApplyPolicyRule(rule rbacv1.PolicyRule) *rbacv1ac.PolicyRuleApplyConfiguration {
    	result := rbacv1ac.PolicyRule()
    	result.Resources = rule.Resources
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 8K bytes
    - Viewed (0)
  6. pkg/registry/rbac/validation/policy_compact.go

    // this is a fast check, and works well with the decomposed "missing rules" list from a Covers check.
    func CompactRules(rules []rbacv1.PolicyRule) ([]rbacv1.PolicyRule, error) {
    	compacted := make([]rbacv1.PolicyRule, 0, len(rules))
    
    	simpleRules := map[simpleResource]*rbacv1.PolicyRule{}
    	for _, rule := range rules {
    		if resource, isSimple := isSimpleResourceRule(&rule); isSimple {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 3.1K bytes
    - Viewed (0)
  7. pkg/registry/rbac/clusterrole/registry.go

    limitations under the License.
    */
    
    package clusterrole
    
    import (
    	"context"
    
    	rbacv1 "k8s.io/api/rbac/v1"
    	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
    	genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
    	"k8s.io/apiserver/pkg/registry/rest"
    	"k8s.io/kubernetes/pkg/apis/rbac"
    	rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1"
    )
    
    // Registry is an interface for things that know how to store ClusterRoles.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 02 02:35:47 UTC 2019
    - 2.1K bytes
    - Viewed (0)
  8. pkg/registry/rbac/role/policybased/storage_test.go

    		nil,
    		nil,
    		[]*rbacv1.ClusterRole{{ObjectMeta: metav1.ObjectMeta{Name: "alice-role"}, Rules: []rbacv1.PolicyRule{{APIGroups: []string{"*"}, Resources: []string{"*"}, Verbs: []string{"*"}}}}},
    		[]*rbacv1.ClusterRoleBinding{{RoleRef: rbacv1.RoleRef{Name: "alice-role", APIGroup: "rbac.authorization.k8s.io", Kind: "ClusterRole"}, Subjects: []rbacv1.Subject{{Name: "alice", Kind: "User", APIGroup: "rbac.authorization.k8s.io"}}}},
    	)
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Apr 09 13:47:19 UTC 2021
    - 6.3K bytes
    - Viewed (0)
  9. pkg/registry/rbac/validation/internal_version_adapter.go

    */
    
    package validation
    
    import (
    	"context"
    
    	rbacv1 "k8s.io/api/rbac/v1"
    	"k8s.io/kubernetes/pkg/apis/rbac"
    	rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1"
    )
    
    func ConfirmNoEscalationInternal(ctx context.Context, ruleResolver AuthorizationRuleResolver, inRules []rbac.PolicyRule) error {
    	rules := []rbacv1.PolicyRule{}
    	for i := range inRules {
    		v1Rule := rbacv1.PolicyRule{}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 1.1K bytes
    - Viewed (0)
  10. pkg/registry/rbac/clusterrole/policybased/storage_test.go

    		nil,
    		nil,
    		[]*rbacv1.ClusterRole{{ObjectMeta: metav1.ObjectMeta{Name: "alice-role"}, Rules: []rbacv1.PolicyRule{{APIGroups: []string{"*"}, Resources: []string{"*"}, Verbs: []string{"*"}}}}},
    		[]*rbacv1.ClusterRoleBinding{{RoleRef: rbacv1.RoleRef{Name: "alice-role", APIGroup: "rbac.authorization.k8s.io", Kind: "ClusterRole"}, Subjects: []rbacv1.Subject{{Name: "alice", Kind: "User", APIGroup: "rbac.authorization.k8s.io"}}}},
    	)
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Apr 09 13:47:19 UTC 2021
    - 6.2K bytes
    - Viewed (0)
Back to top