- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 11 for RuleOrDie (0.14 sec)
-
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go
rbacv1helpers.NewRule("get", "list", "watch").Groups(legacyGroup).Resources("nodes").RuleOrDie(), rbacv1helpers.NewRule("patch", "update").Groups(legacyGroup).Resources("nodes/status").RuleOrDie(), rbacv1helpers.NewRule("list", "watch").Groups(legacyGroup).Resources("pods").RuleOrDie(), eventsRule(),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 28.9K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
rbacv1helpers.NewRule("impersonate").Groups(legacyGroup).Resources("serviceaccounts").RuleOrDie(), rbacv1helpers.NewRule(Write...).Groups(legacyGroup).Resources("pods", "pods/attach", "pods/proxy", "pods/exec", "pods/portforward").RuleOrDie(), rbacv1helpers.NewRule("create").Groups(legacyGroup).Resources("pods/eviction").RuleOrDie(),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 34.4K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/namespace_policy.go
}, }) addNamespaceRole(metav1.NamespaceSystem, rbacv1.Role{ // role for the bootstrap signer to be able to inspect kube-system secrets ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "bootstrap-signer"}, Rules: []rbacv1.PolicyRule{ rbacv1helpers.NewRule("get", "list", "watch").Groups(legacyGroup).Resources("secrets").RuleOrDie(), }, })
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 16 11:54:27 UTC 2020 - 7.4K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go
rbacv1helpers.NewRule(bootstrappolicy.Read...).Groups("").Resources("pods/attach").RuleOrDie(), rbacv1helpers.NewRule(bootstrappolicy.Read...).Groups("").Resources("pods/proxy").RuleOrDie(), rbacv1helpers.NewRule(bootstrappolicy.Read...).Groups("").Resources("pods/exec").RuleOrDie(), rbacv1helpers.NewRule(bootstrappolicy.Read...).Groups("").Resources("pods/portforward").RuleOrDie(),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:45:31 UTC 2023 - 9.5K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/rbac_test.go
rule rbacv1.PolicyRule requestsToExpected map[authorizer.AttributesRecord]bool }{ { name: "star verb, exact match other", rule: rbacv1helpers.NewRule("*").Groups("group1").Resources("resource1").RuleOrDie(), requestsToExpected: map[authorizer.AttributesRecord]bool{ resourceRequest("verb1").Group("group1").Resource("resource1").New(): true, resourceRequest("verb1").Group("group2").Resource("resource1").New(): false,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 21.1K bytes - Viewed (0) -
pkg/apis/rbac/helpers_test.go
role := &rbac.Role{ Rules: []rbac.PolicyRule{ rbac.NewRule("verb").Groups("g").Resources("foo").RuleOrDie(), rbac.NewRule("verb").URLs("/foo").RuleOrDie(), }, } clusterRole := &rbac.ClusterRole{ Rules: []rbac.PolicyRule{ rbac.NewRule("verb").Groups("g").Resources("foo").RuleOrDie(), rbac.NewRule("verb").URLs("/foo").RuleOrDie(), }, }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 9.2K bytes - Viewed (0) -
pkg/registry/rbac/clusterrole/policybased/storage.go
return nil } return svp.StorageVersion() } var _ rest.StorageVersionProvider = &Storage{} var fullAuthority = []rbac.PolicyRule{ rbac.NewRule("*").Groups("*").Resources("*").RuleOrDie(), rbac.NewRule("*").URLs("*").RuleOrDie(), } func (s *Storage) Create(ctx context.Context, obj runtime.Object, createValidatingAdmission rest.ValidateObjectFunc, options *metav1.CreateOptions) (runtime.Object, error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 5.2K bytes - Viewed (0) -
pkg/apis/rbac/v1alpha1/helpers.go
return r } func (r *PolicyRuleBuilder) URLs(urls ...string) *PolicyRuleBuilder { r.PolicyRule.NonResourceURLs = append(r.PolicyRule.NonResourceURLs, urls...) return r } func (r *PolicyRuleBuilder) RuleOrDie() rbacv1alpha1.PolicyRule { ret, err := r.Rule() if err != nil { panic(err) } return ret } func (r *PolicyRuleBuilder) Rule() (rbacv1alpha1.PolicyRule, error) { if len(r.PolicyRule.Verbs) == 0 {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 4.4K bytes - Viewed (0) -
pkg/apis/rbac/v1beta1/helpers.go
return r } func (r *PolicyRuleBuilder) URLs(urls ...string) *PolicyRuleBuilder { r.PolicyRule.NonResourceURLs = append(r.PolicyRule.NonResourceURLs, urls...) return r } func (r *PolicyRuleBuilder) RuleOrDie() rbacv1beta1.PolicyRule { ret, err := r.Rule() if err != nil { panic(err) } return ret } func (r *PolicyRuleBuilder) Rule() (rbacv1beta1.PolicyRule, error) { if len(r.PolicyRule.Verbs) == 0 {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 4.4K bytes - Viewed (0) -
pkg/apis/rbac/helpers.go
func (r *PolicyRuleBuilder) URLs(urls ...string) *PolicyRuleBuilder { r.PolicyRule.NonResourceURLs = combine(r.PolicyRule.NonResourceURLs, urls) return r } // RuleOrDie calls the binding method and panics if there is an error. func (r *PolicyRuleBuilder) RuleOrDie() PolicyRule { ret, err := r.Rule() if err != nil { panic(err) } return ret } func combine(s1, s2 []string) []string {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 23 15:11:00 UTC 2020 - 12.1K bytes - Viewed (0)