Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 210 for clusterRoles (0.34 sec)

  1. pkg/registry/rbac/validation/rule.go

    		}
    	}
    	return nil, errors.New("role not found")
    }
    
    func (r *StaticRoles) GetClusterRole(name string) (*rbacv1.ClusterRole, error) {
    	for _, clusterRole := range r.clusterRoles {
    		if clusterRole.Name == name {
    			return clusterRole, nil
    		}
    	}
    	return nil, errors.New("clusterrole not found")
    }
    
    func (r *StaticRoles) ListRoleBindings(namespace string) ([]*rbacv1.RoleBinding, error) {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Nov 02 16:51:16 UTC 2020
    - 11.6K bytes
    - Viewed (0)
  2. staging/src/k8s.io/api/rbac/v1beta1/types.go

    }
    
    // AggregationRule describes how to locate ClusterRoles to aggregate into the ClusterRole
    type AggregationRule struct {
    	// ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules.
    	// If any of the selectors match, then the ClusterRole's permissions will be added
    	// +optional
    	// +listType=atomic
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 22:49:19 UTC 2024
    - 13.1K bytes
    - Viewed (0)
  3. manifests/charts/istio-operator/templates/clusterrole.yaml

      - create
      - update
    - apiGroups:
      - policy
      resources:
      - poddisruptionbudgets
      verbs:
      - '*'
    - apiGroups:
      - rbac.authorization.k8s.io
      resources:
      - clusterrolebindings
      - clusterroles
      - roles
      - rolebindings
      verbs:
      - '*'
    - apiGroups:
      - coordination.k8s.io
      resources:
      - leases
      verbs:
      - get
      - create
      - update
    - apiGroups:
      - ""
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Apr 02 08:32:06 UTC 2024
    - 1.9K bytes
    - Viewed (0)
  4. api/discovery/apis__rbac.authorization.k8s.io__v1.json

            "deletecollection",
            "get",
            "list",
            "patch",
            "update",
            "watch"
          ]
        },
        {
          "kind": "ClusterRole",
          "name": "clusterroles",
          "namespaced": false,
          "singularName": "clusterrole",
          "storageVersionHash": "bYE5ZWDrJ44=",
          "verbs": [
            "create",
            "delete",
            "deletecollection",
            "get",
            "list",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon May 15 18:18:19 UTC 2023
    - 1.5K bytes
    - Viewed (0)
  5. pkg/controller/clusterroleaggregation/clusterroleaggregation_controller_test.go

    	}
    	role := func(name string, labels map[string]string, rules []rbacv1.PolicyRule) *rbacv1.ClusterRole {
    		return &rbacv1.ClusterRole{
    			ObjectMeta: metav1.ObjectMeta{Name: name, Labels: labels},
    			Rules:      rules,
    		}
    	}
    	combinedRole := func(selectors []map[string]string, rules ...[]rbacv1.PolicyRule) *rbacv1.ClusterRole {
    		ret := &rbacv1.ClusterRole{
    			ObjectMeta:      metav1.ObjectMeta{Name: "combined"},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:46:12 UTC 2023
    - 9K bytes
    - Viewed (0)
  6. staging/src/k8s.io/apiserver/pkg/audit/policy/reader_test.go

        users: ["tim"]
        userGroups: ["testers", "developers"]
        verbs: ["patch", "delete", "create"]
        resources:
          - group: ""
          - group: "rbac.authorization.k8s.io"
            resources: ["clusterroles", "clusterrolebindings"]
        namespaces: ["default", "kube-system"]
      - level: Metadata
    `
    
    const policyWithNoVersionOrKind = `
    rules:
      - level: None
        nonResourceURLs:
          - /healthz*
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:46:12 UTC 2023
    - 4.2K bytes
    - Viewed (0)
  7. cmd/kube-controller-manager/app/rbac.go

    		aliases:  []string{"clusterrole-aggregation"},
    		initFunc: startClusterRoleAggregationController,
    	}
    }
    
    func startClusterRoleAggregationController(ctx context.Context, controllerContext ControllerContext, controllerName string) (controller.Interface, bool, error) {
    	go clusterroleaggregation.NewClusterRoleAggregation(
    		controllerContext.InformerFactory.Rbac().V1().ClusterRoles(),
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Oct 27 11:28:02 UTC 2023
    - 1.4K bytes
    - Viewed (0)
  8. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go

    // and we want to maintain symmetric roles
    type semanticRoles struct {
    	admin *rbacv1.ClusterRole
    	edit  *rbacv1.ClusterRole
    	view  *rbacv1.ClusterRole
    }
    
    func getSemanticRoles(roles []rbacv1.ClusterRole) semanticRoles {
    	ret := semanticRoles{}
    	for i := range roles {
    		role := roles[i]
    		switch role.Name {
    		case "system:aggregate-to-admin":
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:45:31 UTC 2023
    - 9.5K bytes
    - Viewed (0)
  9. cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap_test.go

    	}
    	return client
    }
    
    func newMockRbacClientForTest(t *testing.T, clusterRole *rbac.ClusterRole, clusterRoleBinding *rbac.ClusterRoleBinding) *clientsetfake.Clientset {
    	client := clientsetfake.NewSimpleClientset()
    	_, err := client.RbacV1().ClusterRoles().Create(context.TODO(), clusterRole, metav1.CreateOptions{})
    	if err != nil {
    		t.Fatalf("error creating ClusterRoles: %v", err)
    	}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Oct 18 04:16:31 UTC 2023
    - 8.1K bytes
    - Viewed (0)
  10. cluster/gce/gci/audit_policy_test.go

    		secrets         = resource("secrets", "default")
    		tokenReviews    = resource("tokenreviews", "", "authentication.k8s.io")
    		deployments     = resource("deployments", "default", "apps")
    		clusterRoles    = resource("clusterroles", "", "rbac.authorization.k8s.io")
    		events          = resource("events", "default")
    		foobars         = resource("foos", "default", "example.com")
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Oct 30 06:23:50 UTC 2021
    - 9.8K bytes
    - Viewed (0)
Back to top