- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 210 for clusterRoles (0.21 sec)
-
operator/cmd/mesh/testdata/operator/output/operator-dump.json
] }, { "apiGroups": [ "rbac.authorization.k8s.io" ], "resources": [ "clusterrolebindings", "clusterroles", "roles", "rolebindings" ], "verbs": [ "*" ] }, { "apiGroups": [
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Feb 10 01:35:08 UTC 2023 - 4.1K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/subject_locator.go
roleToRuleMapper RoleToRuleMapper } func NewSubjectAccessEvaluator(roles rbacregistryvalidation.RoleGetter, roleBindings rbacregistryvalidation.RoleBindingLister, clusterRoles rbacregistryvalidation.ClusterRoleGetter, clusterRoleBindings rbacregistryvalidation.ClusterRoleBindingLister, superUser string) *SubjectAccessEvaluator { subjectLocator := &SubjectAccessEvaluator{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 4.7K bytes - Viewed (0) -
pkg/registry/rbac/clusterrole/policybased/storage_test.go
APIVersion: "v1", Resource: "clusterroles", Name: "", }) updateContext := request.WithRequestInfo(request.WithNamespace(context.TODO(), ""), &request.RequestInfo{ IsResourceRequest: true, Verb: "update", APIGroup: "rbac.authorization.k8s.io", APIVersion: "v1", Resource: "clusterroles", Name: "myrole", })
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 09 13:47:19 UTC 2021 - 6.2K bytes - Viewed (0) -
pkg/registry/rbac/clusterrole/registry.go
} func (s *storage) GetClusterRole(ctx context.Context, name string, options *metav1.GetOptions) (*rbacv1.ClusterRole, error) { obj, err := s.Get(ctx, name, options) if err != nil { return nil, err } ret := &rbacv1.ClusterRole{} if err := rbacv1helpers.Convert_rbac_ClusterRole_To_v1_ClusterRole(obj.(*rbac.ClusterRole), ret, nil); err != nil { return nil, err } return ret, nil }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 02 02:35:47 UTC 2019 - 2.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/audit/policy/checker_test.go
Verb: "get", APIGroup: "rbac.authorization.k8s.io", // Core APIVersion: "v1beta1", Resource: "clusterroles", Name: "edit", ResourceRequest: true, Path: "/apis/rbac.authorization.k8s.io/v1beta1/clusterroles/edit", }, "nonResource": &authorizer.AttributesRecord{ User: tim, Verb: "get", ResourceRequest: false,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Oct 12 15:06:14 UTC 2021 - 15.1K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/rbac.go
authorizer := &RBACAuthorizer{ authorizationRuleResolver: rbacregistryvalidation.NewDefaultRuleResolver( roles, roleBindings, clusterRoles, clusterRoleBindings, ), } return authorizer }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 24 10:13:50 UTC 2022 - 7.8K bytes - Viewed (0) -
cmd/kubeadm/app/util/apiclient/idempotency_test.go
client.PrependReactor("create", "clusterroles", func(clientgotesting.Action) (bool, runtime.Object, error) { return true, nil, errors.New("unknown error") }) }, expectedError: true, }, { name: "clusterrole exists, update it", setupClient: func(client *clientsetfake.Clientset) { client.PrependReactor("create", "clusterroles", func(clientgotesting.Action) (bool, runtime.Object, error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 33.2K bytes - Viewed (0) -
operator/cmd/mesh/testdata/operator/output/operator-init.yaml
- create - update - apiGroups: - policy resources: - poddisruptionbudgets verbs: - '*' - apiGroups: - rbac.authorization.k8s.io resources: - clusterrolebindings - clusterroles - roles - rolebindings verbs: - '*' - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - create - update - apiGroups: - "" resources:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 5.3K bytes - Viewed (0) -
pkg/registry/rbac/clusterrole/policybased/storage.go
} clusterRole := obj.(*rbac.ClusterRole) rules := clusterRole.Rules if err := rbacregistryvalidation.ConfirmNoEscalationInternal(ctx, s.ruleResolver, rules); err != nil { return nil, apierrors.NewForbidden(groupResource, clusterRole.Name, err) } // to set the aggregation rule, since it can gather anything, requires * on *.* if hasAggregationRule(clusterRole) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 5.2K bytes - Viewed (0) -
operator/cmd/mesh/testdata/operator/output/operator-dump.yaml
- create - update - apiGroups: - policy resources: - poddisruptionbudgets verbs: - '*' - apiGroups: - rbac.authorization.k8s.io resources: - clusterrolebindings - clusterroles - roles - rolebindings verbs: - '*' - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - create - update - apiGroups: - "" resources:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 5.4K bytes - Viewed (0)