- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 60 for clusterRoleBindings (0.24 sec)
-
pkg/registry/rbac/clusterrolebinding/policybased/storage.go
rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1" rbacregistry "k8s.io/kubernetes/pkg/registry/rbac" rbacregistryvalidation "k8s.io/kubernetes/pkg/registry/rbac/validation" ) var groupResource = rbac.Resource("clusterrolebindings") type Storage struct { rest.StandardStorage authorizer authorizer.Authorizer ruleResolver rbacregistryvalidation.AuthorizationRuleResolver }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 4.9K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
}, }) } addClusterRoleLabel(roles) return roles } const systemNodeRoleName = "system:node" // ClusterRoleBindings return default rolebindings to the default roles func ClusterRoleBindings() []rbacv1.ClusterRoleBinding { rolebindings := []rbacv1.ClusterRoleBinding{ rbacv1helpers.NewClusterBinding("cluster-admin").Groups(user.SystemPrivilegedGroup).BindingOrDie(),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 34.4K bytes - Viewed (0) -
pkg/registry/rbac/validation/rule_test.go
{Kind: rbacv1.UserKind, Name: "foobar"}, {Kind: rbacv1.GroupKind, Name: "group1"}, }, RoleRef: rbacv1.RoleRef{APIGroup: rbacv1.GroupName, Kind: "Role", Name: "readthings"}, }, }, clusterRoleBindings: []*rbacv1.ClusterRoleBinding{ { Subjects: []rbacv1.Subject{ {Kind: rbacv1.UserKind, Name: "admin"}, {Kind: rbacv1.GroupKind, Name: "admin"}, },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 7.9K bytes - Viewed (0) -
cmd/kubeadm/app/util/apiclient/idempotency.go
ctx := context.Background() if _, err := client.RbacV1().ClusterRoleBindings().Create(ctx, clusterRoleBinding, metav1.CreateOptions{}); err != nil { if !apierrors.IsAlreadyExists(err) { lastError = errors.Wrap(err, "unable to create ClusterRoleBinding") return false, nil } if _, err := client.RbacV1().ClusterRoleBindings().Update(ctx, clusterRoleBinding, metav1.UpdateOptions{}); err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 18.4K bytes - Viewed (0) -
pkg/kubeapiserver/authorizer/config.go
&rbac.ClusterRoleGetter{Lister: config.VersionedInformerFactory.Rbac().V1().ClusterRoles().Lister()}, &rbac.ClusterRoleBindingLister{Lister: config.VersionedInformerFactory.Rbac().V1().ClusterRoleBindings().Lister()}, ) } } // Require all non-webhook authorizer types to remain specified in the file on reload seenTypes.Delete(authzconfig.TypeWebhook) r.requireNonWebhookTypes = seenTypes
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 07 21:22:55 UTC 2024 - 8K bytes - Viewed (0) -
cmd/kubeadm/app/phases/kubeconfig/kubeconfig.go
err = wait.PollUntilContextTimeout( ctx, retryInterval, retryTimeout, true, func(ctx context.Context) (bool, error) { if _, err := adminClient.RbacV1().ClusterRoleBindings().Create( ctx, clusterRoleBinding, metav1.CreateOptions{}, ); err != nil { if apierrors.IsForbidden(err) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 07 17:04:18 UTC 2024 - 27K bytes - Viewed (0) -
cmd/kubeadm/app/phases/addons/dns/dns.go
return errors.Wrapf(err, "%s ClusterRoleBinding", unableToDecodeCoreDNS) } // Create the Clusterrolebindings for CoreDNS or update it in case it already exists if err := apiclient.CreateOrUpdateClusterRoleBinding(client, coreDNSClusterRolesBinding); err != nil { return err }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 11 10:21:20 UTC 2024 - 16.1K bytes - Viewed (0) -
api/discovery/aggregated_v2.json
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Mar 12 17:29:14 UTC 2024 - 55.4K bytes - Viewed (0) -
api/discovery/aggregated_v2beta1.json
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 04:18:56 UTC 2024 - 55.4K bytes - Viewed (0) -
istioctl/pkg/precheck/precheck.go
}, { group: "rbac.authorization.k8s.io", version: "v1", resource: "clusterroles", }, { group: "rbac.authorization.k8s.io", version: "v1", resource: "clusterrolebindings", }, { group: "apiextensions.k8s.io", version: "v1", resource: "customresourcedefinitions", }, { namespace: istioNamespace, group: "rbac.authorization.k8s.io",
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 12 02:57:30 UTC 2024 - 19.3K bytes - Viewed (0)