- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 245 for roleBindings (0.2 sec)
-
staging/src/k8s.io/apiserver/pkg/apis/audit/validation/validation_test.go
}, { // Specific request Level: audit.LevelRequestResponse, Verbs: []string{"get"}, Resources: []audit.GroupResources{{Group: "rbac.authorization.k8s.io", Resources: []string{"roles", "rolebindings"}}}, Namespaces: []string{"kube-system"}, }, { // Some non-resource URLs Level: audit.LevelMetadata, UserGroups: []string{"developers"}, NonResourceURLs: []string{ "/logs*", "/healthz*",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 02 07:48:42 UTC 2023 - 4.5K bytes - Viewed (0) -
operator/cmd/mesh/testdata/operator/output/operator-dump.yaml
- apiGroups: - policy resources: - poddisruptionbudgets verbs: - '*' - apiGroups: - rbac.authorization.k8s.io resources: - clusterrolebindings - clusterroles - roles - rolebindings verbs: - '*' - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - create - update - apiGroups: - "" resources: - configmaps
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 05:10:03 UTC 2024 - 5.4K bytes - Viewed (0) -
pkg/registry/rbac/escalation_check.go
User: user, Verb: "bind", // check against the namespace where the binding is being created (or the empty namespace for clusterrolebindings). // this allows delegation to bind particular clusterroles in rolebindings within particular namespaces, // and to authorize binding a clusterrole across all namespaces in a clusterrolebinding. Namespace: bindingNamespace, ResourceRequest: true, }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 4.3K bytes - Viewed (0) -
operator/cmd/mesh/testdata/operator/output/operator-remove.yaml
- apiGroups: - policy resources: - poddisruptionbudgets verbs: - '*' - apiGroups: - rbac.authorization.k8s.io resources: - clusterrolebindings - clusterroles - roles - rolebindings verbs: - '*' - apiGroups: - "" resources: - configmaps - endpoints - events - namespaces - pods - persistentvolumeclaims - secrets - services
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Aug 21 01:45:21 UTC 2020 - 5.4K bytes - Viewed (0) -
cmd/kubeadm/app/util/apiclient/idempotency.go
if _, err := client.RbacV1().RoleBindings(roleBinding.ObjectMeta.Namespace).Create(ctx, roleBinding, metav1.CreateOptions{}); err != nil { if !apierrors.IsAlreadyExists(err) { lastError = errors.Wrap(err, "unable to create RoleBinding") return false, nil } if _, err := client.RbacV1().RoleBindings(roleBinding.ObjectMeta.Namespace).Update(ctx, roleBinding, metav1.UpdateOptions{}); err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 18.4K bytes - Viewed (0) -
pkg/registry/rbac/validation/rule_test.go
Rules: []rbacv1.PolicyRule{ruleAdmin}, }, { ObjectMeta: metav1.ObjectMeta{Name: "write-nodes"}, Rules: []rbacv1.PolicyRule{ruleWriteNodes}, }, }, roleBindings: []*rbacv1.RoleBinding{ { ObjectMeta: metav1.ObjectMeta{Namespace: "namespace1"}, Subjects: []rbacv1.Subject{ {Kind: rbacv1.UserKind, Name: "foobar"}, {Kind: rbacv1.GroupKind, Name: "group1"}, },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:46:12 UTC 2023 - 7.9K bytes - Viewed (0) -
pkg/kubeapiserver/authorizer/config.go
r.rbacAuthorizer = rbac.New( &rbac.RoleGetter{Lister: config.VersionedInformerFactory.Rbac().V1().Roles().Lister()}, &rbac.RoleBindingLister{Lister: config.VersionedInformerFactory.Rbac().V1().RoleBindings().Lister()}, &rbac.ClusterRoleGetter{Lister: config.VersionedInformerFactory.Rbac().V1().ClusterRoles().Lister()},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 07 21:22:55 UTC 2024 - 8K bytes - Viewed (0) -
api/discovery/aggregated_v2.json
] }, { "resource": "rolebindings", "responseKind": { "group": "", "kind": "RoleBinding", "version": "" }, "scope": "Namespaced", "singularResource": "rolebinding", "verbs": [ "create", "delete",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Mar 12 17:29:14 UTC 2024 - 55.4K bytes - Viewed (0) -
api/discovery/aggregated_v2beta1.json
] }, { "resource": "rolebindings", "responseKind": { "group": "", "kind": "RoleBinding", "version": "" }, "scope": "Namespaced", "singularResource": "rolebinding", "verbs": [ "create", "delete",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 04:18:56 UTC 2024 - 55.4K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-roles.yaml
rules: - apiGroups: - authorization.k8s.io resources: - localsubjectaccessreviews verbs: - create - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - delete - deletecollection - get - list - patch - update - watch - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jul 18 08:11:08 UTC 2023 - 24.1K bytes - Viewed (0)