Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 245 for roleBindings (0.2 sec)

  1. staging/src/k8s.io/apiserver/pkg/apis/audit/validation/validation_test.go

    		}, { // Specific request
    			Level:      audit.LevelRequestResponse,
    			Verbs:      []string{"get"},
    			Resources:  []audit.GroupResources{{Group: "rbac.authorization.k8s.io", Resources: []string{"roles", "rolebindings"}}},
    			Namespaces: []string{"kube-system"},
    		}, { // Some non-resource URLs
    			Level:      audit.LevelMetadata,
    			UserGroups: []string{"developers"},
    			NonResourceURLs: []string{
    				"/logs*",
    				"/healthz*",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 02 07:48:42 UTC 2023
    - 4.5K bytes
    - Viewed (0)
  2. operator/cmd/mesh/testdata/operator/output/operator-dump.yaml

    - apiGroups:
      - policy
      resources:
      - poddisruptionbudgets
      verbs:
      - '*'
    - apiGroups:
      - rbac.authorization.k8s.io
      resources:
      - clusterrolebindings
      - clusterroles
      - roles
      - rolebindings
      verbs:
      - '*'
    - apiGroups:
      - coordination.k8s.io
      resources:
      - leases
      verbs:
      - get
      - create
      - update
    - apiGroups:
      - ""
      resources:
      - configmaps
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jan 10 05:10:03 UTC 2024
    - 5.4K bytes
    - Viewed (0)
  3. pkg/registry/rbac/escalation_check.go

    		User: user,
    		Verb: "bind",
    		// check against the namespace where the binding is being created (or the empty namespace for clusterrolebindings).
    		// this allows delegation to bind particular clusterroles in rolebindings within particular namespaces,
    		// and to authorize binding a clusterrole across all namespaces in a clusterrolebinding.
    		Namespace:       bindingNamespace,
    		ResourceRequest: true,
    	}
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Sep 24 15:14:54 UTC 2019
    - 4.3K bytes
    - Viewed (0)
  4. operator/cmd/mesh/testdata/operator/output/operator-remove.yaml

    - apiGroups:
      - policy
      resources:
      - poddisruptionbudgets
      verbs:
      - '*'
    - apiGroups:
      - rbac.authorization.k8s.io
      resources:
      - clusterrolebindings
      - clusterroles
      - roles
      - rolebindings
      verbs:
      - '*'
    - apiGroups:
      - ""
      resources:
      - configmaps
      - endpoints
      - events
      - namespaces
      - pods
      - persistentvolumeclaims
      - secrets
      - services
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Aug 21 01:45:21 UTC 2020
    - 5.4K bytes
    - Viewed (0)
  5. cmd/kubeadm/app/util/apiclient/idempotency.go

    			if _, err := client.RbacV1().RoleBindings(roleBinding.ObjectMeta.Namespace).Create(ctx, roleBinding, metav1.CreateOptions{}); err != nil {
    				if !apierrors.IsAlreadyExists(err) {
    					lastError = errors.Wrap(err, "unable to create RoleBinding")
    					return false, nil
    				}
    				if _, err := client.RbacV1().RoleBindings(roleBinding.ObjectMeta.Namespace).Update(ctx, roleBinding, metav1.UpdateOptions{}); err != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Feb 18 11:14:32 UTC 2024
    - 18.4K bytes
    - Viewed (0)
  6. pkg/registry/rbac/validation/rule_test.go

    				Rules:      []rbacv1.PolicyRule{ruleAdmin},
    			},
    			{
    				ObjectMeta: metav1.ObjectMeta{Name: "write-nodes"},
    				Rules:      []rbacv1.PolicyRule{ruleWriteNodes},
    			},
    		},
    		roleBindings: []*rbacv1.RoleBinding{
    			{
    				ObjectMeta: metav1.ObjectMeta{Namespace: "namespace1"},
    				Subjects: []rbacv1.Subject{
    					{Kind: rbacv1.UserKind, Name: "foobar"},
    					{Kind: rbacv1.GroupKind, Name: "group1"},
    				},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:46:12 UTC 2023
    - 7.9K bytes
    - Viewed (0)
  7. pkg/kubeapiserver/authorizer/config.go

    			r.rbacAuthorizer = rbac.New(
    				&rbac.RoleGetter{Lister: config.VersionedInformerFactory.Rbac().V1().Roles().Lister()},
    				&rbac.RoleBindingLister{Lister: config.VersionedInformerFactory.Rbac().V1().RoleBindings().Lister()},
    				&rbac.ClusterRoleGetter{Lister: config.VersionedInformerFactory.Rbac().V1().ClusterRoles().Lister()},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 07 21:22:55 UTC 2024
    - 8K bytes
    - Viewed (0)
  8. api/discovery/aggregated_v2.json

                  ]
                },
                {
                  "resource": "rolebindings",
                  "responseKind": {
                    "group": "",
                    "kind": "RoleBinding",
                    "version": ""
                  },
                  "scope": "Namespaced",
                  "singularResource": "rolebinding",
                  "verbs": [
                    "create",
                    "delete",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Mar 12 17:29:14 UTC 2024
    - 55.4K bytes
    - Viewed (0)
  9. api/discovery/aggregated_v2beta1.json

                  ]
                },
                {
                  "resource": "rolebindings",
                  "responseKind": {
                    "group": "",
                    "kind": "RoleBinding",
                    "version": ""
                  },
                  "scope": "Namespaced",
                  "singularResource": "rolebinding",
                  "verbs": [
                    "create",
                    "delete",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 04:18:56 UTC 2024
    - 55.4K bytes
    - Viewed (0)
  10. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-roles.yaml

      rules:
      - apiGroups:
        - authorization.k8s.io
        resources:
        - localsubjectaccessreviews
        verbs:
        - create
      - apiGroups:
        - rbac.authorization.k8s.io
        resources:
        - rolebindings
        - roles
        verbs:
        - create
        - delete
        - deletecollection
        - get
        - list
        - patch
        - update
        - watch
    - apiVersion: rbac.authorization.k8s.io/v1
      kind: ClusterRole
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jul 18 08:11:08 UTC 2023
    - 24.1K bytes
    - Viewed (0)
Back to top