Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 597 for rbacv1 (0.1 sec)

  1. pkg/registry/rbac/clusterrolebinding/registry.go

    */
    
    package clusterrolebinding
    
    import (
    	"context"
    
    	rbacv1 "k8s.io/api/rbac/v1"
    	metainternalversion "k8s.io/apimachinery/pkg/apis/meta/internalversion"
    	genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
    	"k8s.io/apiserver/pkg/registry/rest"
    	"k8s.io/kubernetes/pkg/apis/rbac"
    	rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1"
    )
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 2.3K bytes
    - Viewed (0)
  2. pkg/registry/rbac/validation/policy_compact_test.go

    import (
    	"reflect"
    	"sort"
    	"testing"
    
    	rbacv1 "k8s.io/api/rbac/v1"
    	"k8s.io/component-helpers/auth/rbac/validation"
    	rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1"
    )
    
    func TestCompactRules(t *testing.T) {
    	testcases := map[string]struct {
    		Rules    []rbacv1.PolicyRule
    		Expected []rbacv1.PolicyRule
    	}{
    		"empty": {
    			Rules:    []rbacv1.PolicyRule{},
    			Expected: []rbacv1.PolicyRule{},
    		},
    		"simple": {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Nov 02 16:51:16 UTC 2020
    - 9.5K bytes
    - Viewed (0)
  3. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go

    }
    
    func addClusterRoleLabel(roles []rbacv1.ClusterRole) {
    	for i := range roles {
    		addDefaultMetadata(&roles[i])
    	}
    	return
    }
    
    func addClusterRoleBindingLabel(rolebindings []rbacv1.ClusterRoleBinding) {
    	for i := range rolebindings {
    		addDefaultMetadata(&rolebindings[i])
    	}
    	return
    }
    
    // NodeRules returns node policy rules, it is slice of rbacv1.PolicyRule.
    func NodeRules() []rbacv1.PolicyRule {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 08 19:25:10 UTC 2024
    - 34.4K bytes
    - Viewed (0)
  4. plugin/pkg/auth/authorizer/rbac/rbac_test.go

    		case rbacv1.UserKind, rbacv1.GroupKind:
    			r.Subjects[i].APIGroup = rbacv1.GroupName
    		default:
    			panic(fmt.Errorf("invalid kind %s", r.Subjects[i].Kind))
    		}
    	}
    	return r
    }
    
    func newRoleBinding(namespace, roleName string, bindType uint16, subjects ...string) *rbacv1.RoleBinding {
    	r := &rbacv1.RoleBinding{ObjectMeta: metav1.ObjectMeta{Namespace: namespace}}
    
    	switch bindType {
    	case bindToRole:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Sep 24 15:14:54 UTC 2019
    - 21.1K bytes
    - Viewed (0)
  5. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go

    	"k8s.io/kubernetes/plugin/pkg/auth/authorizer/rbac/bootstrappolicy"
    )
    
    // semanticRoles is a few enumerated roles for which the relationships are well established
    // and we want to maintain symmetric roles
    type semanticRoles struct {
    	admin *rbacv1.ClusterRole
    	edit  *rbacv1.ClusterRole
    	view  *rbacv1.ClusterRole
    }
    
    func getSemanticRoles(roles []rbacv1.ClusterRole) semanticRoles {
    	ret := semanticRoles{}
    	for i := range roles {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:45:31 UTC 2023
    - 9.5K bytes
    - Viewed (0)
  6. plugin/pkg/auth/authorizer/rbac/subject_locator.go

    func (r *SubjectAccessEvaluator) AllowedSubjects(requestAttributes authorizer.Attributes) ([]rbacv1.Subject, error) {
    	subjects := []rbacv1.Subject{{Kind: rbacv1.GroupKind, APIGroup: rbacv1.GroupName, Name: user.SystemPrivilegedGroup}}
    	if len(r.superUser) > 0 {
    		subjects = append(subjects, rbacv1.Subject{Kind: rbacv1.UserKind, APIGroup: rbacv1.GroupName, Name: r.superUser})
    	}
    	errorlist := []error{}
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 4.7K bytes
    - Viewed (0)
  7. pkg/apis/rbac/v1/evaluation_helpers.go

    package v1
    
    import (
    	"fmt"
    	"strings"
    
    	rbacv1 "k8s.io/api/rbac/v1"
    )
    
    func VerbMatches(rule *rbacv1.PolicyRule, requestedVerb string) bool {
    	for _, ruleVerb := range rule.Verbs {
    		if ruleVerb == rbacv1.VerbAll {
    			return true
    		}
    		if ruleVerb == requestedVerb {
    			return true
    		}
    	}
    
    	return false
    }
    
    func APIGroupMatches(rule *rbacv1.PolicyRule, requestedGroup string) bool {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 18 15:37:57 UTC 2023
    - 3.8K bytes
    - Viewed (0)
  8. pkg/registry/rbac/rolebinding/registry.go

    limitations under the License.
    */
    
    package rolebinding
    
    import (
    	"context"
    
    	rbacv1 "k8s.io/api/rbac/v1"
    	metainternalversion "k8s.io/apimachinery/pkg/apis/meta/internalversion"
    	genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
    	"k8s.io/apiserver/pkg/registry/rest"
    	"k8s.io/kubernetes/pkg/apis/rbac"
    	rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1"
    )
    
    // Registry is an interface for things that know how to store RoleBindings.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 2.3K bytes
    - Viewed (0)
  9. pkg/controller/clusterroleaggregation/clusterroleaggregation_controller.go

    	return err
    }
    
    func toApplyPolicyRules(rules []rbacv1.PolicyRule) []*rbacv1ac.PolicyRuleApplyConfiguration {
    	var result []*rbacv1ac.PolicyRuleApplyConfiguration
    	for _, rule := range rules {
    		result = append(result, toApplyPolicyRule(rule))
    	}
    	return result
    }
    
    func toApplyPolicyRule(rule rbacv1.PolicyRule) *rbacv1ac.PolicyRuleApplyConfiguration {
    	result := rbacv1ac.PolicyRule()
    	result.Resources = rule.Resources
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 8K bytes
    - Viewed (0)
  10. pkg/registry/rbac/validation/policy_compact.go

    // this is a fast check, and works well with the decomposed "missing rules" list from a Covers check.
    func CompactRules(rules []rbacv1.PolicyRule) ([]rbacv1.PolicyRule, error) {
    	compacted := make([]rbacv1.PolicyRule, 0, len(rules))
    
    	simpleRules := map[simpleResource]*rbacv1.PolicyRule{}
    	for _, rule := range rules {
    		if resource, isSimple := isSimpleResourceRule(&rule); isSimple {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 3.1K bytes
    - Viewed (0)
Back to top