- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 597 for rbacv1 (0.1 sec)
-
pkg/registry/rbac/clusterrolebinding/registry.go
*/ package clusterrolebinding import ( "context" rbacv1 "k8s.io/api/rbac/v1" metainternalversion "k8s.io/apimachinery/pkg/apis/meta/internalversion" genericapirequest "k8s.io/apiserver/pkg/endpoints/request" "k8s.io/apiserver/pkg/registry/rest" "k8s.io/kubernetes/pkg/apis/rbac" rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1" )
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 2.3K bytes - Viewed (0) -
pkg/registry/rbac/validation/policy_compact_test.go
import ( "reflect" "sort" "testing" rbacv1 "k8s.io/api/rbac/v1" "k8s.io/component-helpers/auth/rbac/validation" rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1" ) func TestCompactRules(t *testing.T) { testcases := map[string]struct { Rules []rbacv1.PolicyRule Expected []rbacv1.PolicyRule }{ "empty": { Rules: []rbacv1.PolicyRule{}, Expected: []rbacv1.PolicyRule{}, }, "simple": {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 02 16:51:16 UTC 2020 - 9.5K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
} func addClusterRoleLabel(roles []rbacv1.ClusterRole) { for i := range roles { addDefaultMetadata(&roles[i]) } return } func addClusterRoleBindingLabel(rolebindings []rbacv1.ClusterRoleBinding) { for i := range rolebindings { addDefaultMetadata(&rolebindings[i]) } return } // NodeRules returns node policy rules, it is slice of rbacv1.PolicyRule. func NodeRules() []rbacv1.PolicyRule {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 34.4K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/rbac_test.go
case rbacv1.UserKind, rbacv1.GroupKind: r.Subjects[i].APIGroup = rbacv1.GroupName default: panic(fmt.Errorf("invalid kind %s", r.Subjects[i].Kind)) } } return r } func newRoleBinding(namespace, roleName string, bindType uint16, subjects ...string) *rbacv1.RoleBinding { r := &rbacv1.RoleBinding{ObjectMeta: metav1.ObjectMeta{Namespace: namespace}} switch bindType { case bindToRole:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 21.1K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go
"k8s.io/kubernetes/plugin/pkg/auth/authorizer/rbac/bootstrappolicy" ) // semanticRoles is a few enumerated roles for which the relationships are well established // and we want to maintain symmetric roles type semanticRoles struct { admin *rbacv1.ClusterRole edit *rbacv1.ClusterRole view *rbacv1.ClusterRole } func getSemanticRoles(roles []rbacv1.ClusterRole) semanticRoles { ret := semanticRoles{} for i := range roles {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 12 15:45:31 UTC 2023 - 9.5K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/subject_locator.go
func (r *SubjectAccessEvaluator) AllowedSubjects(requestAttributes authorizer.Attributes) ([]rbacv1.Subject, error) { subjects := []rbacv1.Subject{{Kind: rbacv1.GroupKind, APIGroup: rbacv1.GroupName, Name: user.SystemPrivilegedGroup}} if len(r.superUser) > 0 { subjects = append(subjects, rbacv1.Subject{Kind: rbacv1.UserKind, APIGroup: rbacv1.GroupName, Name: r.superUser}) } errorlist := []error{}
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 4.7K bytes - Viewed (0) -
pkg/apis/rbac/v1/evaluation_helpers.go
package v1 import ( "fmt" "strings" rbacv1 "k8s.io/api/rbac/v1" ) func VerbMatches(rule *rbacv1.PolicyRule, requestedVerb string) bool { for _, ruleVerb := range rule.Verbs { if ruleVerb == rbacv1.VerbAll { return true } if ruleVerb == requestedVerb { return true } } return false } func APIGroupMatches(rule *rbacv1.PolicyRule, requestedGroup string) bool {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 18 15:37:57 UTC 2023 - 3.8K bytes - Viewed (0) -
pkg/registry/rbac/rolebinding/registry.go
limitations under the License. */ package rolebinding import ( "context" rbacv1 "k8s.io/api/rbac/v1" metainternalversion "k8s.io/apimachinery/pkg/apis/meta/internalversion" genericapirequest "k8s.io/apiserver/pkg/endpoints/request" "k8s.io/apiserver/pkg/registry/rest" "k8s.io/kubernetes/pkg/apis/rbac" rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1" ) // Registry is an interface for things that know how to store RoleBindings.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 2.3K bytes - Viewed (0) -
pkg/controller/clusterroleaggregation/clusterroleaggregation_controller.go
return err } func toApplyPolicyRules(rules []rbacv1.PolicyRule) []*rbacv1ac.PolicyRuleApplyConfiguration { var result []*rbacv1ac.PolicyRuleApplyConfiguration for _, rule := range rules { result = append(result, toApplyPolicyRule(rule)) } return result } func toApplyPolicyRule(rule rbacv1.PolicyRule) *rbacv1ac.PolicyRuleApplyConfiguration { result := rbacv1ac.PolicyRule() result.Resources = rule.Resources
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 8K bytes - Viewed (0) -
pkg/registry/rbac/validation/policy_compact.go
// this is a fast check, and works well with the decomposed "missing rules" list from a Covers check. func CompactRules(rules []rbacv1.PolicyRule) ([]rbacv1.PolicyRule, error) { compacted := make([]rbacv1.PolicyRule, 0, len(rules)) simpleRules := map[simpleResource]*rbacv1.PolicyRule{} for _, rule := range rules { if resource, isSimple := isSimpleResourceRule(&rule); isSimple {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 3.1K bytes - Viewed (0)