Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 227 for RoleBinding (0.3 sec)

  1. pkg/apis/rbac/v1/helpers.go

    	for _, group := range groups {
    		r.RoleBinding.Subjects = append(r.RoleBinding.Subjects, rbacv1.Subject{Kind: rbacv1.GroupKind, APIGroup: GroupName, Name: group})
    	}
    	return r
    }
    
    // Users adds the specified users as the subjects of the RoleBinding.
    func (r *RoleBindingBuilder) Users(users ...string) *RoleBindingBuilder {
    	for _, user := range users {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 18 15:37:57 UTC 2023
    - 7.4K bytes
    - Viewed (0)
  2. pkg/apis/rbac/v1alpha1/conversion_test.go

    	testcases := map[string]struct {
    		old      *v1alpha1.RoleBinding
    		expected *rbacapi.RoleBinding
    	}{
    		"specific user": {
    			old: &v1alpha1.RoleBinding{
    				RoleRef:  v1alpha1.RoleRef{Name: "foo", APIGroup: v1alpha1.GroupName},
    				Subjects: []v1alpha1.Subject{{Kind: "User", APIVersion: v1alpha1.SchemeGroupVersion.String(), Name: "bob"}},
    			},
    			expected: &rbacapi.RoleBinding{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Oct 18 15:23:55 UTC 2017
    - 4K bytes
    - Viewed (0)
  3. pkg/apis/rbac/helpers.go

    	for _, group := range groups {
    		r.RoleBinding.Subjects = append(r.RoleBinding.Subjects, Subject{Kind: GroupKind, APIGroup: GroupName, Name: group})
    	}
    	return r
    }
    
    // Users adds the specified users as the subjects of the RoleBinding.
    func (r *RoleBindingBuilder) Users(users ...string) *RoleBindingBuilder {
    	for _, user := range users {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Feb 23 15:11:00 UTC 2020
    - 12.1K bytes
    - Viewed (0)
  4. pkg/apis/rbac/validation/validation.go

    	}
    
    	return allErrs
    }
    
    func ValidateRoleBindingUpdate(roleBinding *rbac.RoleBinding, oldRoleBinding *rbac.RoleBinding) field.ErrorList {
    	allErrs := ValidateRoleBinding(roleBinding)
    	allErrs = append(allErrs, validation.ValidateObjectMetaUpdate(&roleBinding.ObjectMeta, &oldRoleBinding.ObjectMeta, field.NewPath("metadata"))...)
    
    	if oldRoleBinding.RoleRef != roleBinding.RoleRef {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Nov 08 01:48:21 UTC 2022
    - 10.4K bytes
    - Viewed (0)
  5. pkg/registry/rbac/rolebinding/policybased/storage.go

    		return nil, errors.NewBadRequest("namespace is required")
    	}
    
    	roleBinding := obj.(*rbac.RoleBinding)
    	if rbacregistry.BindingAuthorized(ctx, roleBinding.RoleRef, namespace, s.authorizer) {
    		return s.StandardStorage.Create(ctx, obj, createValidation, options)
    	}
    
    	v1RoleRef := rbacv1.RoleRef{}
    	err := rbacv1helpers.Convert_rbac_RoleRef_To_v1_RoleRef(&roleBinding.RoleRef, &v1RoleRef, nil)
    	if err != nil {
    		return nil, err
    	}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Nov 18 10:11:16 UTC 2022
    - 5.5K bytes
    - Viewed (0)
  6. pkg/registry/rbac/rolebinding/strategy.go

    	_ = obj.(*rbac.RoleBinding)
    }
    
    // PrepareForUpdate clears fields that are not allowed to be set by end users on update.
    func (strategy) PrepareForUpdate(ctx context.Context, obj, old runtime.Object) {
    	newRoleBinding := obj.(*rbac.RoleBinding)
    	oldRoleBinding := old.(*rbac.RoleBinding)
    
    	_, _ = newRoleBinding, oldRoleBinding
    }
    
    // Validate validates a new RoleBinding. Validation must check for a correct signature.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 18 14:42:36 UTC 2021
    - 3.5K bytes
    - Viewed (0)
  7. plugin/pkg/auth/authorizer/rbac/bootstrappolicy/namespace_policy.go

    		}
    	}
    
    	roleBinding.Namespace = namespace
    	addDefaultMetadata(&roleBinding)
    	existingRoleBindings = append(existingRoleBindings, roleBinding)
    	namespaceRoleBindings[namespace] = existingRoleBindings
    }
    
    func init() {
    	addNamespaceRole(metav1.NamespaceSystem, rbacv1.Role{
    		// role for finding authentication config info for starting a server
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 16 11:54:27 UTC 2020
    - 7.4K bytes
    - Viewed (0)
  8. pkg/registry/rbac/rolebinding/storage/storage.go

    		NewListFunc:               func() runtime.Object { return &rbac.RoleBindingList{} },
    		DefaultQualifiedResource:  rbac.Resource("rolebindings"),
    		SingularQualifiedResource: rbac.Resource("rolebinding"),
    
    		CreateStrategy: rolebinding.Strategy,
    		UpdateStrategy: rolebinding.Strategy,
    		DeleteStrategy: rolebinding.Strategy,
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Nov 18 09:21:13 UTC 2022
    - 1.9K bytes
    - Viewed (0)
  9. pkg/registry/rbac/rest/storage_rbac.go

    	}
    
    	// ensure bootstrap namespaced rolebindings are created or reconciled
    	for namespace, roleBindings := range p.RoleBindings {
    		for _, roleBinding := range roleBindings {
    			opts := reconciliation.ReconcileRoleBindingOptions{
    				RoleBinding: reconciliation.RoleBindingAdapter{RoleBinding: &roleBinding},
    				Client:      reconciliation.RoleBindingClientAdapter{Client: client.RbacV1(), NamespaceClient: client.CoreV1().Namespaces()},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jul 14 03:25:19 UTC 2022
    - 18.5K bytes
    - Viewed (0)
  10. pkg/registry/rbac/validation/rule.go

    }
    
    func (r *StaticRoles) ListRoleBindings(namespace string) ([]*rbacv1.RoleBinding, error) {
    	if len(namespace) == 0 {
    		return nil, errors.New("must provide namespace when listing role bindings")
    	}
    
    	roleBindingList := []*rbacv1.RoleBinding{}
    	for _, roleBinding := range r.roleBindings {
    		if roleBinding.Namespace != namespace {
    			continue
    		}
    		// TODO(ericchiang): need to implement label selectors?
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Nov 02 16:51:16 UTC 2020
    - 11.6K bytes
    - Viewed (0)
Back to top