- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 384 for rbacv1 (0.24 sec)
-
pkg/apis/rbac/v1/register.go
See the License for the specific language governing permissions and limitations under the License. */ package v1 import ( rbacv1 "k8s.io/api/rbac/v1" "k8s.io/apimachinery/pkg/runtime/schema" ) const GroupName = "rbac.authorization.k8s.io" // SchemeGroupVersion is group version used to register these objects var SchemeGroupVersion = schema.GroupVersion{Group: GroupName, Version: "v1"}
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Aug 09 21:04:54 UTC 2017 - 1.4K bytes - Viewed (0) -
cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap_test.go
} func newMockRbacClientForTest(t *testing.T, clusterRole *rbac.ClusterRole, clusterRoleBinding *rbac.ClusterRoleBinding) *clientsetfake.Clientset { client := clientsetfake.NewSimpleClientset() _, err := client.RbacV1().ClusterRoles().Create(context.TODO(), clusterRole, metav1.CreateOptions{}) if err != nil { t.Fatalf("error creating ClusterRoles: %v", err) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 04:16:31 UTC 2023 - 8.1K bytes - Viewed (0) -
pkg/registry/rbac/clusterrolebinding/policybased/storage.go
package policybased import ( "context" rbacv1 "k8s.io/api/rbac/v1" "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime" "k8s.io/apiserver/pkg/authorization/authorizer" "k8s.io/apiserver/pkg/registry/rest" kapihelper "k8s.io/kubernetes/pkg/apis/core/helper" "k8s.io/kubernetes/pkg/apis/rbac" rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 4.9K bytes - Viewed (0) -
pkg/registry/rbac/rolebinding/policybased/storage.go
"k8s.io/apiserver/pkg/registry/rest" kapihelper "k8s.io/kubernetes/pkg/apis/core/helper" "k8s.io/kubernetes/pkg/apis/rbac" rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1" rbacregistry "k8s.io/kubernetes/pkg/registry/rbac" rbacregistryvalidation "k8s.io/kubernetes/pkg/registry/rbac/validation" ) var groupResource = rbac.Resource("rolebindings") type Storage struct { rest.StandardStorage authorizer authorizer.Authorizer
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 5.5K bytes - Viewed (0) -
cmd/kube-controller-manager/app/rbac.go
go clusterroleaggregation.NewClusterRoleAggregation( controllerContext.InformerFactory.Rbac().V1().ClusterRoles(), controllerContext.ClientBuilder.ClientOrDie("clusterrole-aggregation-controller").RbacV1(), ).Run(ctx, 5) return nil, true, nil
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Oct 27 11:28:02 UTC 2023 - 1.4K bytes - Viewed (0) -
cmd/kubeadm/app/phases/bootstraptoken/clusterinfo/clusterinfo_test.go
if err != nil { t.Fatalf("error creating role: %v", err) } _, err = client.RbacV1().RoleBindings(metav1.NamespacePublic).Create(context.TODO(), &rbac.RoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: BootstrapSignerClusterRoleName, Namespace: metav1.NamespacePublic, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "Role", Name: BootstrapSignerClusterRoleName, },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 5.3K bytes - Viewed (0) -
staging/src/k8s.io/api/roundtrip_test.go
nodev1alpha1 "k8s.io/api/node/v1alpha1" nodev1beta1 "k8s.io/api/node/v1beta1" policyv1 "k8s.io/api/policy/v1" policyv1beta1 "k8s.io/api/policy/v1beta1" rbacv1 "k8s.io/api/rbac/v1" rbacv1alpha1 "k8s.io/api/rbac/v1alpha1" rbacv1beta1 "k8s.io/api/rbac/v1beta1" resourcev1alpha2 "k8s.io/api/resource/v1alpha2" schedulingv1 "k8s.io/api/scheduling/v1" schedulingv1alpha1 "k8s.io/api/scheduling/v1alpha1"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 04:18:56 UTC 2024 - 5.9K bytes - Viewed (0) -
hack/.import-aliases
"k8s.io/api/node/v1beta1": "nodev1beta1", "k8s.io/api/node/v1": "nodev1", "k8s.io/api/policy/v1": "policyv1", "k8s.io/api/policy/v1beta1": "policyv1beta1", "k8s.io/api/rbac/v1": "rbacv1", "k8s.io/api/rbac/v1alpha1": "rbacv1alpha1", "k8s.io/api/rbac/v1beta1": "rbacv1beta1", "k8s.io/api/scheduling/v1": "schedulingv1", "k8s.io/api/scheduling/v1alpha1": "schedulingv1alpha1", "k8s.io/api/scheduling/v1beta1": "schedulingv1beta1",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Aug 17 05:27:21 UTC 2023 - 3.3K bytes - Viewed (0) -
manifests/charts/ztunnel/templates/rbac.yaml
verbs: ["use"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: ztunnel labels: app: ztunnel release: {{ .Release.Name }} istio.io/rev: {{ .Values.revision | default "default" }} install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }} roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: ztunnel
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat May 04 01:17:57 UTC 2024 - 1.3K bytes - Viewed (0) -
istioctl/pkg/authz/listener.go
addPolicy(action, anonymousName, "0") } } } } buf := strings.Builder{} buf.WriteString("ACTION\tAuthorizationPolicy\tRULES\n") for _, action := range []rbacpb.RBAC_Action{rbacpb.RBAC_DENY, rbacpb.RBAC_ALLOW, rbacpb.RBAC_LOG} { if names, ok := actionToPolicy[action]; ok { sortedNames := make([]string, 0, len(names)) for name := range names { sortedNames = append(sortedNames, name) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Sep 11 15:29:30 UTC 2023 - 6K bytes - Viewed (0)