- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 32 for PolicyRule (0.14 sec)
-
staging/src/k8s.io/apiserver/pkg/util/flowcontrol/rule.go
for _, policyRule := range flowSchema.Spec.Rules { if matchesPolicyRule(digest, &policyRule) { return true } } return false } func matchesPolicyRule(digest RequestDigest, policyRule *flowcontrol.PolicyRulesWithSubjects) bool { if !matchesASubject(digest.User, policyRule.Subjects) { return false } if digest.RequestInfo.IsResourceRequest {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Oct 30 12:18:35 UTC 2023 - 6.3K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/controller_policy.go
Rules: []rbacv1.PolicyRule{ rbacv1helpers.NewRule("create").Groups(legacyGroup).Resources("serviceaccounts").RuleOrDie(), eventsRule(), }, }) addControllerRole(&controllerRoles, &controllerRoleBindings, rbacv1.ClusterRole{ ObjectMeta: metav1.ObjectMeta{Name: saRolePrefix + "service-controller"}, Rules: []rbacv1.PolicyRule{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 28.9K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy.go
for i := range rolebindings { addDefaultMetadata(&rolebindings[i]) } return } // NodeRules returns node policy rules, it is slice of rbacv1.PolicyRule. func NodeRules() []rbacv1.PolicyRule { nodePolicyRules := []rbacv1.PolicyRule{ // Needed to check API access. These creates are non-mutating rbacv1helpers.NewRule("create").Groups(authenticationGroup).Resources("tokenreviews").RuleOrDie(),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 08 19:25:10 UTC 2024 - 34.4K bytes - Viewed (0) -
pkg/controller/clusterroleaggregation/clusterroleaggregation_controller.go
} func toApplyPolicyRules(rules []rbacv1.PolicyRule) []*rbacv1ac.PolicyRuleApplyConfiguration { var result []*rbacv1ac.PolicyRuleApplyConfiguration for _, rule := range rules { result = append(result, toApplyPolicyRule(rule)) } return result } func toApplyPolicyRule(rule rbacv1.PolicyRule) *rbacv1ac.PolicyRuleApplyConfiguration { result := rbacv1ac.PolicyRule() result.Resources = rule.Resources
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/util/flowcontrol/match_test.go
if !matchesPolicyRule(digest, &policyRule) { t.Errorf("Fail: expected %s to match %#+v but it did not", fcfmt.Fmt(policyRule), digest) } } for _, digest := range append(skippingRDigests, skippingNDigests...) { if matchesPolicyRule(digest, &policyRule) { t.Errorf("Fail: expected %s to not match %#+v but it did", fcfmt.Fmt(policyRule), digest) } } }) } }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Oct 30 12:18:35 UTC 2023 - 13.3K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/generated.pb.go
var xxx_messageInfo_ClusterRoleList proto.InternalMessageInfo func (m *PolicyRule) Reset() { *m = PolicyRule{} } func (*PolicyRule) ProtoMessage() {} func (*PolicyRule) Descriptor() ([]byte, []int) { return fileDescriptor_c8ba2e7dd472de66, []int{5} } func (m *PolicyRule) XXX_Unmarshal(b []byte) error { return m.Unmarshal(b) } func (m *PolicyRule) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { b = b[:cap(b)]
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 06:06:37 UTC 2024 - 77.5K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/generated.proto
// Items is a list of ClusterRoles repeated ClusterRole items = 2; } // PolicyRule holds information that describes a policy rule, but does not contain information // about who the rule applies to or which namespace the rule applies to. message PolicyRule { // Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs. // +listType=atomic
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 15:34:11 UTC 2024 - 7.9K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1/generated.proto
// Items is a list of ClusterRoles repeated ClusterRole items = 2; } // PolicyRule holds information that describes a policy rule, but does not contain information // about who the rule applies to or which namespace the rule applies to. message PolicyRule { // Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 7.6K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1beta1/generated.pb.go
var xxx_messageInfo_ClusterRoleList proto.InternalMessageInfo func (m *PolicyRule) Reset() { *m = PolicyRule{} } func (*PolicyRule) ProtoMessage() {} func (*PolicyRule) Descriptor() ([]byte, []int) { return fileDescriptor_c5bc2d145acd4e45, []int{5} } func (m *PolicyRule) XXX_Unmarshal(b []byte) error { return m.Unmarshal(b) } func (m *PolicyRule) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { b = b[:cap(b)]
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 06:06:37 UTC 2024 - 77.6K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1alpha1/generated.pb.go
var xxx_messageInfo_ClusterRoleList proto.InternalMessageInfo func (m *PolicyRule) Reset() { *m = PolicyRule{} } func (*PolicyRule) ProtoMessage() {} func (*PolicyRule) Descriptor() ([]byte, []int) { return fileDescriptor_758889dfd9a88fa6, []int{5} } func (m *PolicyRule) XXX_Unmarshal(b []byte) error { return m.Unmarshal(b) } func (m *PolicyRule) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { b = b[:cap(b)]
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 06:06:37 UTC 2024 - 77.7K bytes - Viewed (0)