- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 165 for roleRef (0.48 sec)
-
pkg/apis/rbac/validation/validation.go
if roleBinding.RoleRef.APIGroup != rbac.GroupName { allErrs = append(allErrs, field.NotSupported(field.NewPath("roleRef", "apiGroup"), roleBinding.RoleRef.APIGroup, []string{rbac.GroupName})) } switch roleBinding.RoleRef.Kind { case "Role", "ClusterRole": default: allErrs = append(allErrs, field.NotSupported(field.NewPath("roleRef", "kind"), roleBinding.RoleRef.Kind, []string{"Role", "ClusterRole"}))
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Nov 08 01:48:21 UTC 2022 - 10.4K bytes - Viewed (0) -
pkg/apis/rbac/v1alpha1/conversion_test.go
expected *rbacapi.RoleBinding }{ "specific user": { old: &v1alpha1.RoleBinding{ RoleRef: v1alpha1.RoleRef{Name: "foo", APIGroup: v1alpha1.GroupName}, Subjects: []v1alpha1.Subject{{Kind: "User", APIVersion: v1alpha1.SchemeGroupVersion.String(), Name: "bob"}}, }, expected: &rbacapi.RoleBinding{ RoleRef: rbacapi.RoleRef{Name: "foo", APIGroup: v1alpha1.GroupName},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 15:23:55 UTC 2017 - 4K bytes - Viewed (0) -
cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap_test.go
name: "ClusterRoleBindings already exists", client: newMockClusterRoleBinddingClientForTest(t, &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: constants.NodeKubeletBootstrap, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: constants.NodeBootstrapperClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 04:16:31 UTC 2023 - 8.1K bytes - Viewed (0) -
pkg/apis/rbac/validation/validation_test.go
F: "roleRef.kind", }, "reference role": { A: rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{Name: "default"}, RoleRef: rbac.RoleRef{APIGroup: rbac.GroupName, Kind: "Role", Name: "valid"}, }, T: field.ErrorTypeNotSupported, F: "roleRef.kind", }, "zero-length name": { A: rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 02 07:48:42 UTC 2023 - 14.1K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml
metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: cluster-admin roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:masters
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 11 19:01:47 UTC 2020 - 5.7K bytes - Viewed (0) -
pkg/registry/rbac/escalation_check.go
// This occurs after defaulting and conversion, so values pulled from the roleRef won't change // Invalid APIGroup or Name values will fail validation switch roleRef.Kind { case "ClusterRole": attrs.APIGroup = roleRef.APIGroup attrs.APIVersion = "*" attrs.Resource = "clusterroles" attrs.Name = roleRef.Name case "Role": attrs.APIGroup = roleRef.APIGroup attrs.APIVersion = "*" attrs.Resource = "roles"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 4.3K bytes - Viewed (0) -
cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap.go
return apiclient.CreateOrUpdateClusterRoleBinding(client, &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ Name: constants.NodeKubeletBootstrap, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName, Kind: "ClusterRole", Name: constants.NodeBootstrapperClusterRoleName, }, Subjects: []rbac.Subject{ { Kind: rbac.GroupKind,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Oct 15 10:49:52 UTC 2023 - 4.2K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml
annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: null labels: kubernetes.io/bootstrapping: rbac-defaults name: system:controller:attachdetach-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:attachdetach-controller subjects: - kind: ServiceAccount name: attachdetach-controller namespace: kube-system
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 16.9K bytes - Viewed (0) -
pkg/apis/rbac/v1alpha1/defaults.go
return RegisterDefaults(scheme) } func SetDefaults_ClusterRoleBinding(obj *rbacv1alpha1.ClusterRoleBinding) { if len(obj.RoleRef.APIGroup) == 0 { obj.RoleRef.APIGroup = GroupName } } func SetDefaults_RoleBinding(obj *rbacv1alpha1.RoleBinding) { if len(obj.RoleRef.APIGroup) == 0 { obj.RoleRef.APIGroup = GroupName } } func SetDefaults_Subject(obj *rbacv1alpha1.Subject) { if len(obj.APIVersion) == 0 {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jun 22 18:30:51 UTC 2017 - 1.4K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/types.go
Subjects []Subject `json:"subjects,omitempty" protobuf:"bytes,2,rep,name=subjects"` // RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace. // If the RoleRef cannot be resolved, the Authorizer must return an error. // This field is immutable. RoleRef RoleRef `json:"roleRef" protobuf:"bytes,3,opt,name=roleRef"` } // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 23 17:42:49 UTC 2024 - 10.7K bytes - Viewed (0)