Documentation ¶
Index ¶
- Variables
- func CheckAuthorization(namespace, email, resource, resourceName string) bool
- func CreateAUPRoleBinding(userCopy *apps_v1alpha.User, userOwnerReferences []metav1.OwnerReference) error
- func CreateAuthorityAdminRole() error
- func CreateAuthorityUserRole() error
- func CreateClusterRoles(authorityCopy *apps_v1alpha.Authority) error
- func CreateSliceRoles() error
- func CreateTeamRoles() error
- func CreateUserAUPRole(userCopy *apps_v1alpha.User, userOwnerReferences []metav1.OwnerReference) error
- func CreateUserSpecificRole(userCopy *apps_v1alpha.User, userOwnerNamespace *corev1.Namespace, ...) error
- func EstablishPrivateRoleBindings(userCopy *apps_v1alpha.User) error
- func EstablishRoleBindings(userCopy *apps_v1alpha.User, namespace string, namespaceType string) error
Constants ¶
This section is empty.
Variables ¶
var Clientset kubernetes.Interface
Clientset to be synced by the custom resources
Functions ¶
func CheckAuthorization ¶
CheckAuthorization returns true if the user is holder of a role
func CreateAUPRoleBinding ¶
func CreateAUPRoleBinding(userCopy *apps_v1alpha.User, userOwnerReferences []metav1.OwnerReference) error
CreateAUPRoleBinding links the AUP up with the user
func CreateAuthorityAdminRole ¶
func CreateAuthorityAdminRole() error
CreateAuthorityAdminRole generates roles for authority admins
func CreateAuthorityUserRole ¶
func CreateAuthorityUserRole() error
CreateAuthorityUserRole generates roles for authority users
func CreateClusterRoles ¶
func CreateClusterRoles(authorityCopy *apps_v1alpha.Authority) error
CreateClusterRoles create or update the cluster role attached to the authority
func CreateSliceRoles ¶
func CreateSliceRoles() error
CreateSliceRoles generated cluster roles for slices
func CreateTeamRoles ¶
func CreateTeamRoles() error
CreateTeamRoles generated cluster roles for teams
func CreateUserAUPRole ¶
func CreateUserAUPRole(userCopy *apps_v1alpha.User, userOwnerReferences []metav1.OwnerReference) error
CreateUserAUPRole generates a dedicated role to allow the user access to accept/reject AUP, even if the AUP is expired
func CreateUserSpecificRole ¶
func CreateUserSpecificRole(userCopy *apps_v1alpha.User, userOwnerNamespace *corev1.Namespace, userOwnerReferences []metav1.OwnerReference) error
CreateUserSpecificRole user-specific roles regarding the resources of authority and users
func EstablishPrivateRoleBindings ¶
func EstablishPrivateRoleBindings(userCopy *apps_v1alpha.User) error
EstablishPrivateRoleBindings generates role bindings to allow users to access their user objects and the authority to which they belong
func EstablishRoleBindings ¶
func EstablishRoleBindings(userCopy *apps_v1alpha.User, namespace string, namespaceType string) error
EstablishRoleBindings generates the rolebindings according to user roles in the namespace specified
Types ¶
This section is empty.