Documentation ¶
Overview ¶
Package certificates provides Registry interface and its RESTStorage implementation for storing ClusterRole objects.
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var Strategy = strategy{api.Scheme, names.SimpleNameGenerator}
strategy is the default logic that applies when creating and updating ClusterRole objects.
Functions ¶
This section is empty.
Types ¶
type AuthorizerAdapter ¶
type AuthorizerAdapter struct {
Registry Registry
}
AuthorizerAdapter adapts the registry to the authorizer interface
func (AuthorizerAdapter) GetClusterRole ¶
func (a AuthorizerAdapter) GetClusterRole(name string) (*rbac.ClusterRole, error)
type Registry ¶
type Registry interface { ListClusterRoles(ctx genericapirequest.Context, options *metainternalversion.ListOptions) (*rbac.ClusterRoleList, error) CreateClusterRole(ctx genericapirequest.Context, clusterRole *rbac.ClusterRole) error UpdateClusterRole(ctx genericapirequest.Context, clusterRole *rbac.ClusterRole) error GetClusterRole(ctx genericapirequest.Context, name string, options *metav1.GetOptions) (*rbac.ClusterRole, error) DeleteClusterRole(ctx genericapirequest.Context, name string) error WatchClusterRoles(ctx genericapirequest.Context, options *metainternalversion.ListOptions) (watch.Interface, error) }
Registry is an interface for things that know how to store ClusterRoles.
func NewRegistry ¶
func NewRegistry(s rest.StandardStorage) Registry
NewRegistry returns a new Registry interface for the given Storage. Any mismatched types will panic.
Directories ¶
Path | Synopsis |
---|---|
Package policybased implements a standard storage for ClusterRole that prevents privilege escalation.
|
Package policybased implements a standard storage for ClusterRole that prevents privilege escalation. |
Click to show internal directories.
Click to hide internal directories.