Documentation ¶
Index ¶
- Constants
- func ObjectBindingSubjectServiceAccountCheck(m utils.Module, object storage.StoreObject, ...) errors.LintRuleError
- func ObjectRBACPlacement(m utils.Module, object storage.StoreObject) errors.LintRuleError
- func ObjectRolesWildcard(object storage.StoreObject) errors.LintRuleError
- func ObjectUserAuthzClusterRolePath(m utils.Module, object storage.StoreObject) errors.LintRuleError
Constants ¶
View Source
const ( UserAuthzClusterRolePath = "templates/user-authz-cluster-roles.yaml" RootRBACForUsPath = "templates/rbac-for-us.yaml" RootRBACToUsPath = "templates/rbac-to-us.yaml" RBACv2Path = "templates/rbac" )
Variables ¶
This section is empty.
Functions ¶
func ObjectBindingSubjectServiceAccountCheck ¶
func ObjectBindingSubjectServiceAccountCheck(m utils.Module, object storage.StoreObject, objectStore *storage.UnstructuredObjectStore) errors.LintRuleError
func ObjectRBACPlacement ¶
func ObjectRBACPlacement(m utils.Module, object storage.StoreObject) errors.LintRuleError
func ObjectRolesWildcard ¶ added in v1.62.0
func ObjectRolesWildcard(object storage.StoreObject) errors.LintRuleError
ObjectRolesWildcard is a linter for checking the presence of a wildcard in a Role and ClusterRole
func ObjectUserAuthzClusterRolePath ¶
func ObjectUserAuthzClusterRolePath(m utils.Module, object storage.StoreObject) errors.LintRuleError
ObjectUserAuthzClusterRolePath validates that files for user-authz contains only cluster roles. Also, it validates that role names equals to d8:user-authz:<ChartName>:<AccessLevel>
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.