Documentation ¶
Index ¶
- Constants
- Variables
- func ObjectBindingSubjectServiceAccountCheck(m *module.Module, object storage.StoreObject, ...) *errors.LintRuleError
- func ObjectRBACPlacement(m *module.Module, object storage.StoreObject) *errors.LintRuleError
- func ObjectRolesWildcard(object storage.StoreObject) *errors.LintRuleError
- func ObjectUserAuthzClusterRolePath(m *module.Module, object storage.StoreObject) *errors.LintRuleError
Constants ¶
View Source
const ( UserAuthzClusterRolePath = "templates/user-authz-cluster-roles.yaml" RootRBACForUsPath = "templates/rbac-for-us.yaml" RootRBACToUsPath = "templates/rbac-to-us.yaml" RBACv2Path = "templates/rbac" )
View Source
const (
ID = "rbac"
)
Variables ¶
View Source
var (
Cfg *config.RbacSettings
)
Functions ¶
func ObjectBindingSubjectServiceAccountCheck ¶
func ObjectBindingSubjectServiceAccountCheck( m *module.Module, object storage.StoreObject, objectStore *storage.UnstructuredObjectStore, ) *errors.LintRuleError
func ObjectRBACPlacement ¶
func ObjectRBACPlacement(m *module.Module, object storage.StoreObject) *errors.LintRuleError
func ObjectRolesWildcard ¶
func ObjectRolesWildcard(object storage.StoreObject) *errors.LintRuleError
ObjectRolesWildcard is a linter for checking the presence of a wildcard in a Role and ClusterRole
func ObjectUserAuthzClusterRolePath ¶
func ObjectUserAuthzClusterRolePath(m *module.Module, object storage.StoreObject) *errors.LintRuleError
ObjectUserAuthzClusterRolePath validates that files for user-authz contains only cluster roles. Also, it validates that role names equals to d8:user-authz:<ChartName>:<AccessLevel>
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.