 Documentation
      ¶
      Documentation
      ¶
    
    
  
    
  
    Overview ¶
Package certificates provides Registry interface and its RESTStorage implementation for storing ClusterRoleBinding objects.
Index ¶
Constants ¶
This section is empty.
Variables ¶
      View Source
      
  var Strategy = strategy{api.Scheme, names.SimpleNameGenerator}
    strategy is the default logic that applies when creating and updating ClusterRoleBinding objects.
Functions ¶
This section is empty.
Types ¶
type AuthorizerAdapter ¶
type AuthorizerAdapter struct {
	Registry Registry
}
    AuthorizerAdapter adapts the registry to the authorizer interface
func (AuthorizerAdapter) ListClusterRoleBindings ¶
func (a AuthorizerAdapter) ListClusterRoleBindings() ([]*rbac.ClusterRoleBinding, error)
type Registry ¶
type Registry interface {
	ListClusterRoleBindings(ctx genericapirequest.Context, options *metainternalversion.ListOptions) (*rbac.ClusterRoleBindingList, error)
	CreateClusterRoleBinding(ctx genericapirequest.Context, clusterRoleBinding *rbac.ClusterRoleBinding) error
	UpdateClusterRoleBinding(ctx genericapirequest.Context, clusterRoleBinding *rbac.ClusterRoleBinding) error
	GetClusterRoleBinding(ctx genericapirequest.Context, name string, options *metav1.GetOptions) (*rbac.ClusterRoleBinding, error)
	DeleteClusterRoleBinding(ctx genericapirequest.Context, name string) error
	WatchClusterRoleBindings(ctx genericapirequest.Context, options *metainternalversion.ListOptions) (watch.Interface, error)
}
    Registry is an interface for things that know how to store ClusterRoleBindings.
func NewRegistry ¶
func NewRegistry(s rest.StandardStorage) Registry
NewRegistry returns a new Registry interface for the given Storage. Any mismatched types will panic.
       Directories
      ¶
      Directories
      ¶
    
    | Path | Synopsis | 
|---|---|
| Package policybased implements a standard storage for ClusterRoleBinding that prevents privilege escalation. | Package policybased implements a standard storage for ClusterRoleBinding that prevents privilege escalation. | 
 Click to show internal directories. 
   Click to hide internal directories.