io.fabric8.kubernetes.api.model.rbac.RoleBinding Java Examples
The following examples show how to use
io.fabric8.kubernetes.api.model.rbac.RoleBinding.
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example. You may check out the related API usage on the sidebar.
Example #1
Source File: KubernetesWorkspaceServiceAccount.java From che with Eclipse Public License 2.0 | 7 votes |
private RoleBinding createExecRoleBinding() { return new RoleBindingBuilder() .withNewMetadata() .withName(serviceAccountName + "-exec") .withNamespace(namespace) .endMetadata() .withNewRoleRef() .withKind("Role") .withName("exec") .endRoleRef() .withSubjects( new SubjectBuilder() .withKind("ServiceAccount") .withName(serviceAccountName) .withNamespace(namespace) .build()) .build(); }
Example #2
Source File: RoleBindingIT.java From kubernetes-client with Apache License 2.0 | 6 votes |
@Test public void load() { RoleBinding aRoleBinding = client.rbac().roleBindings().inNamespace(currentNamespace) .load(getClass().getResourceAsStream("/test-kubernetesrolebinding.yml")).get(); assertNotNull(aRoleBinding); assertEquals("RoleBinding", aRoleBinding.getKind()); assertNotNull(aRoleBinding.getMetadata()); assertEquals("read-jobs", aRoleBinding.getMetadata().getName()); assertNotNull(aRoleBinding.getSubjects()); assertEquals(1, aRoleBinding.getSubjects().size()); assertEquals("rbac.authorization.k8s.io", aRoleBinding.getSubjects().get(0).getApiGroup()); assertEquals("User", aRoleBinding.getSubjects().get(0).getKind()); assertEquals("jane", aRoleBinding.getSubjects().get(0).getName()); assertEquals("default", aRoleBinding.getSubjects().get(0).getNamespace()); assertNotNull(aRoleBinding.getRoleRef()); assertEquals("Role", aRoleBinding.getRoleRef().getKind()); assertEquals("job-reader", aRoleBinding.getRoleRef().getName()); assertEquals("rbac.authorization.k8s.io", aRoleBinding.getRoleRef().getApiGroup()); }
Example #3
Source File: EntityUserOperator.java From strimzi-kafka-operator with Apache License 2.0 | 6 votes |
public RoleBinding generateRoleBinding(String namespace, String watchedNamespace) { Subject ks = new SubjectBuilder() .withKind("ServiceAccount") .withName(EntityOperator.entityOperatorServiceAccountName(cluster)) .withNamespace(namespace) .build(); RoleRef roleRef = new RoleRefBuilder() .withName(EntityOperator.EO_CLUSTER_ROLE_NAME) .withApiGroup("rbac.authorization.k8s.io") .withKind("ClusterRole") .build(); RoleBinding rb = new RoleBindingBuilder() .withNewMetadata() .withName(roleBindingName(cluster)) .withNamespace(watchedNamespace) .withOwnerReferences(createOwnerReference()) .withLabels(labels.toMap()) .endMetadata() .withRoleRef(roleRef) .withSubjects(singletonList(ks)) .build(); return rb; }
Example #4
Source File: EntityTopicOperator.java From strimzi-kafka-operator with Apache License 2.0 | 6 votes |
public RoleBinding generateRoleBinding(String namespace, String watchedNamespace) { Subject ks = new SubjectBuilder() .withKind("ServiceAccount") .withName(EntityOperator.entityOperatorServiceAccountName(cluster)) .withNamespace(namespace) .build(); RoleRef roleRef = new RoleRefBuilder() .withName(EntityOperator.EO_CLUSTER_ROLE_NAME) .withApiGroup("rbac.authorization.k8s.io") .withKind("ClusterRole") .build(); RoleBinding rb = new RoleBindingBuilder() .withNewMetadata() .withName(roleBindingName(cluster)) .withNamespace(watchedNamespace) .withOwnerReferences(createOwnerReference()) .withLabels(labels.toMap()) .endMetadata() .withRoleRef(roleRef) .withSubjects(singletonList(ks)) .build(); return rb; }
Example #5
Source File: KubernetesWorkspaceServiceAccount.java From che with Eclipse Public License 2.0 | 6 votes |
private RoleBinding createCustomRoleBinding(String clusterRoleName) { return new RoleBindingBuilder() .withNewMetadata() .withName(serviceAccountName + "-custom") .withNamespace(namespace) .endMetadata() .withNewRoleRef() .withKind("ClusterRole") .withName(clusterRoleName) .endRoleRef() .withSubjects( new SubjectBuilder() .withKind("ServiceAccount") .withName(serviceAccountName) .withNamespace(namespace) .build()) .build(); }
Example #6
Source File: KubernetesWorkspaceServiceAccount.java From che with Eclipse Public License 2.0 | 6 votes |
private RoleBinding createViewRoleBinding() { return new RoleBindingBuilder() .withNewMetadata() .withName(serviceAccountName + "-view") .withNamespace(namespace) .endMetadata() .withNewRoleRef() .withKind("Role") .withName("workspace-view") .endRoleRef() .withSubjects( new SubjectBuilder() .withKind("ServiceAccount") .withName(serviceAccountName) .withNamespace(namespace) .build()) .build(); }
Example #7
Source File: ExamplesTest.java From strimzi-kafka-operator with Apache License 2.0 | 6 votes |
/** * Recursively search an object tree checking for POJOs annotated with @JsonAnyGetter. * These are likely erroneous YAML. */ private void recurseForAdditionalProperties(Stack<String> path, Object resource) { try { Class<?> cls = resource.getClass(); if (RoleBinding.class.equals(cls) || ClusterRoleBinding.class.equals(cls)) { // XXX: hack because fabric8 RoleBinding reflect the openshift role binding API // not the k8s one, and has an unexpected apiGroup property return; } for (Method method : cls.getMethods()) { checkForJsonAnyGetter(path, resource, cls, method); } } catch (ReflectiveOperationException e) { throw new RuntimeException(e); } }
Example #8
Source File: RoleBindingOperatorIT.java From strimzi-kafka-operator with Apache License 2.0 | 6 votes |
@Override protected RoleBinding getOriginal() { Subject ks = new SubjectBuilder() .withKind("ServiceAccount") .withName("my-service-account") .withNamespace("my-namespace") .build(); RoleRef roleRef = new RoleRefBuilder() .withName("my-cluster-role") .withApiGroup("rbac.authorization.k8s.io") .withKind("ClusterRole") .build(); return new RoleBindingBuilder() .withNewMetadata() .withName(RESOURCE_NAME) .withNamespace(namespace) .withLabels(singletonMap("state", "new")) .endMetadata() .withSubjects(ks) .withRoleRef(roleRef) .build(); }
Example #9
Source File: RoleBindingOperatorIT.java From strimzi-kafka-operator with Apache License 2.0 | 6 votes |
@Override protected RoleBinding getModified() { Subject ks = new SubjectBuilder() .withKind("ServiceAccount") .withName("my-service-account2") .withNamespace("my-namespace2") .build(); // RoleRef cannot be changed RoleRef roleRef = new RoleRefBuilder() .withName("my-cluster-role") .withApiGroup("rbac.authorization.k8s.io") .withKind("ClusterRole") .build(); return new RoleBindingBuilder() .withNewMetadata() .withName(RESOURCE_NAME) .withNamespace(namespace) .withLabels(singletonMap("state", "modified")) .endMetadata() .withSubjects(ks) .withRoleRef(roleRef) .build(); }
Example #10
Source File: RoleBindingOperatorTest.java From strimzi-kafka-operator with Apache License 2.0 | 6 votes |
@Override protected RoleBinding resource() { Subject ks = new SubjectBuilder() .withKind("ServiceAccount") .withName("some-service-account") .withNamespace(NAMESPACE) .build(); RoleRef roleRef = new RoleRefBuilder() .withName("some-role") .withApiGroup("rbac.authorization.k8s.io") .withKind("ClusterRole") .build(); return new RoleBindingBuilder() .withNewMetadata() .withName(RESOURCE_NAME) .withNamespace(NAMESPACE) .withLabels(singletonMap("foo", "bar")) .endMetadata() .withRoleRef(roleRef) .withSubjects(singletonList(ks)) .build(); }
Example #11
Source File: RoleBindingIT.java From kubernetes-client with Apache License 2.0 | 5 votes |
@Test public void delete() { Integer initialCountBeforeDeletion = client.rbac().roleBindings().inNamespace(currentNamespace).list().getItems().size(); boolean deleted = client.rbac().roleBindings().inNamespace(currentNamespace).withName("read-jobs").delete(); assertTrue(deleted); DeleteEntity<RoleBinding> deleteEntity = new DeleteEntity<>(RoleBinding.class, client, "read-jobs", currentNamespace); await().atMost(30, TimeUnit.SECONDS).until(deleteEntity); RoleBindingList roleBindingList = client.rbac().roleBindings().inNamespace(currentNamespace).list(); assertEquals(initialCountBeforeDeletion - 1,roleBindingList.getItems().size()); }
Example #12
Source File: RoleBindingTest.java From kubernetes-client with Apache License 2.0 | 5 votes |
@Test public void kubernetesRoleBuilderTest() throws Exception { // given final String originalJson = Helper.loadJson("/valid-roleBinding.json"); // when RoleBinding kubernetesRoleBinding = new RoleBindingBuilder() .withNewMetadata() .withName("read-jobs") .withNamespace("default") .endMetadata() .addToSubjects(0, new SubjectBuilder() .withApiGroup("rbac.authorization.k8s.io") .withKind("User") .withName("jane") .withNamespace("default") .build() ) .withRoleRef(new RoleRefBuilder() .withApiGroup("rbac.authorization.k8s.io") .withKind("Role") .withName("job-reader") .build() ) .build(); final String serializedJson = mapper.writeValueAsString(kubernetesRoleBinding); // then assertThatJson(serializedJson).when(IGNORING_ARRAY_ORDER, TREATING_NULL_AS_ABSENT, IGNORING_EXTRA_FIELDS) .isEqualTo(originalJson); }
Example #13
Source File: RoleBindingTest.java From kubernetes-client with Apache License 2.0 | 5 votes |
@Test public void kubernetesRoleBindingTest() throws Exception { // given final String originalJson = Helper.loadJson("/valid-roleBinding.json"); // when final RoleBinding kubernetesRoleBinding = mapper.readValue(originalJson, RoleBinding.class); final String serializedJson = mapper.writeValueAsString(kubernetesRoleBinding); // then assertThatJson(serializedJson).when(IGNORING_ARRAY_ORDER, TREATING_NULL_AS_ABSENT, IGNORING_EXTRA_FIELDS) .isEqualTo(originalJson); }
Example #14
Source File: RoleBindingOperatorIT.java From strimzi-kafka-operator with Apache License 2.0 | 5 votes |
@Override protected void assertResources(VertxTestContext context, RoleBinding expected, RoleBinding actual) { context.verify(() -> assertThat(actual.getMetadata().getName(), is(expected.getMetadata().getName()))); context.verify(() -> assertThat(actual.getMetadata().getNamespace(), is(expected.getMetadata().getNamespace()))); context.verify(() -> assertThat(actual.getMetadata().getLabels(), is(expected.getMetadata().getLabels()))); context.verify(() -> assertThat(actual.getSubjects().size(), is(expected.getSubjects().size()))); context.verify(() -> assertThat(actual.getSubjects().get(0).getKind(), is(expected.getSubjects().get(0).getKind()))); context.verify(() -> assertThat(actual.getSubjects().get(0).getNamespace(), is(expected.getSubjects().get(0).getNamespace()))); context.verify(() -> assertThat(actual.getSubjects().get(0).getName(), is(expected.getSubjects().get(0).getName()))); context.verify(() -> assertThat(actual.getRoleRef().getKind(), is(expected.getRoleRef().getKind()))); context.verify(() -> assertThat(actual.getRoleRef().getApiGroup(), is(expected.getRoleRef().getApiGroup()))); context.verify(() -> assertThat(actual.getRoleRef().getName(), is(expected.getRoleRef().getName()))); }
Example #15
Source File: ApplyService.java From jkube with Eclipse Public License 2.0 | 5 votes |
public void applyRoleBinding(RoleBinding entity, String sourceName) { String id = getName(entity); Objects.requireNonNull(id, "No name for " + entity + " " + sourceName); String namespace = KubernetesHelper.getNamespace(entity); if (StringUtils.isBlank(namespace)) { namespace = getNamespace(); } applyNamespace(namespace); RoleBinding old = kubernetesClient.rbac().roleBindings().inNamespace(namespace).withName(id).get(); if (isRunning(old)) { if (UserConfigurationCompare.configEqual(entity, old)) { log.info("RoleBinding has not changed so not doing anything"); } else { if (isRecreateMode()) { log.info("Deleting RoleBinding: " + id); kubernetesClient.rbac().roleBindings().inNamespace(namespace).withName(id).delete(); doCreateRoleBinding(entity, namespace, sourceName); } else { log.info("Updating RoleBinding from " + sourceName); try { String resourceVersion = KubernetesHelper.getResourceVersion(old); ObjectMeta metadata = getOrCreateMetadata(entity); metadata.setNamespace(namespace); metadata.setResourceVersion(resourceVersion); Object answer = kubernetesClient.rbac().roleBindings().inNamespace(namespace).withName(id).replace(entity); logGeneratedEntity("Updated RoleBinding: ", namespace, entity, answer); } catch (Exception e) { onApplyError("Failed to update RoleBinding from " + sourceName + ". " + e + ". " + entity, e); } } } } else { if (!isAllowCreate()) { log.warn("Creation disabled so not creating RoleBinding from " + sourceName + " namespace " + namespace + " name " + getName(entity)); } else { doCreateRoleBinding(entity, namespace, sourceName); } } }
Example #16
Source File: ApplyService.java From jkube with Eclipse Public License 2.0 | 5 votes |
public void doCreateRoleBinding(RoleBinding entity, String namespace , String sourceName) { try { log.info("Creating RoleBinding from " + sourceName + " namespace " + namespace + " name " + getName(entity)); kubernetesClient.rbac().roleBindings().inNamespace(namespace).create(entity); } catch (Exception e) { onApplyError("Failed to create RoleBinding from " + sourceName + ". " + e, e); } }
Example #17
Source File: KafkaAssemblyOperator.java From strimzi-kafka-operator with Apache License 2.0 | 5 votes |
Future<ReconciliationState> entityOperatorUserOpRoleBinding() { if (eoDeployment != null && entityOperator.getUserOperator() != null) { Future<ReconcileResult<RoleBinding>> ownNamespaceFuture; Future<ReconcileResult<RoleBinding>> watchedNamespaceFuture; String watchedNamespace = namespace; if (entityOperator.getUserOperator().getWatchedNamespace() != null && !entityOperator.getUserOperator().getWatchedNamespace().isEmpty()) { watchedNamespace = entityOperator.getUserOperator().getWatchedNamespace(); } if (!namespace.equals(watchedNamespace)) { watchedNamespaceFuture = roleBindingOperations.reconcile(watchedNamespace, EntityUserOperator.roleBindingName(name), entityOperator.getUserOperator().generateRoleBinding(namespace, watchedNamespace)); } else { watchedNamespaceFuture = Future.succeededFuture(); } // Create role binding for the the UI runs in (it needs to access the CA etc.) ownNamespaceFuture = roleBindingOperations.reconcile(namespace, EntityUserOperator.roleBindingName(name), entityOperator.getUserOperator().generateRoleBinding(namespace, namespace)); return withVoid(CompositeFuture.join(ownNamespaceFuture, watchedNamespaceFuture)); } else { return withVoid(roleBindingOperations.reconcile(namespace, EntityUserOperator.roleBindingName(name), null)); } }
Example #18
Source File: EntityTopicOperatorTest.java From strimzi-kafka-operator with Apache License 2.0 | 5 votes |
@Test public void testRoleBinding() { RoleBinding binding = entityTopicOperator.generateRoleBinding(namespace, toWatchedNamespace); assertThat(binding.getSubjects().get(0).getNamespace(), is(namespace)); assertThat(binding.getMetadata().getNamespace(), is(toWatchedNamespace)); }
Example #19
Source File: EntityUserOperatorTest.java From strimzi-kafka-operator with Apache License 2.0 | 5 votes |
@Test public void testRoleBinding() { RoleBinding binding = entityUserOperator.generateRoleBinding(namespace, uoWatchedNamespace); assertThat(binding.getSubjects().get(0).getNamespace(), is(namespace)); assertThat(binding.getMetadata().getNamespace(), is(uoWatchedNamespace)); }
Example #20
Source File: ApplyService.java From jkube with Eclipse Public License 2.0 | 4 votes |
/** * Applies the given DTOs onto the Kubernetes master */ private void applyEntity(Object dto, String sourceName) throws Exception { if (dto instanceof Pod) { applyPod((Pod) dto, sourceName); } else if (dto instanceof ReplicationController) { applyReplicationController((ReplicationController) dto, sourceName); } else if (dto instanceof Service) { applyService((Service) dto, sourceName); } else if (dto instanceof Route) { applyRoute((Route) dto, sourceName); } else if (dto instanceof BuildConfig) { applyBuildConfig((BuildConfig) dto, sourceName); } else if (dto instanceof DeploymentConfig) { DeploymentConfig resource = (DeploymentConfig) dto; OpenShiftClient openShiftClient = getOpenShiftClient(); if (openShiftClient != null) { applyResource(resource, sourceName, openShiftClient.deploymentConfigs()); } else { log.warn("Not connected to OpenShift cluster so cannot apply entity " + dto); } } else if (dto instanceof RoleBinding) { applyRoleBinding((RoleBinding) dto, sourceName); } else if (dto instanceof Role) { applyResource((Role)dto, sourceName, kubernetesClient.rbac().roles()); } else if (dto instanceof ImageStream) { applyImageStream((ImageStream) dto, sourceName); } else if (dto instanceof OAuthClient) { applyOAuthClient((OAuthClient) dto, sourceName); } else if (dto instanceof Template) { applyTemplate((Template) dto, sourceName); } else if (dto instanceof ServiceAccount) { applyServiceAccount((ServiceAccount) dto, sourceName); } else if (dto instanceof Secret) { applySecret((Secret) dto, sourceName); } else if (dto instanceof ConfigMap) { applyResource((ConfigMap) dto, sourceName, kubernetesClient.configMaps()); } else if (dto instanceof DaemonSet) { applyResource((DaemonSet) dto, sourceName, kubernetesClient.apps().daemonSets()); } else if (dto instanceof Deployment) { applyResource((Deployment) dto, sourceName, kubernetesClient.apps().deployments()); } else if (dto instanceof ReplicaSet) { applyResource((ReplicaSet) dto, sourceName, kubernetesClient.apps().replicaSets()); } else if (dto instanceof StatefulSet) { applyResource((StatefulSet) dto, sourceName, kubernetesClient.apps().statefulSets()); } else if (dto instanceof Ingress) { applyResource((Ingress) dto, sourceName, kubernetesClient.extensions().ingresses()); } else if (dto instanceof PersistentVolumeClaim) { applyPersistentVolumeClaim((PersistentVolumeClaim) dto, sourceName); }else if (dto instanceof CustomResourceDefinition) { applyCustomResourceDefinition((CustomResourceDefinition) dto, sourceName); } else if (dto instanceof Job) { applyJob((Job) dto, sourceName); } else if (dto instanceof HasMetadata) { HasMetadata entity = (HasMetadata) dto; try { log.info("Applying " + getKind(entity) + " " + getName(entity) + " from " + sourceName); kubernetesClient.resource(entity).inNamespace(getNamespace()).createOrReplace(); } catch (Exception e) { onApplyError("Failed to create " + getKind(entity) + " from " + sourceName + ". " + e, e); } } else { throw new IllegalArgumentException("Unknown entity type " + dto); } }
Example #21
Source File: UtilsTest.java From kubernetes-client with Apache License 2.0 | 4 votes |
@Test @DisplayName("Should test whether resource is namespaced or not") void testWhetherNamespacedOrNot() { assertTrue(Utils.isResourceNamespaced(Binding.class)); assertFalse(Utils.isResourceNamespaced(ComponentStatus.class)); assertTrue(Utils.isResourceNamespaced(ConfigMap.class)); assertTrue(Utils.isResourceNamespaced(Endpoints.class)); assertTrue(Utils.isResourceNamespaced(Event.class)); assertTrue(Utils.isResourceNamespaced(LimitRange.class)); assertFalse(Utils.isResourceNamespaced(Namespace.class)); assertFalse(Utils.isResourceNamespaced(Node.class)); assertTrue(Utils.isResourceNamespaced(PersistentVolumeClaim.class)); assertFalse(Utils.isResourceNamespaced(PersistentVolume.class)); assertTrue(Utils.isResourceNamespaced(Pod.class)); assertTrue(Utils.isResourceNamespaced(PodTemplate.class)); assertTrue(Utils.isResourceNamespaced(ReplicationController.class)); assertTrue(Utils.isResourceNamespaced(ResourceQuota.class)); assertTrue(Utils.isResourceNamespaced(Secret.class)); assertTrue(Utils.isResourceNamespaced(ServiceAccount.class)); assertTrue(Utils.isResourceNamespaced(Service.class)); assertFalse(Utils.isResourceNamespaced(MutatingWebhookConfiguration.class)); assertFalse(Utils.isResourceNamespaced(ValidatingWebhookConfiguration.class)); assertFalse(Utils.isResourceNamespaced(CustomResourceDefinition.class)); assertTrue(Utils.isResourceNamespaced(ControllerRevision.class)); assertTrue(Utils.isResourceNamespaced(DaemonSet.class)); assertTrue(Utils.isResourceNamespaced(Deployment.class)); assertTrue(Utils.isResourceNamespaced(ReplicaSet.class)); assertTrue(Utils.isResourceNamespaced(StatefulSet.class)); assertTrue(Utils.isResourceNamespaced(TokenReview.class)); assertTrue(Utils.isResourceNamespaced(LocalSubjectAccessReview.class)); assertTrue(Utils.isResourceNamespaced(SelfSubjectAccessReview.class)); assertTrue(Utils.isResourceNamespaced(SelfSubjectRulesReview.class)); assertTrue(Utils.isResourceNamespaced(SubjectAccessReview.class)); assertTrue(Utils.isResourceNamespaced(HorizontalPodAutoscaler.class)); assertTrue(Utils.isResourceNamespaced(CronJob.class)); assertTrue(Utils.isResourceNamespaced(Job.class)); assertTrue(Utils.isResourceNamespaced(CertificateSigningRequest.class)); assertTrue(Utils.isResourceNamespaced(Lease.class)); assertTrue(Utils.isResourceNamespaced(EndpointSlice.class)); assertTrue(Utils.isResourceNamespaced(Ingress.class)); assertTrue(Utils.isResourceNamespaced(NetworkPolicy.class)); assertTrue(Utils.isResourceNamespaced(PodDisruptionBudget.class)); assertFalse(Utils.isResourceNamespaced(PodSecurityPolicy.class)); assertFalse(Utils.isResourceNamespaced(ClusterRoleBinding.class)); assertFalse(Utils.isResourceNamespaced(ClusterRole.class)); assertTrue(Utils.isResourceNamespaced(RoleBinding.class)); assertTrue(Utils.isResourceNamespaced(Role.class)); assertFalse(Utils.isResourceNamespaced(PriorityClass.class)); assertTrue(Utils.isResourceNamespaced(CSIDriver.class)); assertTrue(Utils.isResourceNamespaced(CSINode.class)); assertFalse(Utils.isResourceNamespaced(StorageClass.class)); assertTrue(Utils.isResourceNamespaced(VolumeAttachment.class)); }
Example #22
Source File: UtilsTest.java From kubernetes-client with Apache License 2.0 | 4 votes |
@Test void testGetPluralFromKind() { // Given Map<String, Class> pluralToKubernetesResourceMap = new HashMap<>(); pluralToKubernetesResourceMap.put("bindings", Binding.class); pluralToKubernetesResourceMap.put("componentstatuses", ComponentStatus.class); pluralToKubernetesResourceMap.put("configmaps", ConfigMap.class); pluralToKubernetesResourceMap.put("endpoints", Endpoints.class); pluralToKubernetesResourceMap.put("events", Event.class); pluralToKubernetesResourceMap.put("limitranges", LimitRange.class); pluralToKubernetesResourceMap.put("namespaces", Namespace.class); pluralToKubernetesResourceMap.put("nodes", Node.class); pluralToKubernetesResourceMap.put("persistentvolumeclaims", PersistentVolumeClaim.class); pluralToKubernetesResourceMap.put("persistentvolumes", PersistentVolume.class); pluralToKubernetesResourceMap.put("pods", Pod.class); pluralToKubernetesResourceMap.put("podtemplates", PodTemplate.class); pluralToKubernetesResourceMap.put("replicationcontrollers", ReplicationController.class); pluralToKubernetesResourceMap.put("resourcequotas", ResourceQuota.class); pluralToKubernetesResourceMap.put("secrets", Secret.class); pluralToKubernetesResourceMap.put("serviceaccounts", ServiceAccount.class); pluralToKubernetesResourceMap.put("services", Service.class); pluralToKubernetesResourceMap.put("mutatingwebhookconfigurations", MutatingWebhookConfiguration.class); pluralToKubernetesResourceMap.put("validatingwebhookconfigurations", ValidatingWebhookConfiguration.class); pluralToKubernetesResourceMap.put("customresourcedefinitions", CustomResourceDefinition.class); pluralToKubernetesResourceMap.put("controllerrevisions", ControllerRevision.class); pluralToKubernetesResourceMap.put("daemonsets", DaemonSet.class); pluralToKubernetesResourceMap.put("deployments", Deployment.class); pluralToKubernetesResourceMap.put("replicasets", ReplicaSet.class); pluralToKubernetesResourceMap.put("statefulsets", StatefulSet.class); pluralToKubernetesResourceMap.put("tokenreviews", TokenReview.class); pluralToKubernetesResourceMap.put("localsubjectaccessreviews", LocalSubjectAccessReview.class); pluralToKubernetesResourceMap.put("selfsubjectaccessreviews", SelfSubjectAccessReview.class); pluralToKubernetesResourceMap.put("selfsubjectrulesreviews", SelfSubjectRulesReview.class); pluralToKubernetesResourceMap.put("subjectaccessreviews", SubjectAccessReview.class); pluralToKubernetesResourceMap.put("horizontalpodautoscalers", HorizontalPodAutoscaler.class); pluralToKubernetesResourceMap.put("cronjobs", CronJob.class); pluralToKubernetesResourceMap.put("jobs", Job.class); pluralToKubernetesResourceMap.put("certificatesigningrequests", CertificateSigningRequest.class); pluralToKubernetesResourceMap.put("leases", Lease.class); pluralToKubernetesResourceMap.put("endpointslices", EndpointSlice.class); pluralToKubernetesResourceMap.put("ingresses", Ingress.class); pluralToKubernetesResourceMap.put("networkpolicies", NetworkPolicy.class); pluralToKubernetesResourceMap.put("poddisruptionbudgets", PodDisruptionBudget.class); pluralToKubernetesResourceMap.put("podsecuritypolicies", PodSecurityPolicy.class); pluralToKubernetesResourceMap.put("clusterrolebindings", ClusterRoleBinding.class); pluralToKubernetesResourceMap.put("clusterroles", ClusterRole.class); pluralToKubernetesResourceMap.put("rolebindings", RoleBinding.class); pluralToKubernetesResourceMap.put("roles", Role.class); pluralToKubernetesResourceMap.put("priorityclasses", PriorityClass.class); pluralToKubernetesResourceMap.put("csidrivers", CSIDriver.class); pluralToKubernetesResourceMap.put("csinodes", CSINode.class); pluralToKubernetesResourceMap.put("storageclasses", StorageClass.class); pluralToKubernetesResourceMap.put("volumeattachments", VolumeAttachment.class); // When & Then pluralToKubernetesResourceMap.forEach((plural, kubernetesResource) -> assertEquals(plural, Utils.getPluralFromKind(kubernetesResource.getSimpleName()))); }
Example #23
Source File: RoleBindingOperator.java From strimzi-kafka-operator with Apache License 2.0 | 4 votes |
@Override protected MixedOperation<RoleBinding, RoleBindingList, DoneableRoleBinding, Resource<RoleBinding, DoneableRoleBinding>> operation() { return client.rbac().roleBindings(); }
Example #24
Source File: KubernetesResource.java From strimzi-kafka-operator with Apache License 2.0 | 4 votes |
private static RoleBinding deleteLater(RoleBinding resource) { return ResourceManager.deleteLater(ResourceManager.kubeClient().getClient().rbac().roleBindings(), resource); }
Example #25
Source File: KubernetesResource.java From strimzi-kafka-operator with Apache License 2.0 | 4 votes |
private static RoleBinding getRoleBindingFromYaml(String yamlPath) { return TestUtils.configFromYaml(yamlPath, RoleBinding.class); }
Example #26
Source File: KubeClient.java From strimzi-kafka-operator with Apache License 2.0 | 4 votes |
public List<RoleBinding> listRoleBindings() { return client.rbac().roleBindings().list().getItems(); }
Example #27
Source File: KubeClient.java From strimzi-kafka-operator with Apache License 2.0 | 4 votes |
public RoleBinding createOrReplaceRoleBinding(RoleBinding roleBinding) { return client.rbac().roleBindings().inNamespace(getNamespace()).createOrReplace(roleBinding); }
Example #28
Source File: RoleBindingOperatorIT.java From strimzi-kafka-operator with Apache License 2.0 | 4 votes |
@Override protected AbstractResourceOperator<KubernetesClient, RoleBinding, RoleBindingList, DoneableRoleBinding, Resource<RoleBinding, DoneableRoleBinding>> operator() { return new RoleBindingOperator(vertx, client); }
Example #29
Source File: RoleBindingOperatorTest.java From strimzi-kafka-operator with Apache License 2.0 | 4 votes |
@Override protected AbstractResourceOperator<KubernetesClient, RoleBinding, RoleBindingList, DoneableRoleBinding, Resource<RoleBinding, DoneableRoleBinding>> createResourceOperations(Vertx vertx, KubernetesClient mockClient) { return new RoleBindingOperator(vertx, mockClient); }
Example #30
Source File: RbacAPIGroupDSL.java From kubernetes-client with Apache License 2.0 | votes |
MixedOperation<RoleBinding, RoleBindingList, DoneableRoleBinding, Resource<RoleBinding, DoneableRoleBinding>> roleBindings();