func (a ClusterRoleBindingAccessor) GetExistingRoleBindingNames() (*util.StringSet, error) { uncast, err := a.Client.ClusterPolicyBindings().List(labels.Everything(), fields.Everything()) if err != nil { return nil, err } policyBindings := authorizationapi.ToPolicyBindingList(uncast) ret := &util.StringSet{} for _, existingBindings := range policyBindings.Items { for _, currBinding := range existingBindings.RoleBindings { ret.Insert(currBinding.Name) } } return ret, nil }
func (a ClusterRoleBindingAccessor) GetExistingRoleBindingNames() (*sets.String, error) { uncast, err := a.Client.ClusterPolicyBindings().List(kapi.ListOptions{}) if err != nil { return nil, err } policyBindings := authorizationapi.ToPolicyBindingList(uncast) ret := &sets.String{} for _, existingBindings := range policyBindings.Items { for _, currBinding := range existingBindings.RoleBindings { ret.Insert(currBinding.Name) } } return ret, nil }
// ListPolicyBindings obtains list of policyBindings that match a selector. It conforms to rulevalidation.BindingLister func (c readOnlyAuthorizationCache) ListPolicyBindings(ctx kapi.Context, label labels.Selector, field fields.Selector) (*authorizationapi.PolicyBindingList, error) { namespace, _ := kapi.NamespaceFrom(ctx) if namespaceRefersToCluster(namespace) { clusterPolicyBindingList, err := c.ReadOnlyClusterPolicyBindings().List(label, field) if err != nil { return &authorizationapi.PolicyBindingList{}, err } return authorizationapi.ToPolicyBindingList(clusterPolicyBindingList), nil } else { policyBindingList, err := c.ReadOnlyPolicyBindings(namespace).List(label, field) if err != nil { return &authorizationapi.PolicyBindingList{}, err } return policyBindingList, nil } }
// ListPolicyBindings obtains list of policyBindings that match a selector. It conforms to rulevalidation.BindingLister func (c readOnlyAuthorizationCache) ListPolicyBindings(ctx kapi.Context, options *unversioned.ListOptions) (*authorizationapi.PolicyBindingList, error) { namespace, _ := kapi.NamespaceFrom(ctx) if namespaceRefersToCluster(namespace) { clusterPolicyBindingList, err := c.ReadOnlyClusterPolicyBindings().List(options) if err != nil { return &authorizationapi.PolicyBindingList{}, err } return authorizationapi.ToPolicyBindingList(clusterPolicyBindingList), nil } else { policyBindingList, err := c.ReadOnlyPolicyBindings(namespace).List(options) if err != nil { return &authorizationapi.PolicyBindingList{}, err } return policyBindingList, nil } }
func printClusterPolicyBindingList(list *authorizationapi.ClusterPolicyBindingList, w io.Writer, opts kctl.PrintOptions) error { return printPolicyBindingList(authorizationapi.ToPolicyBindingList(list), w, opts) }
func (s *simulatedStorage) ListPolicyBindings(ctx kapi.Context, options *kapi.ListOptions) (*authorizationapi.PolicyBindingList, error) { ret, err := s.clusterRegistry.ListClusterPolicyBindings(ctx, options) return authorizationapi.ToPolicyBindingList(ret), err }
func printClusterPolicyBindingList(list *authorizationapi.ClusterPolicyBindingList, w io.Writer, withNamespace, wide bool, columnLabels []string) error { return printPolicyBindingList(authorizationapi.ToPolicyBindingList(list), w, withNamespace, wide, columnLabels) }
func (s *simulatedStorage) ListPolicyBindings(ctx kapi.Context, label labels.Selector, field fields.Selector) (*authorizationapi.PolicyBindingList, error) { ret, err := s.clusterRegistry.ListClusterPolicyBindings(ctx, label, field) return authorizationapi.ToPolicyBindingList(ret), err }
func printClusterPolicyBindingList(list *authorizationapi.ClusterPolicyBindingList, w io.Writer, withNamespace bool) error { return printPolicyBindingList(authorizationapi.ToPolicyBindingList(list), w, withNamespace) }