func (a ClusterRoleBindingAccessor) GetExistingRoleBindingNames() (*util.StringSet, error) { uncast, err := a.Client.ClusterPolicyBindings().List(labels.Everything(), fields.Everything()) if err != nil { return nil, err } policyBindings := authorizationapi.ToPolicyBindingList(uncast) ret := &util.StringSet{} for _, existingBindings := range policyBindings.Items { for _, currBinding := range existingBindings.RoleBindings { ret.Insert(currBinding.Name) } } return ret, nil }
// ListPolicyBindings obtains list of policyBindings that match a selector. It conforms to rulevalidation.BindingLister func (c readOnlyAuthorizationCache) ListPolicyBindings(ctx kapi.Context, label labels.Selector, field fields.Selector) (*authorizationapi.PolicyBindingList, error) { namespace, _ := kapi.NamespaceFrom(ctx) if namespaceRefersToCluster(namespace) { clusterPolicyBindingList, err := c.ReadOnlyClusterPolicyBindings().List(label, field) if err != nil { return &authorizationapi.PolicyBindingList{}, err } return authorizationapi.ToPolicyBindingList(clusterPolicyBindingList), nil } else { policyBindingList, err := c.ReadOnlyPolicyBindings(namespace).List(label, field) if err != nil { return &authorizationapi.PolicyBindingList{}, err } return policyBindingList, nil } }
func printClusterPolicyBindingList(list *authorizationapi.ClusterPolicyBindingList, w io.Writer, withNamespace bool) error { return printPolicyBindingList(authorizationapi.ToPolicyBindingList(list), w, withNamespace) }
func (s *simulatedStorage) ListPolicyBindings(ctx kapi.Context, label labels.Selector, field fields.Selector) (*authorizationapi.PolicyBindingList, error) { ret, err := s.clusterRegistry.ListClusterPolicyBindings(ctx, label, field) return authorizationapi.ToPolicyBindingList(ret), err }