// Describe returns the description of a policyBinding func (d *ClusterPolicyBindingDescriber) Describe(namespace, name string) (string, error) { c := d.ClusterPolicyBindings() policyBinding, err := c.Get(name) if err != nil { return "", err } return DescribePolicyBinding(authorizationapi.ToPolicyBinding(policyBinding)) }
func (a ClusterRoleBindingAccessor) GetExistingRoleBindingsForRole(roleNamespace, role string) ([]*authorizationapi.RoleBinding, error) { uncast, err := a.Client.ClusterPolicyBindings().Get(authorizationapi.GetPolicyBindingName(roleNamespace)) if err != nil && !kapierrors.IsNotFound(err) { return nil, err } existingBindings := authorizationapi.ToPolicyBinding(uncast) ret := make([]*authorizationapi.RoleBinding, 0) // see if we can find an existing binding that points to the role in question. for _, currBinding := range existingBindings.RoleBindings { if currBinding.RoleRef.Name == role { t := currBinding ret = append(ret, t) } } return ret, nil }
func (s *simulatedStorage) GetPolicyBinding(ctx kapi.Context, name string) (*authorizationapi.PolicyBinding, error) { ret, err := s.clusterRegistry.GetClusterPolicyBinding(ctx, name) return authorizationapi.ToPolicyBinding(ret), err }
func printClusterPolicyBinding(policyBinding *authorizationapi.ClusterPolicyBinding, w io.Writer, withNamespace bool) error { return printPolicyBinding(authorizationapi.ToPolicyBinding(policyBinding), w, withNamespace) }
func ValidateClusterPolicyBindingUpdate(policy *authorizationapi.ClusterPolicyBinding, oldPolicyBinding *authorizationapi.ClusterPolicyBinding) fielderrors.ValidationErrorList { return ValidatePolicyBindingUpdate(authorizationapi.ToPolicyBinding(policy), authorizationapi.ToPolicyBinding(oldPolicyBinding), false) }