- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 144 for Authorize (0.12 sec)
-
staging/src/k8s.io/apiserver/pkg/authorization/authorizerfactory/builtin_test.go
if authorized, _, _ := auth.Authorize(context.Background(), yes); authorized != authorizer.DecisionAllow { t.Errorf("failed") } if authorized, _, _ := auth.Authorize(context.Background(), no); authorized == authorizer.DecisionAllow { t.Errorf("failed") }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 1.8K bytes - Viewed (0) -
pkg/registry/admissionregistration/validatingadmissionpolicy/authz.go
// identical paramKind to old object return nil } return v.authorize(ctx, policy) } func (v *validatingAdmissionPolicyStrategy) authorize(ctx context.Context, policy *admissionregistration.ValidatingAdmissionPolicy) error { if v.authorizer == nil || policy.Spec.ParamKind == nil { return nil } // for superuser, skip all checks
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 07 21:29:56 UTC 2022 - 3.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authorization/union/union_test.go
cs := []struct { authorizers []authorizer.Authorizer decision authorizer.Decision }{ { authorizers: []authorizer.Authorizer{}, decision: authorizer.DecisionNoOpinion, }, { authorizers: []authorizer.Authorizer{ &mockAuthzHandler{decision: authorizer.DecisionNoOpinion}, &mockAuthzHandler{decision: authorizer.DecisionAllow},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 7.7K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authorization/metrics/metrics_test.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Feb 16 13:20:59 UTC 2024 - 3.3K bytes - Viewed (0) -
pkg/kubeapiserver/authorizer/modes/modes.go
const ( // ModeAlwaysAllow is the mode to set all requests as authorized ModeAlwaysAllow string = "AlwaysAllow" // ModeAlwaysDeny is the mode to set no requests as authorized ModeAlwaysDeny string = "AlwaysDeny" // ModeABAC is the mode to use Attribute Based Access Control to authorize ModeABAC string = "ABAC" // ModeWebhook is the mode to make an external webhook call to authorize ModeWebhook string = "Webhook"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 05 01:22:41 UTC 2018 - 1.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/policy/validating/caching_authorizer.go
"k8s.io/apiserver/pkg/authorization/authorizer" ) type authzResult struct { authorized authorizer.Decision reason string err error } type cachingAuthorizer struct { authorizer authorizer.Authorizer decisions map[string]authzResult } func newCachingAuthorizer(in authorizer.Authorizer) authorizer.Authorizer { return &cachingAuthorizer{ authorizer: in,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Feb 12 18:58:24 UTC 2024 - 3.6K bytes - Viewed (0) -
pkg/registry/admissionregistration/validatingadmissionpolicybinding/authz.go
// identical paramRef and policy to old object return nil } return v.authorize(ctx, binding) } func (v *validatingAdmissionPolicyBindingStrategy) authorize(ctx context.Context, binding *admissionregistration.ValidatingAdmissionPolicyBinding) error { if v.authorizer == nil || v.resourceResolver == nil || binding.Spec.ParamRef == nil { return nil } // for superuser, skip all checks
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 12:19:03 UTC 2024 - 3.7K bytes - Viewed (0) -
plugin/pkg/admission/certificates/util.go
func IsAuthorizedForSignerName(ctx context.Context, authz authorizer.Authorizer, info user.Info, verb, signerName string) bool { // First check if the user has explicit permission to 'verb' for the given signerName. attr := buildAttributes(info, verb, signerName) decision, reason, err := authz.Authorize(ctx, attr) switch { case err != nil: klog.V(3).Infof("cannot authorize %q %q for policy: %v,%v", verb, attr.GetName(), reason, err)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 16 11:54:27 UTC 2020 - 2.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authorization/path/path_test.go
for _, cases := range []struct { paths []string want authorizer.Decision }{ {tt.allowed, authorizer.DecisionAllow}, {tt.denied, authorizer.DecisionDeny}, {tt.noOpinion, authorizer.DecisionNoOpinion}, } { for _, pth := range cases.paths { info := authorizer.AttributesRecord{ Path: pth, } if got, _, err := a.Authorize(context.Background(), info); err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 2.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authorization/authorizerfactory/builtin.go
"k8s.io/apiserver/pkg/authorization/authorizer" ) // alwaysAllowAuthorizer is an implementation of authorizer.Attributes // which always says yes to an authorization request. // It is useful in tests and when using kubernetes in an open manner. type alwaysAllowAuthorizer struct{} func (alwaysAllowAuthorizer) Authorize(ctx context.Context, a authorizer.Attributes) (authorized authorizer.Decision, reason string, err error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 3.2K bytes - Viewed (0)