- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 167 for authorizes (0.19 sec)
-
staging/src/k8s.io/apiserver/pkg/authorization/union/union.go
"k8s.io/apiserver/pkg/authorization/authorizer" ) // unionAuthzHandler authorizer against a chain of authorizer.Authorizer type unionAuthzHandler []authorizer.Authorizer // New returns an authorizer that authorizes against a chain of authorizer.Authorizer objects func New(authorizationHandlers ...authorizer.Authorizer) authorizer.Authorizer { return unionAuthzHandler(authorizationHandlers) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Jun 28 20:27:28 UTC 2020 - 3.9K bytes - Viewed (0) -
pkg/kubeapiserver/authorizer/modes/modes.go
const ( // ModeAlwaysAllow is the mode to set all requests as authorized ModeAlwaysAllow string = "AlwaysAllow" // ModeAlwaysDeny is the mode to set no requests as authorized ModeAlwaysDeny string = "AlwaysDeny" // ModeABAC is the mode to use Attribute Based Access Control to authorize ModeABAC string = "ABAC" // ModeWebhook is the mode to make an external webhook call to authorize ModeWebhook string = "Webhook"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 05 01:22:41 UTC 2018 - 1.6K bytes - Viewed (0) -
pkg/auth/authorizer/abac/abac.go
return true } } } } return false } // Authorize implements authorizer.Authorize func (pl PolicyList) Authorize(ctx context.Context, a authorizer.Attributes) (authorizer.Decision, string, error) { for _, p := range pl { if matches(*p, a) { return authorizer.DecisionAllow, "", nil } } return authorizer.DecisionNoOpinion, "No policy matched.", nil
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Oct 11 03:11:30 UTC 2021 - 7.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authorization/union/union_test.go
cs := []struct { authorizers []authorizer.Authorizer decision authorizer.Decision }{ { authorizers: []authorizer.Authorizer{}, decision: authorizer.DecisionNoOpinion, }, { authorizers: []authorizer.Authorizer{ &mockAuthzHandler{decision: authorizer.DecisionNoOpinion}, &mockAuthzHandler{decision: authorizer.DecisionAllow},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 7.7K bytes - Viewed (0) -
pkg/kubeapiserver/authorizer/reload.go
current atomic.Pointer[authorizerResolver] } type authorizerResolver struct { authorizer authorizer.Authorizer ruleResolver authorizer.RuleResolver } func (r *reloadableAuthorizerResolver) Authorize(ctx context.Context, a authorizer.Attributes) (authorized authorizer.Decision, reason string, err error) { return r.current.Load().authorizer.Authorize(ctx, a) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Mar 04 19:01:15 UTC 2024 - 9.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authorization/authorizerfactory/builtin_test.go
if authorized, _, _ := auth.Authorize(context.Background(), yes); authorized != authorizer.DecisionAllow { t.Errorf("failed") } if authorized, _, _ := auth.Authorize(context.Background(), no); authorized == authorizer.DecisionAllow { t.Errorf("failed") }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 1.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/policy/validating/caching_authorizer.go
"k8s.io/apiserver/pkg/authorization/authorizer" ) type authzResult struct { authorized authorizer.Decision reason string err error } type cachingAuthorizer struct { authorizer authorizer.Authorizer decisions map[string]authzResult } func newCachingAuthorizer(in authorizer.Authorizer) authorizer.Authorizer { return &cachingAuthorizer{ authorizer: in,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Feb 12 18:58:24 UTC 2024 - 3.6K bytes - Viewed (0) -
pkg/registry/admissionregistration/validatingadmissionpolicy/authz_test.go
auth: func(ctx context.Context, a authorizer.Attributes) (authorized authorizer.Decision, reason string, err error) { return authorizer.DecisionDeny, "", nil }, }, { name: "authorized", userInfo: &user.DefaultInfo{Groups: []string{user.AllAuthenticated}}, auth: func(ctx context.Context, a authorizer.Attributes) (authorized authorizer.Decision, reason string, err error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 07 21:29:56 UTC 2022 - 3.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/authorization.go
} func (s *DelegatingAuthorizationOptions) toAuthorizer(client kubernetes.Interface) (authorizer.Authorizer, error) { var authorizers []authorizer.Authorizer if len(s.AlwaysAllowGroups) > 0 { authorizers = append(authorizers, authorizerfactory.NewPrivilegedGroups(s.AlwaysAllowGroups...)) } if len(s.AlwaysAllowPaths) > 0 { a, err := path.NewAuthorizer(s.AlwaysAllowPaths) if err != nil { return nil, err }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Dec 18 04:27:38 UTC 2022 - 9.3K bytes - Viewed (0) -
pkg/registry/rbac/escalation_check.go
)) } return decision == authorizer.DecisionAllow } // BindingAuthorized returns true if the user associated with the context is explicitly authorized to bind the specified roleRef func BindingAuthorized(ctx context.Context, roleRef rbac.RoleRef, bindingNamespace string, a authorizer.Authorizer) bool { if a == nil { return false }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 4.3K bytes - Viewed (0)