- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for withAudit (0.1 sec)
-
staging/src/k8s.io/apiserver/pkg/server/config_test.go
func TestAuthenticationAuditAnnotationsDefaultChain(t *testing.T) { authn := authenticator.RequestFunc(func(req *http.Request) (*authenticator.Response, bool, error) { // confirm that we can set an audit annotation in a handler before WithAudit audit.AddAuditAnnotation(req.Context(), "pandas", "are awesome") return &authenticator.Response{User: &user.DefaultInfo{}}, true, nil }) backend := &testBackend{} c := &Config{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 29 18:59:21 UTC 2024 - 13.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/endpoints/handlers/patch.go
scope.err(err, w, req) return } options.TypeMeta.SetGroupVersionKind(metav1.SchemeGroupVersion.WithKind("PatchOptions")) admit = admission.WithAudit(admit) audit.LogRequestPatch(req.Context(), patchBytes) span.AddEvent("Recorded the audit event") baseContentType := runtime.ContentTypeJSON if patchType == types.ApplyPatchType {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 28 08:48:22 UTC 2024 - 28.5K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/config.go
handler = filterlatency.TrackStarted(handler, c.TracerProvider, "impersonation") handler = filterlatency.TrackCompleted(handler) handler = genericapifilters.WithAudit(handler, c.AuditBackend, c.AuditPolicyRuleEvaluator, c.LongRunningFunc) handler = filterlatency.TrackStarted(handler, c.TracerProvider, "audit") failedHandler := genericapifilters.Unauthorized(c.Serializer)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 28 08:48:22 UTC 2024 - 47.7K bytes - Viewed (0)