Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for withAudit (0.1 sec)

  1. staging/src/k8s.io/apiserver/pkg/server/config_test.go

    func TestAuthenticationAuditAnnotationsDefaultChain(t *testing.T) {
    	authn := authenticator.RequestFunc(func(req *http.Request) (*authenticator.Response, bool, error) {
    		// confirm that we can set an audit annotation in a handler before WithAudit
    		audit.AddAuditAnnotation(req.Context(), "pandas", "are awesome")
    
    		return &authenticator.Response{User: &user.DefaultInfo{}}, true, nil
    	})
    	backend := &testBackend{}
    	c := &Config{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Apr 29 18:59:21 UTC 2024
    - 13.1K bytes
    - Viewed (0)
  2. staging/src/k8s.io/apiserver/pkg/endpoints/handlers/patch.go

    			scope.err(err, w, req)
    			return
    		}
    		options.TypeMeta.SetGroupVersionKind(metav1.SchemeGroupVersion.WithKind("PatchOptions"))
    
    		admit = admission.WithAudit(admit)
    
    		audit.LogRequestPatch(req.Context(), patchBytes)
    		span.AddEvent("Recorded the audit event")
    
    		baseContentType := runtime.ContentTypeJSON
    		if patchType == types.ApplyPatchType {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 28 08:48:22 UTC 2024
    - 28.5K bytes
    - Viewed (0)
  3. staging/src/k8s.io/apiserver/pkg/server/config.go

    	handler = filterlatency.TrackStarted(handler, c.TracerProvider, "impersonation")
    
    	handler = filterlatency.TrackCompleted(handler)
    	handler = genericapifilters.WithAudit(handler, c.AuditBackend, c.AuditPolicyRuleEvaluator, c.LongRunningFunc)
    	handler = filterlatency.TrackStarted(handler, c.TracerProvider, "audit")
    
    	failedHandler := genericapifilters.Unauthorized(c.Serializer)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 28 08:48:22 UTC 2024
    - 47.7K bytes
    - Viewed (0)
Back to top