- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for AddAuditAnnotation (0.13 sec)
-
staging/src/k8s.io/apiserver/pkg/server/config_test.go
authn := authenticator.RequestFunc(func(req *http.Request) (*authenticator.Response, bool, error) { // confirm that we can set an audit annotation in a handler before WithAudit audit.AddAuditAnnotation(req.Context(), "pandas", "are awesome") return &authenticator.Response{User: &user.DefaultInfo{}}, true, nil }) backend := &testBackend{} c := &Config{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 29 18:59:21 UTC 2024 - 13.1K bytes - Viewed (0) -
pkg/serviceaccount/jwt.go
} tokenAudiences := authenticator.Audiences(public.Audience) if len(tokenAudiences) == 0 { // only apiserver audiences are allowed for legacy tokens audit.AddAuditAnnotation(ctx, "authentication.k8s.io/legacy-token", public.Subject) legacyTokensTotal.WithContext(ctx).Inc() tokenAudiences = j.implicitAuds } requestedAudiences, ok := authenticator.AudiencesFrom(ctx) if !ok {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 27 22:16:08 UTC 2024 - 10.7K bytes - Viewed (0) -
pkg/registry/core/serviceaccount/storage/token.go
ExpirationTimestamp: metav1.Time{Time: nowTime.Add(time.Duration(out.Spec.ExpirationSeconds) * time.Second)}, } if utilfeature.DefaultFeatureGate.Enabled(features.ServiceAccountTokenJTI) && len(sc.ID) > 0 { audit.AddAuditAnnotation(ctx, serviceaccount.IssuedCredentialIDAuditAnnotationKey, serviceaccount.CredentialIDForJTI(sc.ID)) } return out, nil } func (r *TokenREST) GroupVersionKind(schema.GroupVersion) schema.GroupVersionKind {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Feb 05 10:24:31 UTC 2024 - 10K bytes - Viewed (0)