Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for AuthenticateToken (0.22 sec)

  1. staging/src/k8s.io/apiserver/plugin/pkg/authenticator/token/oidc/metrics.go

    	delegate      AuthenticatorTokenWithHealthCheck
    	clock         clock.PassiveClock
    }
    
    func (a *instrumentedAuthenticator) AuthenticateToken(ctx context.Context, token string) (*authenticator.Response, bool, error) {
    	start := a.clock.Now()
    	response, ok, err := a.delegate.AuthenticateToken(ctx, token)
    	// this only happens when issuer doesn't match the authenticator
    	// we don't want to record metrics for this case
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Mar 09 19:29:33 UTC 2024
    - 3.3K bytes
    - Viewed (0)
  2. staging/src/k8s.io/apiserver/plugin/pkg/authenticator/token/oidc/metrics_test.go

    		t.Run(tt.name, func(t *testing.T) {
    			jwtAuthenticatorLatencyMetric.Reset()
    			RegisterMetrics()
    
    			a := newInstrumentedAuthenticatorWithClock(testIssuer, tt.authenticator, dummyClock{})
    			_, _, _ = a.AuthenticateToken(context.Background(), "token")
    
    			if err := testutil.GatherAndCompare(legacyregistry.DefaultGatherer, strings.NewReader(tt.expectedValue), "apiserver_authentication_jwt_authenticator_latency_seconds"); err != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Mar 09 19:29:33 UTC 2024
    - 8.8K bytes
    - Viewed (0)
  3. pkg/serviceaccount/jwt_test.go

    		ctx := authenticator.WithAudiences(context.Background(), auds)
    		if _, ok, err := authn.AuthenticateToken(ctx, "invalid token"); err != nil || ok {
    			t.Errorf("%s: Expected err=nil, ok=false for non-JWT token", k)
    			continue
    		}
    
    		resp, ok, err := authn.AuthenticateToken(ctx, tc.Token)
    		if (err != nil) != tc.ExpectedErr {
    			t.Errorf("%s: Expected error=%v, got %v", k, tc.ExpectedErr, err)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Feb 27 22:16:08 UTC 2024
    - 17K bytes
    - Viewed (0)
  4. pkg/serviceaccount/jwt.go

    	// call. This struct should contain fields for any private claims that the
    	// Validator requires to validate the JWT.
    	NewPrivateClaims() interface{}
    }
    
    func (j *jwtTokenAuthenticator) AuthenticateToken(ctx context.Context, tokenData string) (*authenticator.Response, bool, error) {
    	if !j.hasCorrectIssuer(tokenData) {
    		return nil, false, nil
    	}
    
    	tok, err := jwt.ParseSigned(tokenData)
    	if err != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Feb 27 22:16:08 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  5. pkg/kubeapiserver/authenticator/config.go

    		tokenAuthenticators = append(tokenAuthenticators,
    			authenticator.TokenFunc(func(ctx context.Context, token string) (*authenticator.Response, bool, error) {
    				return jwtAuthenticatorPtr.Load().jwtAuthenticator.AuthenticateToken(ctx, token)
    			}),
    		)
    	}
    
    	if len(config.WebhookTokenAuthnConfigFile) > 0 {
    		webhookTokenAuth, err := newWebhookTokenAuthenticator(config)
    		if err != nil {
    			return nil, nil, nil, nil, err
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Mar 09 19:29:33 UTC 2024
    - 15.4K bytes
    - Viewed (0)
  6. staging/src/k8s.io/apiserver/plugin/pkg/authenticator/token/oidc/oidc.go

    	}
    	if v.audiences.HasAny(t.Audience...) {
    		return nil
    	}
    
    	return fmt.Errorf("oidc: expected audience in %q got %q", sets.List(v.audiences), t.Audience)
    }
    
    func (a *jwtAuthenticator) AuthenticateToken(ctx context.Context, token string) (*authenticator.Response, bool, error) {
    	if !hasCorrectIssuer(a.jwtAuthenticator.Issuer.URL, token) {
    		return nil, false, nil
    	}
    
    	verifier, ok := a.idTokenVerifier()
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Mar 09 19:29:33 UTC 2024
    - 37.9K bytes
    - Viewed (0)
  7. staging/src/k8s.io/apiserver/plugin/pkg/authenticator/token/oidc/oidc_test.go

    		return a.HealthCheck() == nil, nil
    	})
    	if err != nil {
    		t.Fatalf("failed to initialize the authenticator: %v", err)
    	}
    
    	got, ok, err := a.AuthenticateToken(ctx, token)
    
    	expectErr := len(c.wantErr) > 0
    
    	if err != nil {
    		if !expectErr {
    			t.Fatalf("authenticate token: %v", err)
    		}
    		if got := err.Error(); c.wantErr != got {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 24 18:25:29 UTC 2024
    - 97.7K bytes
    - Viewed (0)
Back to top