- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 367 for authorizes (0.18 sec)
-
plugin/pkg/auth/authorizer/node/node_authorizer.go
return authorizer.DecisionAllow, "", nil } return authorizer.DecisionNoOpinion, "", nil } // authorizeStatusUpdate authorizes get/update/patch requests to status subresources of the specified type if they are related to the specified node func (r *NodeAuthorizer) authorizeStatusUpdate(nodeName string, startingType vertexType, attrs authorizer.Attributes) (authorizer.Decision, string, error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 07 21:22:55 UTC 2024 - 16K bytes - Viewed (0) -
cmd/kubeadm/app/constants/constants.go
ModeABAC string = "ABAC" // ModeWebhook is the mode to make an external webhook call to authorize ModeWebhook string = "Webhook" // ModeRBAC is the mode to use Role Based Access Control to authorize ModeRBAC string = "RBAC" // ModeNode is an authorization mode that authorizes API requests made by kubelets. ModeNode string = "Node" // PauseVersion indicates the default pause image version for kubeadm
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 01 03:36:35 UTC 2024 - 32.4K bytes - Viewed (0) -
pkg/kubelet/apis/config/types.go
// Authorization in the Kubelet. type KubeletWebhookAuthorization struct { // cacheAuthorizedTTL is the duration to cache 'authorized' responses from the webhook authorizer. CacheAuthorizedTTL metav1.Duration // cacheUnauthorizedTTL is the duration to cache 'unauthorized' responses from the webhook authorizer. CacheUnauthorizedTTL metav1.Duration } // KubeletAuthentication holds the Kubetlet Authentication setttings.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Mar 05 21:10:42 UTC 2024 - 35.1K bytes - Viewed (0) -
pkg/kubeapiserver/authorizer/reload.go
current atomic.Pointer[authorizerResolver] } type authorizerResolver struct { authorizer authorizer.Authorizer ruleResolver authorizer.RuleResolver } func (r *reloadableAuthorizerResolver) Authorize(ctx context.Context, a authorizer.Attributes) (authorized authorizer.Decision, reason string, err error) { return r.current.Load().authorizer.Authorize(ctx, a) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Mar 04 19:01:15 UTC 2024 - 9.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/cel/library/authz.go
GetSubresource() string } func NewAuthorizerVal(userInfo user.Info, authorizer authorizer.Authorizer) ref.Val { return authorizerVal{receiverOnlyObjectVal: receiverOnlyVal(AuthorizerType), userInfo: userInfo, authAuthorizer: authorizer} } func NewResourceAuthorizerVal(userInfo user.Info, authorizer authorizer.Authorizer, requestResource Resource) ref.Val {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Aug 23 21:31:27 UTC 2023 - 21.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/policy/validating/caching_authorizer.go
"k8s.io/apiserver/pkg/authorization/authorizer" ) type authzResult struct { authorized authorizer.Decision reason string err error } type cachingAuthorizer struct { authorizer authorizer.Authorizer decisions map[string]authzResult } func newCachingAuthorizer(in authorizer.Authorizer) authorizer.Authorizer { return &cachingAuthorizer{ authorizer: in,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Feb 12 18:58:24 UTC 2024 - 3.6K bytes - Viewed (0) -
pkg/registry/admissionregistration/validatingadmissionpolicy/authz_test.go
auth: func(ctx context.Context, a authorizer.Attributes) (authorized authorizer.Decision, reason string, err error) { return authorizer.DecisionDeny, "", nil }, }, { name: "authorized", userInfo: &user.DefaultInfo{Groups: []string{user.AllAuthenticated}}, auth: func(ctx context.Context, a authorizer.Attributes) (authorized authorizer.Decision, reason string, err error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 07 21:29:56 UTC 2022 - 3.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/authorization.go
} func (s *DelegatingAuthorizationOptions) toAuthorizer(client kubernetes.Interface) (authorizer.Authorizer, error) { var authorizers []authorizer.Authorizer if len(s.AlwaysAllowGroups) > 0 { authorizers = append(authorizers, authorizerfactory.NewPrivilegedGroups(s.AlwaysAllowGroups...)) } if len(s.AlwaysAllowPaths) > 0 { a, err := path.NewAuthorizer(s.AlwaysAllowPaths) if err != nil { return nil, err }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Dec 18 04:27:38 UTC 2022 - 9.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/endpoints/filters/authorization.go
return } authorized, reason, err := a.Authorize(ctx, attributes) authorizationFinish := time.Now() defer func() { metrics(ctx, authorized, err, authorizationStart, authorizationFinish) }() // an authorizer like RBAC could encounter evaluation errors and still allow the request, so authorizer decision is checked before error here. if authorized == authorizer.DecisionAllow {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 20 13:35:55 UTC 2023 - 3.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/plugin/pkg/authorizer/webhook/webhook_v1_test.go
serv.statusCode = test.statusCode authorized, _, err := wh.Authorize(context.Background(), test.attr) if test.expectedErr && err == nil { t.Fatalf("%d: Expected error", i) } else if !test.expectedErr && err != nil { t.Fatalf("%d: unexpected error: %v", i, err) } if test.expectedAuthorized != (authorized == authorizer.DecisionAllow) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 24 18:25:29 UTC 2024 - 43.2K bytes - Viewed (0)