- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 559 for Authorize (0.31 sec)
-
staging/src/k8s.io/apiserver/pkg/authorization/authorizerfactory/builtin_test.go
if authorized, _, _ := auth.Authorize(context.Background(), yes); authorized != authorizer.DecisionAllow { t.Errorf("failed") } if authorized, _, _ := auth.Authorize(context.Background(), no); authorized == authorizer.DecisionAllow { t.Errorf("failed") }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 1.8K bytes - Viewed (0) -
pkg/registry/admissionregistration/validatingadmissionpolicy/authz.go
// identical paramKind to old object return nil } return v.authorize(ctx, policy) } func (v *validatingAdmissionPolicyStrategy) authorize(ctx context.Context, policy *admissionregistration.ValidatingAdmissionPolicy) error { if v.authorizer == nil || policy.Spec.ParamKind == nil { return nil } // for superuser, skip all checks
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 07 21:29:56 UTC 2022 - 3.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authorization/union/union_test.go
cs := []struct { authorizers []authorizer.Authorizer decision authorizer.Decision }{ { authorizers: []authorizer.Authorizer{}, decision: authorizer.DecisionNoOpinion, }, { authorizers: []authorizer.Authorizer{ &mockAuthzHandler{decision: authorizer.DecisionNoOpinion}, &mockAuthzHandler{decision: authorizer.DecisionAllow},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 7.7K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authorization/metrics/metrics_test.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Feb 16 13:20:59 UTC 2024 - 3.3K bytes - Viewed (0) -
pkg/kubeapiserver/authorizer/modes/modes.go
const ( // ModeAlwaysAllow is the mode to set all requests as authorized ModeAlwaysAllow string = "AlwaysAllow" // ModeAlwaysDeny is the mode to set no requests as authorized ModeAlwaysDeny string = "AlwaysDeny" // ModeABAC is the mode to use Attribute Based Access Control to authorize ModeABAC string = "ABAC" // ModeWebhook is the mode to make an external webhook call to authorize ModeWebhook string = "Webhook"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 05 01:22:41 UTC 2018 - 1.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/policy/validating/caching_authorizer.go
"k8s.io/apiserver/pkg/authorization/authorizer" ) type authzResult struct { authorized authorizer.Decision reason string err error } type cachingAuthorizer struct { authorizer authorizer.Authorizer decisions map[string]authzResult } func newCachingAuthorizer(in authorizer.Authorizer) authorizer.Authorizer { return &cachingAuthorizer{ authorizer: in,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Feb 12 18:58:24 UTC 2024 - 3.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/plugin/pkg/authorizer/webhook/webhook_v1_test.go
serv.statusCode = test.statusCode authorized, _, err := wh.Authorize(context.Background(), test.attr) if test.expectedErr && err == nil { t.Fatalf("%d: Expected error", i) } else if !test.expectedErr && err != nil { t.Fatalf("%d: unexpected error: %v", i, err) } if test.expectedAuthorized != (authorized == authorizer.DecisionAllow) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 24 18:25:29 UTC 2024 - 43.2K bytes - Viewed (0) -
pkg/registry/admissionregistration/validatingadmissionpolicybinding/authz.go
// identical paramRef and policy to old object return nil } return v.authorize(ctx, binding) } func (v *validatingAdmissionPolicyBindingStrategy) authorize(ctx context.Context, binding *admissionregistration.ValidatingAdmissionPolicyBinding) error { if v.authorizer == nil || v.resourceResolver == nil || binding.Spec.ParamRef == nil { return nil } // for superuser, skip all checks
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 12:19:03 UTC 2024 - 3.7K bytes - Viewed (0) -
plugin/pkg/admission/certificates/util.go
func IsAuthorizedForSignerName(ctx context.Context, authz authorizer.Authorizer, info user.Info, verb, signerName string) bool { // First check if the user has explicit permission to 'verb' for the given signerName. attr := buildAttributes(info, verb, signerName) decision, reason, err := authz.Authorize(ctx, attr) switch { case err != nil: klog.V(3).Infof("cannot authorize %q %q for policy: %v,%v", verb, attr.GetName(), reason, err)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 16 11:54:27 UTC 2020 - 2.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authorization/path/path_test.go
for _, cases := range []struct { paths []string want authorizer.Decision }{ {tt.allowed, authorizer.DecisionAllow}, {tt.denied, authorizer.DecisionDeny}, {tt.noOpinion, authorizer.DecisionNoOpinion}, } { for _, pth := range cases.paths { info := authorizer.AttributesRecord{ Path: pth, } if got, _, err := a.Authorize(context.Background(), info); err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 2.8K bytes - Viewed (0)