- Sort Score
- Result 10 results
- Languages All
Results 1 - 8 of 8 for ModeWebhook (0.61 sec)
-
pkg/kubeapiserver/authorizer/modes/modes.go
ModeAlwaysDeny string = "AlwaysDeny" // ModeABAC is the mode to use Attribute Based Access Control to authorize ModeABAC string = "ABAC" // ModeWebhook is the mode to make an external webhook call to authorize ModeWebhook string = "Webhook" // ModeRBAC is the mode to use Role Based Access Control to authorize ModeRBAC string = "RBAC"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 05 01:22:41 UTC 2018 - 1.6K bytes - Viewed (0) -
pkg/kubeapiserver/options/authorization_test.go
expectErr: false, }, { name: "ModeWebhook requires a config file", modes: []string{modes.ModeWebhook}, expectErr: true, expectErrorSubString: "authorization-mode Webhook's authorization config file not passed", }, { name: "Cannot provide webhook config file without ModeWebhook", modes: []string{modes.ModeAlwaysAllow},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 18 06:28:47 UTC 2023 - 6.4K bytes - Viewed (0) -
pkg/kubeapiserver/authorizer/config.go
) // Config contains the data on how to authorize a request to the Kube API Server type Config struct { // Options for ModeABAC // Path to an ABAC policy file. PolicyFile string // Options for ModeWebhook // WebhookRetryBackoff specifies the backoff parameters for the authorization webhook retry logic. // This allows us to configure the sleep time at each iteration and the maximum number of retries allowed
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 07 21:22:55 UTC 2024 - 8K bytes - Viewed (0) -
pkg/kubeapiserver/options/authorization.go
} if mode == authzmodes.ModeABAC && o.PolicyFile == "" { allErrors = append(allErrors, fmt.Errorf("authorization-mode ABAC's authorization policy file not passed")) } if mode == authzmodes.ModeWebhook && o.WebhookConfigFile == "" { allErrors = append(allErrors, fmt.Errorf("authorization-mode Webhook's authorization config file not passed")) } } if o.PolicyFile != "" && !modes.Has(authzmodes.ModeABAC) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Feb 14 23:09:15 UTC 2024 - 12K bytes - Viewed (0) -
pkg/kubeapiserver/authorizer/reload.go
ruleResolvers = append(ruleResolvers, r.abacAuthorizer) case authzconfig.AuthorizerType(modes.ModeWebhook): if r.initialConfig.WebhookRetryBackoff == nil { return nil, nil, errors.New("retry backoff parameters for authorization webhook has not been specified") }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Mar 04 19:01:15 UTC 2024 - 9.3K bytes - Viewed (0) -
cmd/kubeadm/app/phases/controlplane/manifests_test.go
ExtraArgs: []kubeadmapi.Arg{ {Name: "authorization-mode", Value: strings.Join([]string{ kubeadmconstants.ModeNode, kubeadmconstants.ModeRBAC, kubeadmconstants.ModeWebhook, }, ",")}, }, }, }, }, endpoint: &kubeadmapi.APIEndpoint{BindPort: 123, AdvertiseAddress: "1.2.3.4"}, expected: []string{ "kube-apiserver",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Mar 03 14:43:47 UTC 2024 - 48.5K bytes - Viewed (0) -
cmd/kubeadm/app/constants/constants.go
ModeAlwaysDeny string = "AlwaysDeny" // ModeABAC is the mode to use Attribute Based Access Control to authorize ModeABAC string = "ABAC" // ModeWebhook is the mode to make an external webhook call to authorize ModeWebhook string = "Webhook" // ModeRBAC is the mode to use Role Based Access Control to authorize ModeRBAC string = "RBAC"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 01 03:36:35 UTC 2024 - 32.4K bytes - Viewed (0) -
cmd/kubeadm/app/phases/controlplane/manifests.go
return false } } return true } func isValidAuthzMode(authzMode string) bool { allModes := []string{ kubeadmconstants.ModeNode, kubeadmconstants.ModeRBAC, kubeadmconstants.ModeWebhook, kubeadmconstants.ModeABAC, kubeadmconstants.ModeAlwaysAllow, kubeadmconstants.ModeAlwaysDeny, } for _, mode := range allModes { if authzMode == mode { return true } }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Mar 03 14:43:47 UTC 2024 - 17.8K bytes - Viewed (0)