- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 90 for auditID (0.34 sec)
-
staging/src/k8s.io/apiserver/pkg/apis/audit/OWNERS
# See the OWNERS docs at https://go.k8s.io/owners # approval on api packages bubbles to api-approvers reviewers: - sig-auth-audit-approvers - sig-auth-audit-reviewers labels:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Dec 10 02:31:26 UTC 2021 - 193 bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/endpoints/filters/authorization.go
"net/http" "time" "k8s.io/klog/v2" "k8s.io/apimachinery/pkg/runtime" "k8s.io/apiserver/pkg/audit" "k8s.io/apiserver/pkg/authorization/authorizer" "k8s.io/apiserver/pkg/endpoints/handlers/responsewriters" "k8s.io/apiserver/pkg/endpoints/request" ) const ( // Annotation key names set in advanced audit decisionAnnotationKey = "authorization.k8s.io/decision" reasonAnnotationKey = "authorization.k8s.io/reason"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 20 13:35:55 UTC 2023 - 3.8K bytes - Viewed (0) -
pkg/registry/core/serviceaccount/storage/storage_test.go
if err != nil { t.Fatalf("failed creating test service account: %v", err) } // create an audit context to allow recording audit information ctx = audit.WithAuditContext(ctx) _, err = storage.Token.Create(ctx, serviceAccount.Name, &authenticationapi.TokenRequest{ ObjectMeta: metav1.ObjectMeta{ Name: serviceAccount.Name,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 24 18:25:29 UTC 2024 - 6.7K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/policy/validating/policy_decision.go
const ( // AuditAnnotationActionPublish indicates that the audit annotation should be // published with the audit event. AuditAnnotationActionPublish PolicyAuditAnnotationAction = "publish" // AuditAnnotationActionError indicates that the valueExpression resulted // in an error. AuditAnnotationActionError PolicyAuditAnnotationAction = "error" // AuditAnnotationActionExclude indicates that the audit annotation should be excluded
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Feb 12 18:58:24 UTC 2024 - 2.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/audit/union.go
See the License for the specific language governing permissions and limitations under the License. */ package audit import ( "fmt" "strings" "k8s.io/apimachinery/pkg/util/errors" auditinternal "k8s.io/apiserver/pkg/apis/audit" ) // Union returns an audit Backend which logs events to a set of backends. The returned // Sink implementation blocks in turn for each call to ProcessEvents.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 20 09:51:25 UTC 2022 - 1.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/endpoints/filters/authn_audit_test.go
limitations under the License. */ package filters import ( "crypto/tls" "crypto/x509" "net/http" "net/http/httptest" "strings" "testing" auditinternal "k8s.io/apiserver/pkg/apis/audit" "k8s.io/apiserver/pkg/audit/policy" ) func TestFailedAuthnAudit(t *testing.T) { sink := &fakeAuditSink{} fakeRuleEvaluator := policy.NewFakePolicyRuleEvaluator(auditinternal.LevelRequestResponse, nil)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Aug 12 21:42:41 UTC 2021 - 5.5K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/interfaces.go
// By default, an annotation gets logged into audit event if the request's audit level is greater or // equal to Metadata. AddAnnotation(key, value string) error // AddAnnotationWithLevel sets annotation according to key-value pair with additional intended audit level. // An Annotation gets logged into audit event if the request's audit level is greater or equal to the // intended audit level.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Oct 28 14:03:18 UTC 2021 - 8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authentication/token/cache/cached_token_authenticator.go
} recorder := &recorder{} ctx = warning.WithWarningRecorder(ctx, recorder) ctx = audit.WithAuditContext(ctx) ac := audit.AuditContextFrom(ctx) // since this is shared work between multiple requests, we have no way of knowing if any // particular request supports audit annotations. thus we always attempt to record them. ac.Event.Level = auditinternal.LevelMetadata
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jul 03 16:16:51 UTC 2023 - 9.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/recommended.go
type RecommendedOptions struct { Etcd *EtcdOptions SecureServing *SecureServingOptionsWithLoopback Authentication *DelegatingAuthenticationOptions Authorization *DelegatingAuthorizationOptions Audit *AuditOptions Features *FeatureOptions CoreAPI *CoreAPIOptions // FeatureGate is a way to plumb feature gate through if you have them. FeatureGate featuregate.FeatureGate
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 22 18:51:27 UTC 2024 - 6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/endpoints/filters/authorization_test.go
"testing" "github.com/stretchr/testify/assert" batch "k8s.io/api/batch/v1" "k8s.io/apimachinery/pkg/runtime" "k8s.io/apimachinery/pkg/runtime/serializer" auditinternal "k8s.io/apiserver/pkg/apis/audit" "k8s.io/apiserver/pkg/audit" "k8s.io/apiserver/pkg/authorization/authorizer" ) func TestGetAuthorizerAttributes(t *testing.T) { testcases := map[string]struct { Verb string Path string
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jul 03 16:16:51 UTC 2023 - 5K bytes - Viewed (0)