Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 90 for auditID (0.15 sec)

  1. pkg/serviceaccount/legacy.go

    		}
    
    		// Track secret-based long-lived service account tokens and add audit annotations and metrics.
    		autoGenerated := false
    
    		// Check if the secret has been marked as invalid
    		if invalidSince := secret.Labels[InvalidSinceLabelKey]; invalidSince != "" {
    			audit.AddAuditAnnotation(ctx, "authentication.k8s.io/legacy-token-invalidated", secret.Name+"/"+secret.Namespace)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Nov 01 08:32:23 UTC 2023
    - 8.4K bytes
    - Viewed (0)
  2. pilot/pkg/model/authorization.go

    		configs.Allow = append(configs.Allow, config)
    	case authpb.AuthorizationPolicy_DENY:
    		configs.Deny = append(configs.Deny, config)
    	case authpb.AuthorizationPolicy_AUDIT:
    		configs.Audit = append(configs.Audit, config)
    	case authpb.AuthorizationPolicy_CUSTOM:
    		configs.Custom = append(configs.Custom, config)
    	default:
    		log.Errorf("ignored authorization policy %s.%s with unsupported action: %s",
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 4.2K bytes
    - Viewed (0)
  3. staging/src/k8s.io/apiserver/pkg/endpoints/handlers/delete_test.go

    	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
    	"k8s.io/apimachinery/pkg/runtime"
    	"k8s.io/apimachinery/pkg/runtime/schema"
    	"k8s.io/apimachinery/pkg/runtime/serializer"
    	auditapis "k8s.io/apiserver/pkg/apis/audit"
    	"k8s.io/apiserver/pkg/audit"
    	"k8s.io/apiserver/pkg/endpoints/handlers/negotiation"
    	"k8s.io/apiserver/pkg/registry/rest"
    	"k8s.io/utils/pointer"
    )
    
    type mockCodecs struct {
    	serializer.CodecFactory
    	err error
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jul 03 16:16:51 UTC 2023
    - 8.2K bytes
    - Viewed (0)
  4. cluster/gce/manifests/kube-apiserver.manifest

            "readOnly": true},
            { "name": "logfile",
            "mountPath": "/var/log/kube-apiserver.log",
            "readOnly": false},
            { "name": "auditlogfile",
            "mountPath": "/var/log/kube-apiserver-audit.log",
            "readOnly": false},
            { "name": "etcssl",
            "mountPath": "/etc/ssl",
            "readOnly": true},
            { "name": "usrsharecacerts",
            "mountPath": "/usr/share/ca-certificates",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Mar 19 14:47:38 UTC 2022
    - 4.1K bytes
    - Viewed (0)
  5. ci/official/containers/linux_arm64/devel.usertools/wheel_verification.bats

    }
    
    teardown_file() {
        rm -rf /tf/venv
    }
    
    @test "Wheel is manylinux2014 (manylinux_2_17) compliant" {
        python3 -m auditwheel show "$TF_WHEEL" > audit.txt
        grep --quiet -zoP 'is consistent with the following platform tag:\n"manylinux_2_17_(aarch|x86_)64"\.' audit.txt
    }
    
    @test "Wheel conforms to upstream size limitations" {
        WHEEL_MEGABYTES=$(stat --format %s "$TF_WHEEL" | awk '{print int($1/(1024*1024))}')
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Tue Jan 23 02:14:00 UTC 2024
    - 2.7K bytes
    - Viewed (0)
  6. staging/src/k8s.io/apiserver/pkg/endpoints/filters/metrics_test.go

    			defer authorizationAttemptsCounter.Reset()
    
    			audit := &auditinternal.Event{Level: auditinternal.LevelMetadata}
    			handler := WithAuthorization(&fakeHTTPHandler{}, tt.authorizer, negotiatedSerializer)
    			// TODO: fake audit injector
    
    			req, _ := http.NewRequest("GET", "/api/v1/namespaces/default/pods", nil)
    			req = withTestContext(req, nil, audit)
    			req.RemoteAddr = "127.0.0.1"
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 20 13:35:55 UTC 2023
    - 8.7K bytes
    - Viewed (0)
  7. staging/src/k8s.io/apiserver/pkg/admission/plugin/policy/validating/metrics/metrics.go

    }
    
    // ObserveAudit observes a policy validation audit annotation was published for a validation failure.
    func (m *ValidatingAdmissionPolicyMetrics) ObserveAudit(ctx context.Context, elapsed time.Duration, policy, binding, state string) {
    	m.policyCheck.WithContext(ctx).WithLabelValues(policy, binding, "audit", state).Inc()
    	m.policyLatency.WithContext(ctx).WithLabelValues(policy, binding, "audit", state).Observe(elapsed.Seconds())
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Feb 12 18:58:24 UTC 2024
    - 5.4K bytes
    - Viewed (0)
  8. staging/src/k8s.io/apiserver/pkg/endpoints/handlers/helpers.go

    		}
    	}
    
    	return "unknown"
    }
    
    // lazyAuditID implements Stringer interface to lazily retrieve
    // the audit ID associated with the request.
    type lazyAuditID struct {
    	req *http.Request
    }
    
    func (lazy *lazyAuditID) String() string {
    	if lazy.req != nil {
    		return audit.GetAuditIDTruncated(lazy.req.Context())
    	}
    
    	return "unknown"
    }
    
    // lazyVerb implements String() string and it will
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Sep 03 15:25:35 UTC 2023
    - 4.9K bytes
    - Viewed (0)
  9. staging/src/k8s.io/apiserver/pkg/admission/plugin/policy/validating/interface.go

    	return v.Expression
    }
    
    func (v *ValidationCondition) ReturnTypes() []*celgo.Type {
    	return []*celgo.Type{celgo.BoolType}
    }
    
    // AuditAnnotationCondition contains the inputs needed to compile, evaluate and publish a cel audit annotation
    type AuditAnnotationCondition struct {
    	Key             string
    	ValueExpression string
    }
    
    func (v *AuditAnnotationCondition) GetExpression() string {
    	return v.ValueExpression
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Feb 22 17:47:18 UTC 2024
    - 3K bytes
    - Viewed (0)
  10. staging/src/k8s.io/apiserver/pkg/endpoints/filters/impersonation.go

    		req = req.WithContext(request.WithUser(ctx, newUser))
    
    		oldUser, _ := request.UserFrom(ctx)
    		httplog.LogOf(req, w).Addf("%v is impersonating %v", userString(oldUser), userString(newUser))
    
    		ae := audit.AuditEventFrom(ctx)
    		audit.LogImpersonatedUser(ae, newUser)
    
    		// clear all the impersonation headers from the request
    		req.Header.Del(authenticationv1.ImpersonateUserHeader)
    		req.Header.Del(authenticationv1.ImpersonateGroupHeader)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Aug 07 10:10:35 UTC 2023
    - 9.5K bytes
    - Viewed (0)
Back to top