Search Options

Results per page
Sort
Preferred Languages
Advance

Results 81 - 90 of 144 for Authorize (0.46 sec)

  1. pkg/registry/rbac/role/policybased/storage_test.go

    	authzCalled := 0
    	fakeStorage := &fakeStorage{}
    	fakeAuthorizer := authorizer.AuthorizerFunc(func(ctx context.Context, attr authorizer.Attributes) (authorizer.Decision, string, error) {
    		authzCalled++
    		if attr.GetUser().GetName() == "steve" {
    			return authorizer.DecisionAllow, "", nil
    		}
    		return authorizer.DecisionNoOpinion, "", nil
    	})
    	fakeRuleResolver, _ := validation.NewTestRuleResolver(
    		nil,
    		nil,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Apr 09 13:47:19 UTC 2021
    - 6.3K bytes
    - Viewed (0)
  2. staging/src/k8s.io/apiserver/pkg/audit/evaluator.go

    */
    
    package audit
    
    import (
    	"k8s.io/apiserver/pkg/apis/audit"
    	"k8s.io/apiserver/pkg/authorization/authorizer"
    )
    
    // RequestAuditConfig is the evaluated audit configuration that is applicable to
    // a given request. PolicyRuleEvaluator evaluates the audit policy against the
    // authorizer attributes and returns a RequestAuditConfig that applies to the request.
    type RequestAuditConfig struct {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Nov 02 22:24:14 UTC 2022
    - 1.6K bytes
    - Viewed (0)
  3. pkg/registry/admissionregistration/validatingadmissionpolicy/storage/storage.go

    func NewREST(optsGetter generic.RESTOptionsGetter, authorizer authorizer.Authorizer, resourceResolver resolver.ResourceResolver) (*REST, *StatusREST, error) {
    	r := &REST{}
    	strategy := validatingadmissionpolicy.NewStrategy(authorizer, resourceResolver)
    	store := &genericregistry.Store{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Mar 07 23:43:34 UTC 2023
    - 4.9K bytes
    - Viewed (0)
  4. staging/src/k8s.io/apiserver/plugin/pkg/authorizer/webhook/metrics/metrics.go

    	compbasemetrics "k8s.io/component-base/metrics"
    	"k8s.io/component-base/metrics/legacyregistry"
    )
    
    // AuthorizerMetrics specifies a set of methods that are used to register various metrics for the webhook authorizer
    type AuthorizerMetrics interface {
    	// Request total and latency metrics
    	RequestMetrics
    	// Webhook count, latency, and fail open metrics
    	WebhookMetrics
    	// match condition metrics
    	cel.MatcherMetrics
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Mar 04 19:01:15 UTC 2024
    - 5.5K bytes
    - Viewed (0)
  5. cmd/kubelet/app/auth.go

    		if dynamicCAContentFromFile != nil {
    			go dynamicCAContentFromFile.Run(ctx, 1)
    		}
    	}, err
    }
    
    // BuildAuthz creates an authorizer compatible with the kubelet's needs
    func BuildAuthz(client authorizationclient.AuthorizationV1Interface, authz kubeletconfig.KubeletAuthorization) (authorizer.Authorizer, error) {
    	switch authz.Mode {
    	case kubeletconfig.KubeletAuthorizationModeAlwaysAllow:
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Mar 07 14:37:01 UTC 2022
    - 5K bytes
    - Viewed (0)
  6. staging/src/k8s.io/apiserver/pkg/admission/plugin/webhook/generic/webhook.go

    	a.hookSource = a.sourceFactory(f)
    	a.SetReadyFunc(func() bool {
    		return namespaceInformer.Informer().HasSynced() && a.hookSource.HasSynced()
    	})
    }
    
    func (a *Webhook) SetAuthorizer(authorizer authorizer.Authorizer) {
    	a.authorizer = authorizer
    }
    
    // ValidateInitialization implements the InitializationValidator interface.
    func (a *Webhook) ValidateInitialization() error {
    	if a.hookSource == nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri May 10 22:07:40 UTC 2024
    - 9.3K bytes
    - Viewed (0)
  7. pkg/registry/authorization/selfsubjectrulesreview/rest.go

    	"k8s.io/apimachinery/pkg/runtime"
    	"k8s.io/apiserver/pkg/authorization/authorizer"
    	genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
    	"k8s.io/apiserver/pkg/registry/rest"
    	authorizationapi "k8s.io/kubernetes/pkg/apis/authorization"
    )
    
    // REST implements a RESTStorage for selfsubjectrulesreview.
    type REST struct {
    	ruleResolver authorizer.RuleResolver
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Nov 18 09:21:13 UTC 2022
    - 3.7K bytes
    - Viewed (0)
  8. plugin/pkg/auth/authorizer/rbac/subject_locator.go

    limitations under the License.
    */
    
    // Package rbac implements the authorizer.Authorizer interface using roles base access control.
    package rbac
    
    import (
    	rbacv1 "k8s.io/api/rbac/v1"
    	utilerrors "k8s.io/apimachinery/pkg/util/errors"
    	"k8s.io/apiserver/pkg/authentication/user"
    	"k8s.io/apiserver/pkg/authorization/authorizer"
    	rbacregistryvalidation "k8s.io/kubernetes/pkg/registry/rbac/validation"
    )
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 22 12:17:05 UTC 2018
    - 4.7K bytes
    - Viewed (0)
  9. staging/src/k8s.io/apiserver/pkg/admission/initializer/interfaces.go

    	SetExternalKubeInformerFactory(informers.SharedInformerFactory)
    	admission.InitializationValidator
    }
    
    // WantsAuthorizer defines a function which sets Authorizer for admission plugins that need it.
    type WantsAuthorizer interface {
    	SetAuthorizer(authorizer.Authorizer)
    	admission.InitializationValidator
    }
    
    // WantsQuotaConfiguration defines a function which sets quota configuration for admission plugins that need it.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Mar 05 19:11:10 UTC 2024
    - 3.6K bytes
    - Viewed (0)
  10. staging/src/k8s.io/apiserver/pkg/audit/policy/checker.go

    limitations under the License.
    */
    
    package policy
    
    import (
    	"strings"
    
    	"k8s.io/apiserver/pkg/apis/audit"
    	auditinternal "k8s.io/apiserver/pkg/audit"
    	"k8s.io/apiserver/pkg/authorization/authorizer"
    )
    
    const (
    	// DefaultAuditLevel is the default level to audit at, if no policy rules are matched.
    	DefaultAuditLevel = audit.LevelNone
    )
    
    // NewPolicyRuleEvaluator creates a new policy rule evaluator.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Nov 02 22:24:14 UTC 2022
    - 6.1K bytes
    - Viewed (0)
Back to top