- Sort Score
- Result 10 results
- Languages All
Results 91 - 100 of 321 for Authorize (0.17 sec)
-
staging/src/k8s.io/apiserver/pkg/admission/plugin/cel/interface.go
VersionedParams runtime.Object // Authorizer provides the authorizer used for the "authorizer" and // "authorizer.requestResource" variable bindings. If the expression was compiled with // OptionalVariableDeclarations.HasAuthorizer set to true this must be non-nil. Authorizer authorizer.Authorizer } // Filter contains a function to evaluate compiled CEL-typed values
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 10 22:07:40 UTC 2024 - 3.9K bytes - Viewed (0) -
pkg/registry/rbac/role/policybased/storage.go
type Storage struct { rest.StandardStorage authorizer authorizer.Authorizer ruleResolver rbacregistryvalidation.AuthorizationRuleResolver } func NewStorage(s rest.StandardStorage, authorizer authorizer.Authorizer, ruleResolver rbacregistryvalidation.AuthorizationRuleResolver) *Storage { return &Storage{s, authorizer, ruleResolver} } // Destroy cleans up resources on shutdown.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 3.9K bytes - Viewed (0) -
pkg/registry/authorization/util/helpers.go
"k8s.io/apiserver/pkg/authorization/authorizer" authorizationapi "k8s.io/kubernetes/pkg/apis/authorization" ) // ResourceAttributesFrom combines the API object information and the user.Info from the context to build a full authorizer.AttributesRecord for resource access func ResourceAttributesFrom(user user.Info, in authorizationapi.ResourceAttributes) authorizer.AttributesRecord { return authorizer.AttributesRecord{ User: user,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Apr 25 16:06:18 UTC 2023 - 2.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/endpoints/filters/metrics_test.go
"authorization_attempts_total", "authorization_decision_annotations_total", } testCases := []struct { desc string authorizer fakeAuthorizer want string }{ { desc: "auth ok", authorizer: fakeAuthorizer{ authorizer.DecisionAllow, "RBAC: allowed to patch pod", nil, }, want: `
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 20 13:35:55 UTC 2023 - 8.7K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/policy/generic/plugin.go
c.dynamicClient = client } func (c *Plugin[H]) SetDrainedNotification(stopCh <-chan struct{}) { c.stopCh = stopCh } func (c *Plugin[H]) SetAuthorizer(authorizer authorizer.Authorizer) { c.authorizer = authorizer } func (c *Plugin[H]) SetMatcher(matcher *matching.Matcher) { c.matcher = matcher } func (c *Plugin[H]) SetEnabled(enabled bool) { c.enabled = enabled }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Mar 05 19:11:10 UTC 2024 - 6.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/initializer/initializer.go
"k8s.io/apiserver/pkg/authorization/authorizer" "k8s.io/client-go/dynamic" "k8s.io/client-go/informers" "k8s.io/client-go/kubernetes" "k8s.io/component-base/featuregate" ) type pluginInitializer struct { externalClient kubernetes.Interface dynamicClient dynamic.Interface externalInformers informers.SharedInformerFactory authorizer authorizer.Authorizer featureGates featuregate.FeatureGate
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authorization/authorizerfactory/delegating.go
import ( "errors" "time" "k8s.io/apimachinery/pkg/util/wait" "k8s.io/apiserver/pkg/authorization/authorizer" "k8s.io/apiserver/plugin/pkg/authorizer/webhook" authorizationclient "k8s.io/client-go/kubernetes/typed/authorization/v1" ) // DelegatingAuthorizerConfig is the minimal configuration needed to create an authorizer // built to delegate authorization to a kube API server type DelegatingAuthorizerConfig struct {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 22:41:27 UTC 2024 - 2.1K bytes - Viewed (0) -
pkg/registry/admissionregistration/validatingadmissionpolicybinding/storage/storage.go
// NewREST returns a RESTStorage object that will work against policyBinding. func NewREST(optsGetter generic.RESTOptionsGetter, authorizer authorizer.Authorizer, policyGetter PolicyGetter, resourceResolver resolver.ResourceResolver) (*REST, error) { r := &REST{} strategy := validatingadmissionpolicybinding.NewStrategy(authorizer, policyGetter, resourceResolver) store := &genericregistry.Store{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 3.6K bytes - Viewed (0) -
pkg/registry/admissionregistration/rest/storage_apiserver.go
validatingwebhookconfigurationstorage "k8s.io/kubernetes/pkg/registry/admissionregistration/validatingwebhookconfiguration/storage" ) type RESTStorageProvider struct { Authorizer authorizer.Authorizer DiscoveryClient discovery.DiscoveryInterface }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 8.2K bytes - Viewed (0) -
pkg/registry/authorization/util/helpers_test.go
"ResourceRequest", // Fields we set in NonResourceAttributesFrom "User", "ResourceRequest", "Path", "Verb", ) reflect.TypeOf(authorizer.AttributesRecord{}).FieldByNameFunc(func(name string) bool { if !knownAttributesRecordFieldNames.Has(name) { t.Errorf("authorizer.AttributesRecord has a new field: %q. Add to ResourceAttributesFrom/NonResourceAttributesFrom as appropriate, then add to knownAttributesRecordFieldNames", name) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Apr 25 16:06:18 UTC 2023 - 4.7K bytes - Viewed (0)