- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 20 for RuleResolver (0.31 sec)
-
pkg/registry/rbac/rolebinding/policybased/storage.go
type Storage struct { rest.StandardStorage authorizer authorizer.Authorizer ruleResolver rbacregistryvalidation.AuthorizationRuleResolver } func NewStorage(s rest.StandardStorage, authorizer authorizer.Authorizer, ruleResolver rbacregistryvalidation.AuthorizationRuleResolver) *Storage { return &Storage{s, authorizer, ruleResolver} } // Destroy cleans up resources on shutdown. func (r *Storage) Destroy() {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 5.5K bytes - Viewed (0) -
pkg/registry/authorization/selfsubjectrulesreview/rest.go
) // REST implements a RESTStorage for selfsubjectrulesreview. type REST struct { ruleResolver authorizer.RuleResolver } // NewREST returns a RESTStorage object that will work against selfsubjectrulesreview. func NewREST(ruleResolver authorizer.RuleResolver) *REST { return &REST{ruleResolver} } // NamespaceScoped fulfill rest.Scoper func (r *REST) NamespaceScoped() bool { return false }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 09:21:13 UTC 2022 - 3.7K bytes - Viewed (0) -
pkg/registry/rbac/clusterrole/policybased/storage.go
type Storage struct { rest.StandardStorage authorizer authorizer.Authorizer ruleResolver rbacregistryvalidation.AuthorizationRuleResolver } func NewStorage(s rest.StandardStorage, authorizer authorizer.Authorizer, ruleResolver rbacregistryvalidation.AuthorizationRuleResolver) *Storage { return &Storage{s, authorizer, ruleResolver} } // Destroy cleans up resources on shutdown. func (r *Storage) Destroy() {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 5.2K bytes - Viewed (0) -
pkg/registry/rbac/clusterrolebinding/policybased/storage.go
type Storage struct { rest.StandardStorage authorizer authorizer.Authorizer ruleResolver rbacregistryvalidation.AuthorizationRuleResolver } func NewStorage(s rest.StandardStorage, authorizer authorizer.Authorizer, ruleResolver rbacregistryvalidation.AuthorizationRuleResolver) *Storage { return &Storage{s, authorizer, ruleResolver} } // Destroy cleans up resources on shutdown. func (r *Storage) Destroy() {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 4.9K bytes - Viewed (0) -
pkg/registry/rbac/validation/internal_version_adapter.go
import ( "context" rbacv1 "k8s.io/api/rbac/v1" "k8s.io/kubernetes/pkg/apis/rbac" rbacv1helpers "k8s.io/kubernetes/pkg/apis/rbac/v1" ) func ConfirmNoEscalationInternal(ctx context.Context, ruleResolver AuthorizationRuleResolver, inRules []rbac.PolicyRule) error { rules := []rbacv1.PolicyRule{} for i := range inRules { v1Rule := rbacv1.PolicyRule{}
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 1.1K bytes - Viewed (0) -
pkg/kubeapiserver/authorizer/reload.go
r.lastLoadedConfig = config authorizer, ruleResolver, err := r.newForConfig(config) if err != nil { klog.ErrorS(err, "reloading authorization config") metrics.RecordAuthorizationConfigAutomaticReloadFailure(r.apiServerID) return } klog.InfoS("constructed new authorizer") r.current.Store(&authorizerResolver{ authorizer: authorizer, ruleResolver: ruleResolver, }) klog.InfoS("reloaded authz config")
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Mar 04 19:01:15 UTC 2024 - 9.3K bytes - Viewed (0) -
pkg/registry/rbac/role/policybased/storage.go
type Storage struct { rest.StandardStorage authorizer authorizer.Authorizer ruleResolver rbacregistryvalidation.AuthorizationRuleResolver } func NewStorage(s rest.StandardStorage, authorizer authorizer.Authorizer, ruleResolver rbacregistryvalidation.AuthorizationRuleResolver) *Storage { return &Storage{s, authorizer, ruleResolver} } // Destroy cleans up resources on shutdown. func (r *Storage) Destroy() {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 3.9K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authorization/union/union.go
} // unionAuthzRulesHandler authorizer against a chain of authorizer.RuleResolver type unionAuthzRulesHandler []authorizer.RuleResolver // NewRuleResolvers returns an authorizer that authorizes against a chain of authorizer.Authorizer objects func NewRuleResolvers(authorizationHandlers ...authorizer.RuleResolver) authorizer.RuleResolver { return unionAuthzRulesHandler(authorizationHandlers) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Jun 28 20:27:28 UTC 2020 - 3.9K bytes - Viewed (0) -
pkg/registry/authorization/rest/storage_authorization.go
"k8s.io/kubernetes/pkg/registry/authorization/subjectaccessreview" ) type RESTStorageProvider struct { Authorizer authorizer.Authorizer RuleResolver authorizer.RuleResolver } func (p RESTStorageProvider) NewRESTStorage(apiResourceConfigSource serverstorage.APIResourceConfigSource, restOptionsGetter generic.RESTOptionsGetter) (genericapiserver.APIGroupInfo, error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Feb 23 18:36:33 UTC 2022 - 3.4K bytes - Viewed (0) -
pkg/kubeapiserver/authorizer/config.go
// Construct the authorizers / ruleResolvers for the given configuration authorizer, ruleResolver, err := r.newForConfig(r.initialConfig.AuthorizationConfiguration) if err != nil { return nil, nil, err } r.current.Store(&authorizerResolver{ authorizer: authorizer, ruleResolver: ruleResolver, }) if r.initialConfig.ReloadFile != "" { go r.runReload(ctx) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 07 21:22:55 UTC 2024 - 8K bytes - Viewed (0)