- Sort Score
- Result 10 results
- Languages All
Results 101 - 110 of 583 for authorizer (0.26 sec)
-
staging/src/k8s.io/apiserver/pkg/audit/policy/checker_test.go
"k8s.io/apiserver/pkg/apis/audit" "k8s.io/apiserver/pkg/authentication/user" "k8s.io/apiserver/pkg/authorization/authorizer" ) var ( tim = &user.DefaultInfo{ Name: "******@****.***", Groups: []string{"humans", "developers"}, } attrs = map[string]authorizer.Attributes{ "namespaced": &authorizer.AttributesRecord{ User: tim, Verb: "get", Namespace: "default",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Oct 12 15:06:14 UTC 2021 - 15.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/cel/filter.go
if err != nil { return nil, -1, err } } if inputs.Authorizer != nil { authorizerVal = library.NewAuthorizerVal(versionedAttr.GetUserInfo(), inputs.Authorizer) requestResourceAuthorizerVal = library.NewResourceAuthorizerVal(versionedAttr.GetUserInfo(), inputs.Authorizer, versionedAttr) } requestVal, err := convertObjectToUnstructured(request) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jul 24 14:46:11 UTC 2023 - 12.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/policy/validating/interface.go
Validate(ctx context.Context, matchedResource schema.GroupVersionResource, versionedAttr *admission.VersionedAttributes, versionedParams runtime.Object, namespace *corev1.Namespace, runtimeCELCostBudget int64, authz authorizer.Authorizer) ValidateResult
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Feb 22 17:47:18 UTC 2024 - 3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/webhook/matchconditions/matcher.go
t := time.Now() evalResults, _, err := m.filter.ForInput(ctx, versionedAttr, celplugin.CreateAdmissionRequest(versionedAttr.Attributes, metav1.GroupVersionResource(versionedAttr.GetResource()), metav1.GroupVersionKind(versionedAttr.VersionedKind)), celplugin.OptionalVariableBindings{ VersionedParams: versionedParams, Authorizer: authz,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jul 24 14:46:11 UTC 2023 - 5K bytes - Viewed (0) -
staging/src/k8s.io/api/authorization/v1/types.go
// encountered when an authorizer, such as an external authorizer, doesn't support rules evaluation. Incomplete bool `json:"incomplete" protobuf:"bytes,3,rep,name=incomplete"` // EvaluationError can appear in combination with Rules. It indicates an error occurred during // rule evaluation, such as an authorizer that doesn't support rule evaluation, and that
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 23 17:42:49 UTC 2024 - 14.6K bytes - Viewed (0) -
staging/src/k8s.io/api/authorization/v1beta1/types.go
// encountered when an authorizer, such as an external authorizer, doesn't support rules evaluation. Incomplete bool `json:"incomplete" protobuf:"bytes,3,rep,name=incomplete"` // EvaluationError can appear in combination with Rules. It indicates an error occurred during // rule evaluation, such as an authorizer that doesn't support rule evaluation, and that
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 27 20:06:26 UTC 2023 - 15.1K bytes - Viewed (0) -
pkg/registry/rbac/rest/storage_rbac.go
rbacregistryvalidation "k8s.io/kubernetes/pkg/registry/rbac/validation" "k8s.io/kubernetes/plugin/pkg/auth/authorizer/rbac/bootstrappolicy" ) const PostStartHookName = "rbac/bootstrap-roles" type RESTStorageProvider struct { Authorizer authorizer.Authorizer } var _ genericapiserver.PostStartHookProvider = RESTStorageProvider{}
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jul 14 03:25:19 UTC 2022 - 18.5K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/policy/validating/dispatcher.go
celconfig "k8s.io/apiserver/pkg/apis/cel" "k8s.io/apiserver/pkg/authorization/authorizer" "k8s.io/apiserver/pkg/warning" "k8s.io/klog/v2" ) type dispatcher struct { matcher generic.PolicyMatcher authz authorizer.Authorizer } var _ generic.Dispatcher[PolicyHook] = &dispatcher{} func NewDispatcher( authorizer authorizer.Authorizer, matcher generic.PolicyMatcher, ) generic.Dispatcher[PolicyHook] {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 14.4K bytes - Viewed (0) -
staging/src/k8s.io/api/rbac/v1/generated.proto
// +structType=atomic message Subject { // Kind of object being referenced. Values defined by this API group are "User", "Group", and "ServiceAccount". // If the Authorizer does not recognized the kind value, the Authorizer should report an error. optional string kind = 1; // APIGroup holds the API group of the referenced subject. // Defaults to "" for ServiceAccount subjects.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 15:34:11 UTC 2024 - 7.9K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1beta1/generated.proto
// or a value for non-objects such as user and group names. message Subject { // Kind of object being referenced. Values defined by this API group are "User", "Group", and "ServiceAccount". // If the Authorizer does not recognized the kind value, the Authorizer should report an error. optional string kind = 1; // APIGroup holds the API group of the referenced subject. // Defaults to "" for ServiceAccount subjects.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8.6K bytes - Viewed (0)