- Sort Score
- Result 10 results
- Languages All
Results 191 - 200 of 559 for Authorize (0.14 sec)
-
internal/config/identity/openid/jwt.go
// OPTIONAL. Authorized party - the party to which the ID // Token was issued. If present, it MUST contain the OAuth // 2.0 Client ID of this party. This Claim is only needed // when the ID Token has a single audience value and that // audience is different than the authorized party. It MAY // be included even when the authorized party is the same
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu May 30 18:10:41 UTC 2024 - 8.3K bytes - Viewed (0) -
cmd/kube-scheduler/app/server.go
return fmt.Errorf("finished without leader elect") } // buildHandlerChain wraps the given handler with the standard filters. func buildHandlerChain(handler http.Handler, authn authenticator.Request, authz authorizer.Authorizer) http.Handler { requestInfoResolver := &apirequest.RequestInfoFactory{} failedHandler := genericapifilters.Unauthorized(scheme.Codecs) handler = genericapifilters.WithAuthorization(handler, authz, scheme.Codecs)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon May 27 19:11:24 UTC 2024 - 14.3K bytes - Viewed (0) -
pkg/controlplane/instance.go
authorizationrest.RESTStorageProvider{Authorizer: c.ControlPlane.Generic.Authorization.Authorizer, RuleResolver: c.ControlPlane.Generic.RuleResolver}, autoscalingrest.RESTStorageProvider{}, batchrest.RESTStorageProvider{}, certificatesrest.RESTStorageProvider{},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jun 03 11:50:04 UTC 2024 - 21.2K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/subject_locator_test.go
"testing" rbacv1 "k8s.io/api/rbac/v1" "k8s.io/apiserver/pkg/authentication/user" "k8s.io/apiserver/pkg/authorization/authorizer" rbacregistryvalidation "k8s.io/kubernetes/pkg/registry/rbac/validation" ) func TestSubjectLocator(t *testing.T) { type actionToSubjects struct { action authorizer.Attributes subjects []rbacv1.Subject } tests := []struct { name string
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 5.6K bytes - Viewed (0) -
security/pkg/server/ca/server_test.go
code: codes.Unauthenticated, ca: &mockca.FakeCA{}, }, "Unauthenticated request": { authenticators: []security.Authenticator{&mockAuthenticator{ errMsg: "Not authorized", }}, code: codes.Unauthenticated, ca: &mockca.FakeCA{}, }, "CA not ready": { authenticators: []security.Authenticator{&mockAuthenticator{identities: []string{"test-identity"}}},
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Feb 28 16:41:38 UTC 2024 - 15.8K bytes - Viewed (0) -
staging/src/k8s.io/apiextensions-apiserver/pkg/apiserver/customresource_handler.go
// CRD establishing process for HA clusters. masterCount int converterFactory *conversion.CRConverterFactory // so that we can do create on update. authorizer authorizer.Authorizer // request timeout we should delay storage teardown for requestTimeout time.Duration // minRequestTimeout applies to CR's list/watch calls minRequestTimeout time.Duration
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Feb 28 19:06:46 UTC 2024 - 52.9K bytes - Viewed (0) -
pkg/registry/rbac/rolebinding/registry.go
if err := rbacv1helpers.Convert_rbac_RoleBindingList_To_v1_RoleBindingList(obj.(*rbac.RoleBindingList), ret, nil); err != nil { return nil, err } return ret, nil } // AuthorizerAdapter adapts the registry to the authorizer interface type AuthorizerAdapter struct { Registry Registry } func (a AuthorizerAdapter) ListRoleBindings(namespace string) ([]*rbacv1.RoleBinding, error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 22 12:17:05 UTC 2018 - 2.3K bytes - Viewed (0) -
pkg/registry/rbac/clusterrole/registry.go
if err := rbacv1helpers.Convert_rbac_ClusterRole_To_v1_ClusterRole(obj.(*rbac.ClusterRole), ret, nil); err != nil { return nil, err } return ret, nil } // AuthorizerAdapter adapts the registry to the authorizer interface type AuthorizerAdapter struct { Registry Registry } // GetClusterRole returns the corresponding ClusterRole by name func (a AuthorizerAdapter) GetClusterRole(name string) (*rbacv1.ClusterRole, error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 02 02:35:47 UTC 2019 - 2.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authorization/authorizer/rule.go
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package authorizer type ResourceRuleInfo interface { // GetVerbs returns a list of kubernetes resource API verbs. GetVerbs() []string // GetAPIGroups return the names of the APIGroup that contains the resources.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 01 11:09:43 UTC 2017 - 2.1K bytes - Viewed (0) -
pkg/registry/rbac/role/registry.go
ret := &rbacv1.Role{} if err := rbacv1helpers.Convert_rbac_Role_To_v1_Role(obj.(*rbac.Role), ret, nil); err != nil { return nil, err } return ret, nil } // AuthorizerAdapter adapts the registry to the authorizer interface type AuthorizerAdapter struct { Registry Registry } // GetRole returns the corresponding Role by name in specified namespace func (a AuthorizerAdapter) GetRole(namespace, name string) (*rbacv1.Role, error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 02 02:36:35 UTC 2019 - 2K bytes - Viewed (0)