- Sort Score
- Result 10 results
- Languages All
Results 71 - 80 of 583 for authorizer (0.12 sec)
-
plugin/pkg/admission/certificates/ctbattest/admission.go
func NewPlugin() *Plugin { return &Plugin{ Handler: admission.NewHandler(admission.Create, admission.Update), } } // SetAuthorizer sets the plugin's authorizer. func (p *Plugin) SetAuthorizer(authz authorizer.Authorizer) { p.authz = authz } // InspectFeatureGates implements WantsFeatures. func (p *Plugin) InspectFeatureGates(featureGates featuregate.FeatureGate) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Sep 20 16:26:11 UTC 2023 - 4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/endpoints/handlers/responsewriters/errors_test.go
u := &user.DefaultInfo{Name: "NAME"} cases := []struct { expected string attributes authorizer.Attributes reason string contentType string }{ {`{"kind":"Status","apiVersion":"v1","metadata":{},"status":"Failure","message":"forbidden: User \"NAME\" cannot GET path \"/whatever\"","reason":"Forbidden","details":{},"code":403} `, authorizer.AttributesRecord{User: u, Verb: "GET", Path: "/whatever"}, "", "application/json"},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Aug 29 07:45:20 UTC 2022 - 4.3K bytes - Viewed (0) -
pkg/registry/rbac/clusterrole/policybased/storage_test.go
authzCalled := 0 fakeStorage := &fakeStorage{} fakeAuthorizer := authorizer.AuthorizerFunc(func(ctx context.Context, attr authorizer.Attributes) (authorizer.Decision, string, error) { authzCalled++ if attr.GetUser().GetName() == "steve" { return authorizer.DecisionAllow, "", nil } return authorizer.DecisionNoOpinion, "", nil }) fakeRuleResolver, _ := validation.NewTestRuleResolver( nil, nil,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 09 13:47:19 UTC 2021 - 6.2K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/audit/evaluator.go
*/ package audit import ( "k8s.io/apiserver/pkg/apis/audit" "k8s.io/apiserver/pkg/authorization/authorizer" ) // RequestAuditConfig is the evaluated audit configuration that is applicable to // a given request. PolicyRuleEvaluator evaluates the audit policy against the // authorizer attributes and returns a RequestAuditConfig that applies to the request. type RequestAuditConfig struct {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Nov 02 22:24:14 UTC 2022 - 1.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/webhook/generic/webhook.go
a.hookSource = a.sourceFactory(f) a.SetReadyFunc(func() bool { return namespaceInformer.Informer().HasSynced() && a.hookSource.HasSynced() }) } func (a *Webhook) SetAuthorizer(authorizer authorizer.Authorizer) { a.authorizer = authorizer } // ValidateInitialization implements the InitializationValidator interface. func (a *Webhook) ValidateInitialization() error { if a.hookSource == nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 10 22:07:40 UTC 2024 - 9.3K bytes - Viewed (0) -
pkg/kubelet/server/server_test.go
}, attributesFunc: func(u user.Info, req *http.Request) authorizer.Attributes { return &authorizer.AttributesRecord{User: u} }, authorizeFunc: func(a authorizer.Attributes) (decision authorizer.Decision, reason string, err error) { return authorizer.DecisionAllow, "", nil }, } server := NewServer( fw.fakeKubelet,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 24 18:25:29 UTC 2024 - 51.5K bytes - Viewed (0) -
pkg/registry/authorization/selfsubjectrulesreview/rest.go
"k8s.io/apimachinery/pkg/runtime" "k8s.io/apiserver/pkg/authorization/authorizer" genericapirequest "k8s.io/apiserver/pkg/endpoints/request" "k8s.io/apiserver/pkg/registry/rest" authorizationapi "k8s.io/kubernetes/pkg/apis/authorization" ) // REST implements a RESTStorage for selfsubjectrulesreview. type REST struct { ruleResolver authorizer.RuleResolver }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 09:21:13 UTC 2022 - 3.7K bytes - Viewed (0) -
pkg/registry/admissionregistration/validatingadmissionpolicybinding/storage/storage.go
// NewREST returns a RESTStorage object that will work against policyBinding. func NewREST(optsGetter generic.RESTOptionsGetter, authorizer authorizer.Authorizer, policyGetter PolicyGetter, resourceResolver resolver.ResourceResolver) (*REST, error) { r := &REST{} strategy := validatingadmissionpolicybinding.NewStrategy(authorizer, policyGetter, resourceResolver) store := &genericregistry.Store{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 18 10:11:16 UTC 2022 - 3.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/webhook/matchconditions/interface.go
type Matcher interface { // Match is used to take cel evaluations and convert into decisions Match(ctx context.Context, versionedAttr *admission.VersionedAttributes, versionedParams runtime.Object, authz authorizer.Authorizer) MatchResult
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jun 28 19:30:04 UTC 2023 - 1.2K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/policy/validating/admission_test.go
ctx context.Context, matchResource schema.GroupVersionResource, versionedAttr *admission.VersionedAttributes, versionedParams runtime.Object, namespace *v1.Namespace, runtimeCELCostBudget int64, authz authorizer.Authorizer) validating.ValidateResult type fakeCompiler struct { ValidateFuncs map[types.NamespacedName]validating.Validator lock sync.Mutex NumCompiles map[types.NamespacedName]int }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Mar 25 01:39:01 UTC 2024 - 63.8K bytes - Viewed (0)