- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 772 for authorizationv1 (1.67 sec)
-
pkg/controller/certificates/approver/sarapprove.go
func (a *sarApprover) authorize(ctx context.Context, csr *capi.CertificateSigningRequest, rattrs authorization.ResourceAttributes) (bool, error) { extra := make(map[string]authorization.ExtraValue) for k, v := range csr.Spec.Extra { extra[k] = authorization.ExtraValue(v) } sar := &authorization.SubjectAccessReview{ Spec: authorization.SubjectAccessReviewSpec{ User: csr.Spec.Username,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jun 21 16:03:42 UTC 2023 - 5.3K bytes - Viewed (0) -
pilot/test/xds/fake.go
} // DisableAuthorizationForSecret makes the authorization check always pass. Should be used only for tests. func DisableAuthorizationForSecret(fake *fake.Clientset) { fake.Fake.PrependReactor("create", "subjectaccessreviews", func(action k8stesting.Action) (bool, runtime.Object, error) { return true, &authorizationv1.SubjectAccessReview{ Status: authorizationv1.SubjectAccessReviewStatus{ Allowed: true, }, }, nil
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jun 10 16:08:52 UTC 2024 - 18.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/authorization.go
package options import ( "fmt" "time" "github.com/spf13/pflag" "k8s.io/apimachinery/pkg/util/wait" "k8s.io/apiserver/pkg/authorization/authorizer" "k8s.io/apiserver/pkg/authorization/authorizerfactory" "k8s.io/apiserver/pkg/authorization/path" "k8s.io/apiserver/pkg/authorization/union" "k8s.io/apiserver/pkg/server" "k8s.io/client-go/kubernetes" "k8s.io/client-go/rest" "k8s.io/client-go/tools/clientcmd"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Dec 18 04:27:38 UTC 2022 - 9.3K bytes - Viewed (0) -
istioctl/pkg/precheck/precheck.go
version string resource string }{ { version: "v1", resource: "namespaces", }, { group: "rbac.authorization.k8s.io", version: "v1", resource: "clusterroles", }, { group: "rbac.authorization.k8s.io", version: "v1", resource: "clusterrolebindings", }, { group: "apiextensions.k8s.io", version: "v1",
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 12 02:57:30 UTC 2024 - 19.3K bytes - Viewed (0) -
pkg/kubeapiserver/options/authorization.go
authorizationModeFlag = "authorization-mode" authorizationWebhookConfigFileFlag = "authorization-webhook-config-file" authorizationWebhookVersionFlag = "authorization-webhook-version" authorizationWebhookAuthorizedTTLFlag = "authorization-webhook-cache-authorized-ttl" authorizationWebhookUnauthorizedTTLFlag = "authorization-webhook-cache-unauthorized-ttl"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Feb 14 23:09:15 UTC 2024 - 12K bytes - Viewed (0) -
pilot/pkg/model/authorization.go
return types.NamespacedName{Name: ap.Name, Namespace: ap.Namespace} } // AuthorizationPolicies organizes AuthorizationPolicy by namespace. type AuthorizationPolicies struct { // Maps from namespace to the Authorization policies. NamespaceToPolicies map[string][]AuthorizationPolicy `json:"namespace_to_policies"` // The name of the root namespace. Policy in the root namespace applies to workloads in all namespaces.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 22:20:44 UTC 2024 - 4.2K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/endpoints/filters/authorization.go
"k8s.io/apiserver/pkg/audit" "k8s.io/apiserver/pkg/authorization/authorizer" "k8s.io/apiserver/pkg/endpoints/handlers/responsewriters" "k8s.io/apiserver/pkg/endpoints/request" ) const ( // Annotation key names set in advanced audit decisionAnnotationKey = "authorization.k8s.io/decision" reasonAnnotationKey = "authorization.k8s.io/reason" // Annotation values set in advanced audit
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 20 13:35:55 UTC 2023 - 3.8K bytes - Viewed (0) -
pkg/workloadapi/security/authorization.proto
// limitations under the License. syntax = "proto3"; package istio.security; option go_package="pkg/workloadapi/security"; import "google/protobuf/empty.proto"; message Authorization { string name = 1; string namespace = 2; // Determine the scope of this RBAC policy. // If set to NAMESPACE, the 'namespace' field value will be used. Scope scope = 3;
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 21 20:45:12 UTC 2023 - 3K bytes - Viewed (0) -
pilot/pkg/serviceregistry/kube/controller/ambient/authorization.go
l = len(requested) } res := make([]model.WorkloadAuthorization, 0, l) for _, cfg := range cfgs { k := model.ConfigKey{ Kind: kind.AuthorizationPolicy, Name: cfg.Authorization.Name, Namespace: cfg.Authorization.Namespace, } if len(requested) > 0 && !requested.Contains(k) { continue } res = append(res, cfg) } return res }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 15 16:23:36 UTC 2024 - 18.4K bytes - Viewed (0) -
pkg/workloadapi/security/authorization.pb.go
func (*Authorization) Descriptor() ([]byte, []int) { return file_workloadapi_security_authorization_proto_rawDescGZIP(), []int{0} } func (x *Authorization) GetName() string { if x != nil { return x.Name } return "" } func (x *Authorization) GetNamespace() string { if x != nil { return x.Namespace } return "" } func (x *Authorization) GetScope() Scope { if x != nil { return x.Scope
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 31 02:27:10 UTC 2024 - 29.7K bytes - Viewed (0)