- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 623 for authorizes (0.29 sec)
-
staging/src/k8s.io/apiserver/pkg/authorization/authorizerfactory/builtin_test.go
if authorized, _, _ := auth.Authorize(context.Background(), yes); authorized != authorizer.DecisionAllow { t.Errorf("failed") } if authorized, _, _ := auth.Authorize(context.Background(), no); authorized == authorizer.DecisionAllow { t.Errorf("failed") }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 1.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/cel/library/authz.go
GetSubresource() string } func NewAuthorizerVal(userInfo user.Info, authorizer authorizer.Authorizer) ref.Val { return authorizerVal{receiverOnlyObjectVal: receiverOnlyVal(AuthorizerType), userInfo: userInfo, authAuthorizer: authorizer} } func NewResourceAuthorizerVal(userInfo user.Info, authorizer authorizer.Authorizer, requestResource Resource) ref.Val {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Aug 23 21:31:27 UTC 2023 - 21.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/policy/validating/caching_authorizer.go
"k8s.io/apiserver/pkg/authorization/authorizer" ) type authzResult struct { authorized authorizer.Decision reason string err error } type cachingAuthorizer struct { authorizer authorizer.Authorizer decisions map[string]authzResult } func newCachingAuthorizer(in authorizer.Authorizer) authorizer.Authorizer { return &cachingAuthorizer{ authorizer: in,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Feb 12 18:58:24 UTC 2024 - 3.6K bytes - Viewed (0) -
pkg/registry/admissionregistration/validatingadmissionpolicy/authz_test.go
auth: func(ctx context.Context, a authorizer.Attributes) (authorized authorizer.Decision, reason string, err error) { return authorizer.DecisionDeny, "", nil }, }, { name: "authorized", userInfo: &user.DefaultInfo{Groups: []string{user.AllAuthenticated}}, auth: func(ctx context.Context, a authorizer.Attributes) (authorized authorizer.Decision, reason string, err error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 07 21:29:56 UTC 2022 - 3.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/authorization.go
} func (s *DelegatingAuthorizationOptions) toAuthorizer(client kubernetes.Interface) (authorizer.Authorizer, error) { var authorizers []authorizer.Authorizer if len(s.AlwaysAllowGroups) > 0 { authorizers = append(authorizers, authorizerfactory.NewPrivilegedGroups(s.AlwaysAllowGroups...)) } if len(s.AlwaysAllowPaths) > 0 { a, err := path.NewAuthorizer(s.AlwaysAllowPaths) if err != nil { return nil, err }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Dec 18 04:27:38 UTC 2022 - 9.3K bytes - Viewed (0) -
pkg/registry/rbac/escalation_check.go
)) } return decision == authorizer.DecisionAllow } // BindingAuthorized returns true if the user associated with the context is explicitly authorized to bind the specified roleRef func BindingAuthorized(ctx context.Context, roleRef rbac.RoleRef, bindingNamespace string, a authorizer.Authorizer) bool { if a == nil { return false }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 4.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authorization/authorizerfactory/builtin.go
func (alwaysAllowAuthorizer) RulesFor(user user.Info, namespace string) ([]authorizer.ResourceRuleInfo, []authorizer.NonResourceRuleInfo, bool, error) { return []authorizer.ResourceRuleInfo{ &authorizer.DefaultResourceRuleInfo{ Verbs: []string{"*"}, APIGroups: []string{"*"}, Resources: []string{"*"}, }, }, []authorizer.NonResourceRuleInfo{ &authorizer.DefaultNonResourceRuleInfo{ Verbs: []string{"*"},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Sep 24 15:14:54 UTC 2019 - 3.2K bytes - Viewed (0) -
plugin/pkg/admission/certificates/util.go
func IsAuthorizedForSignerName(ctx context.Context, authz authorizer.Authorizer, info user.Info, verb, signerName string) bool { // First check if the user has explicit permission to 'verb' for the given signerName. attr := buildAttributes(info, verb, signerName) decision, reason, err := authz.Authorize(ctx, attr) switch { case err != nil: klog.V(3).Infof("cannot authorize %q %q for policy: %v,%v", verb, attr.GetName(), reason, err)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 16 11:54:27 UTC 2020 - 2.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/plugin/pkg/authorizer/webhook/webhook_v1_test.go
serv.statusCode = test.statusCode authorized, _, err := wh.Authorize(context.Background(), test.attr) if test.expectedErr && err == nil { t.Fatalf("%d: Expected error", i) } else if !test.expectedErr && err != nil { t.Fatalf("%d: unexpected error: %v", i, err) } if test.expectedAuthorized != (authorized == authorizer.DecisionAllow) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 24 18:25:29 UTC 2024 - 43.2K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/endpoints/filters/authorization.go
return } authorized, reason, err := a.Authorize(ctx, attributes) authorizationFinish := time.Now() defer func() { metrics(ctx, authorized, err, authorizationStart, authorizationFinish) }() // an authorizer like RBAC could encounter evaluation errors and still allow the request, so authorizer decision is checked before error here. if authorized == authorizer.DecisionAllow {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 20 13:35:55 UTC 2023 - 3.8K bytes - Viewed (0)