Documentation ¶
Overview ¶
TODO: Delete this file if we generate a clientset.
Index ¶
- Variables
- func EventString(ev *auditinternal.Event) string
- func HandlePluginError(plugin string, err error, impacted ...*auditinternal.Event)
- func LogRequestObject(ae *audit.Event, obj runtime.Object, gvr schema.GroupVersionResource, ...)
- func LogRequestPatch(ae *audit.Event, patch []byte)
- func LogResponseObject(ae *audit.Event, obj runtime.Object, gv schema.GroupVersion, ...)
- func NewEventFromRequest(req *http.Request, level auditinternal.Level, attribs authorizer.Attributes) (*auditinternal.Event, error)
- func ObserveEvent()
- func ObservePolicyLevel(level auditinternal.Level)
- type Backend
- type Sink
Constants ¶
This section is empty.
Variables ¶
var Codecs = serializer.NewCodecFactory(Scheme)
var Scheme = runtime.NewScheme()
Functions ¶
func EventString ¶
func EventString(ev *auditinternal.Event) string
EventString creates a 1-line text representation of an audit event, using a subset of the information in the event struct.
func HandlePluginError ¶
func HandlePluginError(plugin string, err error, impacted ...*auditinternal.Event)
HandlePluginError handles an error that occurred in an audit plugin. This method should only be used if the error may have prevented the audit event from being properly recorded. The events are logged to the debug log.
func LogRequestObject ¶
func LogRequestObject(ae *audit.Event, obj runtime.Object, gvr schema.GroupVersionResource, subresource string, s runtime.NegotiatedSerializer)
LogRequestObject fills in the request object into an audit event. The passed runtime.Object will be converted to the given gv.
func LogRequestPatch ¶
LogRquestPatch fills in the given patch as the request object into an audit event.
func LogResponseObject ¶
func LogResponseObject(ae *audit.Event, obj runtime.Object, gv schema.GroupVersion, s runtime.NegotiatedSerializer)
LogResponseObject fills in the response object into an audit event. The passed runtime.Object will be converted to the given gv.
func NewEventFromRequest ¶
func NewEventFromRequest(req *http.Request, level auditinternal.Level, attribs authorizer.Attributes) (*auditinternal.Event, error)
func ObserveEvent ¶
func ObserveEvent()
ObserveEvent updates the relevant prometheus metrics for the generated audit event.
func ObservePolicyLevel ¶
func ObservePolicyLevel(level auditinternal.Level)
ObservePolicyLevel updates the relevant prometheus metrics with the audit level for a request.
Types ¶
type Backend ¶
type Backend interface { Sink // Run will initialize the backend. It must not block, but may run go routines in the background. If // stopCh is closed, it is supposed to stop them. Run will be called before the first call to ProcessEvents. Run(stopCh <-chan struct{}) error // Shutdown will synchronously shut down the backend while making sure that all pending // events are delivered. It can be assumed that this method is called after // the stopCh channel passed to the Run method has been closed. Shutdown() }
type Sink ¶
type Sink interface { // ProcessEvents handles events. Per audit ID it might be that ProcessEvents is called up to three times. // Errors might be logged by the sink itself. If an error should be fatal, leading to an internal // error, ProcessEvents is supposed to panic. The event must not be mutated and is reused by the caller // after the call returns, i.e. the sink has to make a deepcopy to keep a copy around if necessary. ProcessEvents(events ...*auditinternal.Event) }