diff --git a/lib/authz/permissions.go b/lib/authz/permissions.go index 9d2d2d1d1231f..260dc280d5166 100644 --- a/lib/authz/permissions.go +++ b/lib/authz/permissions.go @@ -1169,7 +1169,7 @@ func AuthorizeResourceWithVerbs(ctx context.Context, log logrus.FieldLogger, aut Resource: resource, } - return authorizeContextWithVerbs(ctx, log, authCtx, quiet, ruleCtx, resource.GetKind(), verbs...) + return AuthorizeContextWithVerbs(ctx, log, authCtx, quiet, ruleCtx, resource.GetKind(), verbs...) } // AuthorizeWithVerbs will ensure that the user has access to the given verbs for the given kind. @@ -1183,11 +1183,11 @@ func AuthorizeWithVerbs(ctx context.Context, log logrus.FieldLogger, authorizer User: authCtx.User, } - return authorizeContextWithVerbs(ctx, log, authCtx, quiet, ruleCtx, kind, verbs...) + return AuthorizeContextWithVerbs(ctx, log, authCtx, quiet, ruleCtx, kind, verbs...) } -// authorizeContextWithVerbs will ensure that the user has access to the given verbs for the given services.context. -func authorizeContextWithVerbs(ctx context.Context, log logrus.FieldLogger, authCtx *Context, quiet bool, ruleCtx *services.Context, kind string, verbs ...string) (*Context, error) { +// AuthorizeContextWithVerbs will ensure that the user has access to the given verbs for the given services.context. +func AuthorizeContextWithVerbs(ctx context.Context, log logrus.FieldLogger, authCtx *Context, quiet bool, ruleCtx *services.Context, kind string, verbs ...string) (*Context, error) { errs := make([]error, len(verbs)) for i, verb := range verbs { errs[i] = authCtx.Checker.CheckAccessToRule(ruleCtx, defaults.Namespace, kind, verb, quiet)