const DefaultAuditLevel …
func NewPolicyRuleEvaluator(policy *audit.Policy) auditinternal.PolicyRuleEvaluator { … }
func unionStages(stageLists ...[]audit.Stage) []audit.Stage { … }
func NewFakePolicyRuleEvaluator(level audit.Level, stage []audit.Stage) auditinternal.PolicyRuleEvaluator { … }
type policyRuleEvaluator …
func (p *policyRuleEvaluator) EvaluatePolicyRule(attrs authorizer.Attributes) auditinternal.RequestAuditConfig { … }
func isOmitManagedFields(policyRule *audit.PolicyRule, policyDefault bool) bool { … }
func ruleMatches(r *audit.PolicyRule, attrs authorizer.Attributes) bool { … }
func ruleMatchesNonResource(r *audit.PolicyRule, attrs authorizer.Attributes) bool { … }
func pathMatches(path, spec string) bool { … }
func ruleMatchesResource(r *audit.PolicyRule, attrs authorizer.Attributes) bool { … }
func hasString(slice []string, value string) bool { … }
type fakePolicyRuleEvaluator …
func (f *fakePolicyRuleEvaluator) EvaluatePolicyRule(_ authorizer.Attributes) auditinternal.RequestAuditConfig { … }