Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 5 of 5 for serviceNamespaces (0.57 sec)

  1. staging/src/k8s.io/apiserver/pkg/util/webhook/serviceresolver_test.go

    )
    
    func TestDefaultServiceResolver(t *testing.T) {
    	scenarios := []struct {
    		serviceName      string
    		serviceNamespace string
    		port             int32
    		expectedOutput   string
    		expectError      bool
    	}{
    		// scenario 1: a service name along with a namespace resolves
    		{serviceName: "ross", serviceNamespace: "andromeda", port: 443, expectedOutput: "https://ross.andromeda.svc:443"},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Apr 08 07:19:52 UTC 2019
    - 2K bytes
    - Viewed (0)
  2. staging/src/k8s.io/apiserver/pkg/util/webhook/authentication.go

    				}
    				return ret, nil
    			},
    			ClientConfigForServiceFunc: func(serviceName, serviceNamespace string, servicePort int) (*rest.Config, error) {
    				if serviceName == "kubernetes" && serviceNamespace == corev1.NamespaceDefault && servicePort == 443 {
    					return kubeapiserverClientConfig, nil
    				}
    				ret, err := delegate.ClientConfigForService(serviceName, serviceNamespace, servicePort)
    				if err != nil {
    					return nil, err
    				}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jun 29 15:48:39 UTC 2023
    - 9.5K bytes
    - Viewed (0)
  3. tests/integration/security/file_mounted_certs/p2p_mtls_test.go

    metadata:
      name: default
      namespace: "istio-system"
    spec:
      mtls:
        mode: STRICT
    `
    )
    
    func createObject(ctx framework.TestContext, serviceNamespace string, yamlManifest string) {
    	args := map[string]string{"AppNamespace": serviceNamespace}
    	ctx.ConfigIstio().Eval(serviceNamespace, args, yamlManifest).ApplyOrFail(ctx)
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Apr 08 22:02:59 UTC 2024
    - 2.8K bytes
    - Viewed (0)
  4. staging/src/k8s.io/apiserver/pkg/admission/plugin/webhook/testing/authentication_info_resolver.go

    	atomic.AddInt32(a.cacheMisses, 1)
    	return a.restConfig, nil
    }
    
    func (a *authenticationInfoResolver) ClientConfigForService(serviceName, serviceNamespace string, servicePort int) (*rest.Config, error) {
    	atomic.AddInt32(a.cacheMisses, 1)
    	return a.restConfig, nil
    }
    
    // NewPanickingAuthenticationInfoResolver creates a fake AuthenticationInfoResolver that panics
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 18 18:49:55 UTC 2022
    - 2.7K bytes
    - Viewed (0)
  5. tests/integration/security/filebased_tls_origination/main_test.go

            mountPath: /etc/certs/custom
    `
    }
    
    func setupApps(ctx resource.Context, appNs namespace.Getter,
    	serviceNs namespace.Getter, customCfg *[]echo.Config,
    ) error {
    	appNamespace := appNs.Get()
    	serviceNamespace := serviceNs.Get()
    	var customConfig []echo.Config
    	client := echo.Config{
    		Service:   "client",
    		Namespace: appNamespace,
    		Ports:     []echo.Port{},
    		Subsets: []echo.SubsetConfig{{
    			Version: "v1",
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 02 21:29:40 UTC 2024
    - 7.3K bytes
    - Viewed (0)
Back to top