- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 329 for serviceAccount (0.56 sec)
-
pkg/controller/serviceaccount/tokens_controller_test.go
ExpectedActions []core.Action }{ "new serviceaccount with no secrets": { ClientObjects: []runtime.Object{serviceAccount(emptySecretReferences())}, AddedServiceAccount: serviceAccount(emptySecretReferences()), ExpectedActions: []core.Action{}, }, "new serviceaccount with missing secrets": { ClientObjects: []runtime.Object{serviceAccount(missingSecretReferences())},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 14 00:05:53 UTC 2023 - 21.5K bytes - Viewed (0) -
plugin/pkg/admission/serviceaccount/admission.go
// 1. If the pod does not specify a ServiceAccount, it sets the pod's ServiceAccount to "default" // 2. It ensures the ServiceAccount referenced by the pod exists // 3. If LimitSecretReferences is true, it rejects the pod if the pod references Secret objects which the pod's ServiceAccount does not reference
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 12 17:49:30 UTC 2024 - 18.6K bytes - Viewed (0) -
pkg/controller/serviceaccount/tokens_controller.go
if serviceAccount, ok := obj.(*v1.ServiceAccount); ok { e.syncServiceAccountQueue.Add(makeServiceAccountKey(serviceAccount)) } } func (e *TokensController) queueServiceAccountUpdateSync(oldObj interface{}, newObj interface{}) { if serviceAccount, ok := newObj.(*v1.ServiceAccount); ok { e.syncServiceAccountQueue.Add(makeServiceAccountKey(serviceAccount)) } }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 20.5K bytes - Viewed (0) -
pkg/serviceaccount/jwt_test.go
} func generateECDSAToken(t *testing.T, iss string, serviceAccount *v1.ServiceAccount, ecdsaSecret *v1.Secret) string { t.Helper() ecdsaGenerator, err := serviceaccount.JWTTokenGenerator(iss, getPrivateKey(ecdsaPrivateKey)) if err != nil { t.Fatalf("error making generator: %v", err) } ecdsaToken, err := ecdsaGenerator.GenerateToken(serviceaccount.LegacyClaims(*serviceAccount, *ecdsaSecret)) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 27 22:16:08 UTC 2024 - 17K bytes - Viewed (0) -
pkg/serviceaccount/claims_test.go
} type fakeGetter struct { serviceAccount *v1.ServiceAccount secret *v1.Secret pod *v1.Pod node *v1.Node } func (f fakeGetter) GetServiceAccount(namespace, name string) (*v1.ServiceAccount, error) { if f.serviceAccount == nil { return nil, apierrors.NewNotFound(schema.GroupResource{Group: "", Resource: "serviceaccounts"}, name) } return f.serviceAccount, nil }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 24 18:25:29 UTC 2024 - 17.9K bytes - Viewed (0) -
pkg/controller/serviceaccount/legacy_serviceaccount_token_cleaner_test.go
} creationTime, _ := time.Parse(dateFormat, creationTimeString) labels := map[string]string{} if lastUsedLabel != "" { labels[serviceaccount.LastUsedLabelKey] = lastUsedLabel } if invalidSinceLabel != "" { labels[serviceaccount.InvalidSinceLabelKey] = invalidSinceLabel } return &v1.Secret{ ObjectMeta: metav1.ObjectMeta{ Name: "token-secret-1", Namespace: "default",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Oct 27 03:52:06 UTC 2023 - 21.1K bytes - Viewed (0) -
istioctl/pkg/multicluster/remote_secret.go
} func secretReferencesServiceAccount(serviceAccount *v1.ServiceAccount, secret *v1.Secret) error { if secret.Type != v1.SecretTypeServiceAccountToken || secret.Annotations[v1.ServiceAccountNameKey] != serviceAccount.Name { return fmt.Errorf("secret %s/%s does not reference ServiceAccount %s", secret.Namespace, secret.Name, serviceAccount.Name) } return nil }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Oct 11 01:43:17 UTC 2023 - 24K bytes - Viewed (0) -
istioctl/pkg/writer/ztunnel/configdump/testdata/dump.json
"protocol": "HBONE", "uid": "Kubernetes//Pod/bookinfo/ratings-v1-6484c4d9bb-mdxm5", "name": "ratings-v1-6484c4d9bb-mdxm5", "namespace": "bookinfo", "trustDomain": "cluster.local", "serviceAccount": "bookinfo-ratings", "workloadName": "ratings-v1", "workloadType": "deployment", "canonicalName": "ratings", "canonicalRevision": "v1", "network": "network1",
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 16 03:28:36 UTC 2024 - 33.1K bytes - Viewed (0) -
plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml
name: system:controller:attachdetach-controller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: system:controller:attachdetach-controller subjects: - kind: ServiceAccount name: attachdetach-controller namespace: kube-system - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 06 00:00:21 UTC 2024 - 16.9K bytes - Viewed (0) -
pkg/controller/serviceaccount/legacy_serviceaccount_token_cleaner.go
} // make sure the time to be 00:00 on the day just after the date starts to track return trackedSinceTime.AddDate(0, 0, 1), nil } func hasSecretReference(serviceAccount *v1.ServiceAccount, secretName string) bool { for _, secret := range serviceAccount.Secrets { if secret.Name == secretName { return true } } return false
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Oct 27 03:52:06 UTC 2023 - 10K bytes - Viewed (0)