Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for LegacyClaims (0.18 sec)

  1. pkg/serviceaccount/jwt_test.go

    	if err != nil {
    		t.Fatalf("error making generator: %v", err)
    	}
    	rsaToken, err := rsaGenerator.GenerateToken(serviceaccount.LegacyClaims(*serviceAccount, *rsaSecret))
    	if err != nil {
    		t.Fatalf("error generating token: %v", err)
    	}
    	if len(rsaToken) == 0 {
    		t.Fatalf("no token generated")
    	}
    	rsaSecret.Data = map[string][]byte{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Feb 27 22:16:08 UTC 2024
    - 17K bytes
    - Viewed (0)
  2. pkg/serviceaccount/legacy.go

    	applyv1 "k8s.io/client-go/applyconfigurations/core/v1"
    	typedv1core "k8s.io/client-go/kubernetes/typed/core/v1"
    	"k8s.io/klog/v2"
    )
    
    const InvalidSinceLabelKey = "kubernetes.io/legacy-token-invalid-since"
    
    func LegacyClaims(serviceAccount v1.ServiceAccount, secret v1.Secret) (*jwt.Claims, interface{}) {
    	return &jwt.Claims{
    			Subject: apiserverserviceaccount.MakeUsername(serviceAccount.Namespace, serviceAccount.Name),
    		}, &legacyPrivateClaims{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Nov 01 08:32:23 UTC 2023
    - 8.4K bytes
    - Viewed (0)
  3. pkg/controller/serviceaccount/tokens_controller.go

    	if needsNamespace {
    		liveSecret.Data[v1.ServiceAccountNamespaceKey] = []byte(liveSecret.Namespace)
    	}
    
    	// Generate the token
    	if needsToken {
    		token, err := e.token.GenerateToken(serviceaccount.LegacyClaims(*serviceAccount, *liveSecret))
    		if err != nil {
    			return false, err
    		}
    		liveSecret.Data[v1.ServiceAccountTokenKey] = []byte(token)
    	}
    
    	// Set annotations
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 20.5K bytes
    - Viewed (0)
Back to top