Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 2 of 2 for limitSecretReferences (0.25 sec)

  1. plugin/pkg/admission/serviceaccount/admission.go

    }
    
    var _ = admission.Interface(&Plugin{})
    
    // Plugin contains the client used by the admission controller
    type Plugin struct {
    	*admission.Handler
    
    	// LimitSecretReferences rejects pods that reference secrets their service accounts do not reference
    	LimitSecretReferences bool
    	// MountServiceAccountToken creates Volume and VolumeMounts for the first referenced ServiceAccountToken for the pod's service account
    	MountServiceAccountToken bool
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Apr 12 17:49:30 UTC 2024
    - 18.6K bytes
    - Viewed (0)
  2. plugin/pkg/admission/serviceaccount/admission_test.go

    	ns := "myns"
    
    	admit := NewServiceAccount()
    	informerFactory := informers.NewSharedInformerFactory(nil, controller.NoResyncPeriodFunc())
    	admit.SetExternalKubeInformerFactory(informerFactory)
    	admit.LimitSecretReferences = true
    
    	// Add the default service account for the ns with a secret reference into the cache
    	informerFactory.Core().V1().ServiceAccounts().Informer().GetStore().Add(&corev1.ServiceAccount{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Apr 12 17:49:30 UTC 2024
    - 36.9K bytes
    - Viewed (0)
Back to top