- Sort Score
- Result 10 results
- Languages All
Results 91 - 94 of 94 for withBuild (0.27 sec)
-
staging/src/k8s.io/client-go/applyconfigurations/core/v1/event.go
b.Namespace = &value return b } // WithUID sets the UID field in the declarative configuration to the given value // and returns the receiver, so that objects can be built by chaining "With" function invocations. // If called multiple times, the UID field is set to the value of the last call. func (b *EventApplyConfiguration) WithUID(value types.UID) *EventApplyConfiguration {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 23 17:59:55 UTC 2022 - 17.8K bytes - Viewed (0) -
pkg/serviceaccount/legacy.go
tomorrow := now.AddDate(0, 0, 1).Format("2006-01-02") lastUsed := secret.Labels[LastUsedLabelKey] if lastUsed != today && lastUsed != tomorrow { patchContent, err := json.Marshal(applyv1.Secret(secret.Name, secret.Namespace).WithUID(secret.UID).WithLabels(map[string]string{LastUsedLabelKey: today})) if err != nil { klog.Errorf("Failed to marshal legacy service account token %s/%s tracking labels, err: %v", secret.Name, secret.Namespace, err) } else {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Nov 01 08:32:23 UTC 2023 - 8.4K bytes - Viewed (0) -
pkg/controller/serviceaccount/legacy_serviceaccount_token_cleaner.go
logger.Info("Mark the auto-generated service account token as invalid", "invalidSince", invalidSince, "secret", klog.KRef(secret.Namespace, secret.Name)) patchContent, err := json.Marshal(applyv1.Secret(secret.Name, secret.Namespace).WithUID(secret.UID).WithLabels(map[string]string{serviceaccount.InvalidSinceLabelKey: invalidSince})) if err != nil { logger.Error(err, "Failed to marshal invalid since label") } else {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Oct 27 03:52:06 UTC 2023 - 10K bytes - Viewed (0) -
pkg/controller/serviceaccount/legacy_serviceaccount_token_cleaner_test.go
}, } } func patchContent(namespace, name, invalidSince string, uID types.UID) []byte { patch, _ := json.Marshal(applyv1.Secret(name, namespace).WithUID(uID).WithLabels(map[string]string{serviceaccount.InvalidSinceLabelKey: invalidSince})) return patch } func TestLegacyServiceAccountTokenCleanUp(t *testing.T) { testcases := map[string]struct {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Oct 27 03:52:06 UTC 2023 - 21.1K bytes - Viewed (0)