- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 799 for configMaps (0.25 sec)
-
pkg/controlplane/controller/legacytokentracking/controller.go
return err } } else { configMap := obj.(*corev1.ConfigMap) if _, err = time.Parse(dateFormat, configMap.Data[ConfigMapDataKey]); err != nil { configMap := configMap.DeepCopy() if configMap.Data == nil { configMap.Data = map[string]string{} } configMap.Data[ConfigMapDataKey] = now.UTC().Format(dateFormat)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 6K bytes - Viewed (0) -
cluster/gce/gci/audit_policy_test.go
sysEndpoints = resource("endpoints", "kube-system") services = resource("services", "default") serviceStatus = resource("services", "default", "", "status") configmaps = resource("configmaps", "default") sysConfigmaps = resource("configmaps", "kube-system") namespaces = resource("namespaces") namespaceStatus = resource("namespaces", "", "", "status") namespaceFinal = resource("namespaces", "", "", "finalize")
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Oct 30 06:23:50 UTC 2021 - 9.8K bytes - Viewed (0) -
cmd/kubeadm/app/util/apiclient/idempotency.go
ctx := context.Background() configMap, err := client.CoreV1().ConfigMaps(meta.Namespace).Get(ctx, meta.Name, metav1.GetOptions{}) if err != nil { return errors.Wrap(err, "unable to get ConfigMap") } if err = mutator(configMap); err != nil { return errors.Wrap(err, "unable to mutate ConfigMap") } _, err = client.CoreV1().ConfigMaps(configMap.ObjectMeta.Namespace).Update(ctx, configMap, metav1.UpdateOptions{})
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 18 11:14:32 UTC 2024 - 18.4K bytes - Viewed (0) -
cluster/gce/addons/loadbalancing/cloud-provider-role.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: labels: addonmanager.kubernetes.io/mode: Reconcile name: gce:cloud-provider namespace: kube-system rules: - apiGroups: - "" resources: - configmaps verbs: - create - get - patch - update - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: labels:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jan 28 23:02:19 UTC 2020 - 1.5K bytes - Viewed (0) -
cluster/addons/rbac/cluster-autoscaler/cluster-autoscaler-rbac.yaml
verbs: ["get", "list", "watch"] # misc access - apiGroups: [""] resources: ["events"] verbs: ["create", "update", "patch"] - apiGroups: [""] resources: ["configmaps"] verbs: ["create"] - apiGroups: [""] resources: ["configmaps"] resourceNames: ["cluster-autoscaler-status"] verbs: ["get", "update", "patch", "delete"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 12 16:56:45 UTC 2020 - 2K bytes - Viewed (0) -
cmd/kubeadm/app/phases/bootstraptoken/clusterinfo/clusterinfo.go
BootstrapSignerClusterRoleName = "kubeadm:bootstrap-signer-clusterinfo" ) // CreateBootstrapConfigMapIfNotExists creates the kube-public ConfigMap if it doesn't exist already func CreateBootstrapConfigMapIfNotExists(client clientset.Interface, file string) error {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 17 14:40:46 UTC 2021 - 3.9K bytes - Viewed (0) -
cluster/addons/calico-policy-controller/calico-clusterrole.yaml
- apiGroups: [""] resources: - pods - nodes - namespaces verbs: - get # calico/node checks configmaps for cluster CIDR. - apiGroups: [""] resources: - configmaps verbs: - get - apiGroups: [""] resources: - endpoints - services verbs: # Used to discover service IPs for advertisement.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Aug 26 02:52:06 UTC 2020 - 3.3K bytes - Viewed (0) -
pkg/registry/admissionregistration/validatingadmissionpolicybinding/authz_test.go
ParamKind: &admissionregistration.ParamKind{Kind: "ConfigMap", APIVersion: "v1"}, }, }, nil }, resourceResolver: func(gvk schema.GroupVersionKind) (schema.GroupVersionResource, error) { return schema.GroupVersionResource{ Group: "", Version: "v1", Resource: "configmaps", }, nil }, expectErr: false, }, { name: "denied",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jul 20 16:30:09 UTC 2023 - 5.7K bytes - Viewed (0) -
pkg/kube/krt/singleton_test.go
c := kube.NewFakeClient() ConfigMaps := krt.NewInformer[*corev1.ConfigMap](c) stop := test.NewStop(t) c.RunAndWait(stop) cmt := clienttest.NewWriter[*corev1.ConfigMap](t, c) ConfigMapNames := krt.NewSingleton[string]( func(ctx krt.HandlerContext) *string { cms := krt.Fetch(ctx, ConfigMaps) return ptr.Of(slices.Join(",", slices.Map(cms, func(c *corev1.ConfigMap) string { return config.NamespacedName(c).String()
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 11 08:27:29 UTC 2024 - 2.9K bytes - Viewed (0) -
cluster/addons/dns-horizontal-autoscaler/dns-horizontal-autoscaler.yaml
verbs: ["get", "update"] - apiGroups: ["apps"] resources: ["deployments/scale", "replicasets/scale"] verbs: ["get", "update"] # Remove the configmaps rule once below issue is fixed: # kubernetes-incubator/cluster-proportional-autoscaler#16 - apiGroups: [""] resources: ["configmaps"] verbs: ["get", "create"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 31 14:16:53 UTC 2022 - 3.3K bytes - Viewed (0)