- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 1,192 for setSet (0.12 sec)
-
pkg/controller/bootstrap/tokencleaner_test.go
} secret := newTokenSecret("tokenID", "tokenSecret") addSecretExpiration(secret, timeString(-time.Hour)) secrets.Informer().GetIndexer().Add(secret) cleaner.evalSecret(context.TODO(), secret) expected := []core.Action{ core.NewDeleteActionWithOptions( schema.GroupVersionResource{Version: "v1", Resource: "secrets"}, api.NamespaceSystem, secret.ObjectMeta.Name, metav1.DeleteOptions{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 14 00:05:53 UTC 2023 - 4.1K bytes - Viewed (0) -
pkg/kubelet/secret/fake_manager.go
func NewFakeManagerWithSecrets(secrets []*v1.Secret) Manager { return &fakeManager{ secrets: secrets, } } // GetSecret function returns the searched secret if it was provided during the manager initialization, otherwise, it returns an error. // If the manager was initialized without any secrets, it returns a nil secret."
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 11 09:33:14 UTC 2023 - 1.8K bytes - Viewed (0) -
pkg/serviceaccount/legacy.go
func (v *legacyValidator) patchSecretWithLastUsedDate(ctx context.Context, secret *v1.Secret) { now := time.Now().UTC() today := now.Format("2006-01-02") tomorrow := now.AddDate(0, 0, 1).Format("2006-01-02") lastUsed := secret.Labels[LastUsedLabelKey] if lastUsed != today && lastUsed != tomorrow { patchContent, err := json.Marshal(applyv1.Secret(secret.Name, secret.Namespace).WithUID(secret.UID).WithLabels(map[string]string{LastUsedLabelKey: today}))
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Nov 01 08:32:23 UTC 2023 - 8.4K bytes - Viewed (0) -
istioctl/pkg/writer/envoy/configdump/testdata/secret/config_dump.json
"dynamic_active_secrets": [ { "name": "default", "last_updated": "2023-05-15T01:32:52.262Z", "secret": { "@type": "type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.Secret", "name": "default", "tls_certificate": { "certificate_chain": {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 06 15:14:48 UTC 2023 - 5.4K bytes - Viewed (0) -
helm/minio/README.md
This label will be displayed in the output of a successful install. ### Existing secret Instead of having this chart create the secret for you, you can supply a preexisting secret, much like an existing PersistentVolumeClaim. First, create the secret: ```bash kubectl create secret generic my-minio-secret --from-literal=rootUser=foobarbaz --from-literal=rootPassword=foobarbazqux ```
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Wed Jan 24 07:27:57 UTC 2024 - 10.9K bytes - Viewed (0) -
pkg/controller/bootstrap/util.go
) func validateSecretForSigning(ctx context.Context, secret *v1.Secret) (tokenID, tokenSecret string, ok bool) { logger := klog.FromContext(ctx) nameTokenID, ok := bootstrapsecretutil.ParseName(secret.Name) if !ok { logger.V(3).Info("Invalid secret name, must be of the form "+bootstrapapi.BootstrapTokenSecretPrefix+"<secret-id>", "secretName", secret.Name) return "", "", false }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Mar 13 02:18:40 UTC 2023 - 2.2K bytes - Viewed (0) -
pilot/pkg/serviceregistry/kube/controller/multicluster_test.go
// Delete the first mulicluster secret. err = deleteMultiClusterSecret(clientset, "test-secret-1") if err != nil { t.Fatalf("Unexpected error on secret delete: %v", err) } // Test - Verify that the remote controller has been removed. verifyControllers(t, mc, 2, "delete remote controller 1") // Delete the second mulicluster secret. err = deleteMultiClusterSecret(clientset, "test-secret-2") if err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 12 16:44:32 UTC 2024 - 6.7K bytes - Viewed (0) -
istioctl/pkg/multicluster/remote_secret.go
return saName + "-istio-remote-secret-token" } func secretReferencesServiceAccount(serviceAccount *v1.ServiceAccount, secret *v1.Secret) error { if secret.Type != v1.SecretTypeServiceAccountToken || secret.Annotations[v1.ServiceAccountNameKey] != serviceAccount.Name { return fmt.Errorf("secret %s/%s does not reference ServiceAccount %s", secret.Namespace, secret.Name, serviceAccount.Name) } return nil }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Oct 11 01:43:17 UTC 2023 - 24K bytes - Viewed (0) -
pkg/controller/serviceaccount/tokens_controller.go
saUID types.UID } func makeSecretQueueKey(secret *v1.Secret) secretQueueKey { return secretQueueKey{ namespace: secret.Namespace, name: secret.Name, uid: secret.UID, saName: secret.Annotations[v1.ServiceAccountNameKey], saUID: types.UID(secret.Annotations[v1.ServiceAccountUIDKey]), } }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 20.5K bytes - Viewed (0) -
pilot/pkg/xds/sds.go
// and push skipping. This is because an secret potentially has a dependency on the same secret with or without // the -cacert suffix. By including this dependency we ensure we do not miss any updates. // This is important for cases where we have a compound secret. In this case, the `foo` secret may update,
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 15 23:04:36 UTC 2024 - 15.8K bytes - Viewed (0)