Skip to content

Instantly share code, notes, and snippets.

View mjudeikis's full-sized avatar
👽
Brewing something new...

Mangirdas Judeikis mjudeikis

👽
Brewing something new...
View GitHub Profile
package main
import (
"bufio"
"os"
"time"
tm "github.com/buger/goterm"
"github.com/sirupsen/logrus"
"github.com/chbmuc/cec")
diff --git a/pkg/apis/hive/v1alpha1/validating-webhooks/clusterdeployment_validating_admission_hook.go b/pkg/apis/hive/v1alpha1/validating-webhooks/clusterdeployment_validating_admission_hook.go
index 0c2b03a8..00fcaef8 100644
--- a/pkg/apis/hive/v1alpha1/validating-webhooks/clusterdeployment_validating_admission_hook.go
+++ b/pkg/apis/hive/v1alpha1/validating-webhooks/clusterdeployment_validating_admission_hook.go
@@ -268,6 +268,7 @@ func (a *ClusterDeploymentValidatingAdmissionHook) validateCreate(admissionSpec
}
if newObject.Spec.Platform.GCP != nil {
numberOfPlatforms++
+ canManageDNS = true
if newObject.Spec.PlatformSecrets.GCP == nil {
@mjudeikis
mjudeikis / gist:5e46f33673d2a9d1df95668f06d9591f
Last active October 16, 2019 16:49
test private-link dialer
package main
import (
"bufio"
"crypto/tls"
"crypto/x509"
"fmt"
"io/ioutil"
"net"
"net/http"
[mjudeiki@localhost openshift-azure]$ oc get scc
NAME PRIV CAPS SELINUX RUNASUSER FSGROUP SUPGROUP PRIORITY READONLYROOTFS VOLUMES
anyuid false [] MustRunAs RunAsAny RunAsAny RunAsAny 10 false [configMap downwardAPI emptyDir persistentVolumeClaim projected secret]
hostaccess false [] MustRunAs MustRunAsRange MustRunAs RunAsAny <none> false [configMap downwardAPI emptyDir hostPath persistentVolumeClaim projected secret]
hostmount-anyuid false [] MustRunAs RunAsAny RunAsAny RunAsAny <none> false [configMap downwardAPI emptyDir hostPath nfs persistentVolumeClaim projected secret]
hostnetwork false [] MustRunAs MustRunAsRange MustRunAs MustRunAs <none> false [configMap downwardAPI emptyDir persistentVolumeClaim projected secret]
kube-state-metrics false []
### Keybase proof
I hereby claim:
* I am mjudeikis on github.
* I am mjudeikis (https://keybase.io/mjudeikis) on keybase.
* I have a public key ASDq6j3_2N-3sFwGsUPtMrT-mYNPbR1AR1CvvbsdjIWbawo
To claim this, I am signing this object:
### Keybase proof
I hereby claim:
* I am mjudeikis on github.
* I am mjudeikis (https://keybase.io/mjudeikis) on keybase.
* I have a public key ASDq6j3_2N-3sFwGsUPtMrT-mYNPbR1AR1CvvbsdjIWbawo
To claim this, I am signing this object:
### Keybase proof
I hereby claim:
* I am mjudeikis on github.
* I am mjudeikis (https://keybase.io/mjudeikis) on keybase.
* I have a public key ASDq6j3_2N-3sFwGsUPtMrT-mYNPbR1AR1CvvbsdjIWbawo
To claim this, I am signing this object:
---
title: Managing Resources | Microsoft Docs
description: Managing projects, templates, image-streams.
services: openshift
keywords: red hat openshift projects requests self-provisioner
author: mjudeikis
ms.author: b-majude
ms.date: 07/19/2019
ms.topic: conceptual
ms.service: container-service
package v1alpha1
import (
rbacv1 "k8s.io/api/rbac/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
)
// NamespacePermissionSpec defines the desired state of NamespacePermission
// +k8s:openapi-gen=true
type NamespacePermissionSpec struct {
apiVersion: v1
kind: Pod
metadata:
labels:
run: foo
name: foo
namespace: default
spec:
containers:
- args: