You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/concepts/storage/projected-volumes.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ volume mount will not receive updates for those volume sources.
73
73
74
74
## SecurityContext interactions
75
75
76
-
The [proposal](https://github.com/kubernetes/enhancements/tree/master/keps/sig-storage/2451-service-account-token-volumes#proposal) for file permission handling in projected service account volume enhancement introduced the projected files having the the correct owner permissions set.
76
+
The [proposal](https://git.k8s.io/enhancements/keps/sig-storage/2451-service-account-token-volumes#proposal) for file permission handling in projected service account volume enhancement introduced the projected files having the correct owner permissions set.
77
77
78
78
### Linux
79
79
@@ -99,6 +99,7 @@ into their own volume mount outside of `C:\`.
99
99
100
100
By default, the projected files will have the following ownership as shown for
| `has(self.expired) && self.created + self.ttl < self.expired` | Validate that 'expired' date is after a 'create' date plus a 'ttl' duration |
837
837
| `self.health.startsWith('ok')` | Validate a 'health' string field has the prefix 'ok' |
838
838
| `self.widgets.exists(w, w.key == 'x' && w.foo < 10)` | Validate that the 'foo' property of a listMap item with a key 'x' is less than 10 |
839
-
| `type(self) == string ? self == '100%' : self == 1000` | Validate an int-or-string field for both the the int and string cases |
839
+
| `type(self) == string ? self == '100%' : self == 1000` | Validate an int-or-string field for both the int and string cases |
840
840
| `self.metadata.name.startsWith(self.prefix)` | Validate that an object's name has the prefix of another field value |
841
841
| `self.set1.all(e, !(e in self.set2))` | Validate that two listSets are disjoint |
842
842
| `size(self.names) == size(self.details) && self.names.all(n, n in self.details)` | Validate the 'details' map is keyed by the items in the 'names' listSet |
843
843
| `size(self.clusters.filter(c, c.name == self.primary)) == 1` | Validate that the 'primary' property has one and only one occurrence in the 'clusters' listMap |
844
844
845
845
Xref: [Supported evaluation on CEL](https://github.com/google/cel-spec/blob/v0.6.0/doc/langdef.md#evaluation)
846
846
847
-
848
847
- If the Rule is scoped to the root of a resource, it may make field selection into any fields
849
848
declared in the OpenAPIv3 schema of the CRD as well as `apiVersion`, `kind`, `metadata.name` and
850
849
`metadata.generateName`. This includes selection of fields in both the `spec` and `status` in the
0 commit comments