Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 8 of 8 for SNICerts (0.14 sec)

  1. staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/named_certificates.go

    	nameToCertificate := map[string]*tls.Certificate{}
    	byNameExplicit := map[string]*tls.Certificate{}
    
    	// Iterate backwards so that earlier certs take precedence in the names map
    	for i := len(sniCerts) - 1; i >= 0; i-- {
    		cert, err := tls.X509KeyPair(sniCerts[i].cert, sniCerts[i].key)
    		if err != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jul 21 07:29:30 UTC 2022
    - 3.2K bytes
    - Viewed (0)
  2. staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/server_test.go

    		certProvider, err := createTestTLSCerts(certSpec, names)
    		if err != nil {
    			t.Fatal(err)
    		}
    		sniCerts = append(sniCerts, certProvider)
    	}
    
    	dynamicCertificateController := NewDynamicServingCertificateController(
    		tlsConfig,
    		&nullCAContent{name: "client-ca"},
    		defaultCertProvider,
    		sniCerts,
    		nil, // TODO see how to plumb an event recorder down in here. For now this results in simply klog messages.
    	)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Apr 12 18:29:15 UTC 2021
    - 6K bytes
    - Viewed (0)
  3. staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/tlsconfig_test.go

    		clientCA    CAContentProvider
    		servingCert CertKeyContentProvider
    		sniCerts    []SNICertKeyContentProvider
    
    		expected    *dynamicCertificateContent
    		expectedErr string
    	}{
    		{
    			name:        "filled",
    			clientCA:    &staticCAContent{name: "test-ca", caBundle: &caBundleAndVerifier{caBundle: []byte("content-1")}},
    			servingCert: testCertProvider,
    			sniCerts:    []SNICertKeyContentProvider{testCertProvider},
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Apr 14 00:05:53 UTC 2023
    - 5.3K bytes
    - Viewed (0)
  4. staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/client_ca.go

    	}
    
    	if !c.clientCA.Equal(&rhs.clientCA) {
    		return false
    	}
    
    	if !c.servingCert.Equal(&rhs.servingCert) {
    		return false
    	}
    
    	if len(c.sniCerts) != len(rhs.sniCerts) {
    		return false
    	}
    
    	for i := range c.sniCerts {
    		if !c.sniCerts[i].Equal(&rhs.sniCerts[i]) {
    			return false
    		}
    	}
    
    	return true
    }
    
    func (c *caBundleContent) Equal(rhs *caBundleContent) bool {
    	if c == nil || rhs == nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Apr 12 18:29:15 UTC 2021
    - 1.6K bytes
    - Viewed (0)
  5. staging/src/k8s.io/apiserver/pkg/server/options/serving_with_loopback.go

    		return fmt.Errorf("failed to generate self-signed certificate for loopback connection: %v", err)
    	}
    
    	// Write to the front of SNICerts so that this overrides any other certs with the same name
    	(*secureServingInfo).SNICerts = append([]dynamiccertificates.SNICertKeyContentProvider{certProvider}, (*secureServingInfo).SNICerts...)
    
    	secureLoopbackClientConfig, err := (*secureServingInfo).NewLoopbackClientConfig(uuid.New().String(), certPem)
    	switch {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Apr 23 00:50:06 UTC 2021
    - 2.8K bytes
    - Viewed (0)
  6. staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/named_certificates_test.go

    				continue NextTest
    			}
    			bySignature[sig] = j
    		}
    
    		c := DynamicServingCertificateController{sniCerts: sniCerts}
    		content, err := c.newTLSContent()
    		assert.NoError(t, err)
    
    		certMap, err := c.BuildNamedCertificates(content.sniCerts)
    		if err == nil && len(test.errorString) != 0 {
    			t.Errorf("%d - expected no error, got: %v", i, err)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Aug 20 08:42:09 UTC 2021
    - 8K bytes
    - Viewed (0)
  7. staging/src/k8s.io/apiserver/pkg/server/options/serving_with_loopback_test.go

    		t.Errorf("unexpected error: %v", err)
    	}
    	if loopbackClientConfig == nil {
    		t.Errorf("unexpected empty loopbackClientConfig")
    	}
    	if e, a := 1, len(secureServingInfo.SNICerts); e != a {
    		t.Errorf("expected %d SNICert, got %d", e, a)
    	}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Aug 20 08:42:09 UTC 2021
    - 1.4K bytes
    - Viewed (0)
  8. staging/src/k8s.io/apiserver/pkg/server/config_selfclient.go

    const LoopbackClientServerNameOverride = "apiserver-loopback-client"
    
    func (s *SecureServingInfo) NewClientConfig(caCert []byte) (*restclient.Config, error) {
    	if s == nil || (s.Cert == nil && len(s.SNICerts) == 0) {
    		return nil, nil
    	}
    
    	host, port, err := LoopbackHostPort(s.Listener.Addr().String())
    	if err != nil {
    		return nil, err
    	}
    
    	return &restclient.Config{
    		// Do not limit loopback client QPS.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Apr 23 00:06:34 UTC 2021
    - 3.1K bytes
    - Viewed (0)
Back to top