- Sort Score
- Result 10 results
- Languages All
Results 1 - 8 of 8 for SNICerts (0.14 sec)
-
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/named_certificates.go
nameToCertificate := map[string]*tls.Certificate{} byNameExplicit := map[string]*tls.Certificate{} // Iterate backwards so that earlier certs take precedence in the names map for i := len(sniCerts) - 1; i >= 0; i-- { cert, err := tls.X509KeyPair(sniCerts[i].cert, sniCerts[i].key) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jul 21 07:29:30 UTC 2022 - 3.2K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/server_test.go
certProvider, err := createTestTLSCerts(certSpec, names) if err != nil { t.Fatal(err) } sniCerts = append(sniCerts, certProvider) } dynamicCertificateController := NewDynamicServingCertificateController( tlsConfig, &nullCAContent{name: "client-ca"}, defaultCertProvider, sniCerts, nil, // TODO see how to plumb an event recorder down in here. For now this results in simply klog messages. )
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 12 18:29:15 UTC 2021 - 6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/tlsconfig_test.go
clientCA CAContentProvider servingCert CertKeyContentProvider sniCerts []SNICertKeyContentProvider expected *dynamicCertificateContent expectedErr string }{ { name: "filled", clientCA: &staticCAContent{name: "test-ca", caBundle: &caBundleAndVerifier{caBundle: []byte("content-1")}}, servingCert: testCertProvider, sniCerts: []SNICertKeyContentProvider{testCertProvider},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 14 00:05:53 UTC 2023 - 5.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/client_ca.go
} if !c.clientCA.Equal(&rhs.clientCA) { return false } if !c.servingCert.Equal(&rhs.servingCert) { return false } if len(c.sniCerts) != len(rhs.sniCerts) { return false } for i := range c.sniCerts { if !c.sniCerts[i].Equal(&rhs.sniCerts[i]) { return false } } return true } func (c *caBundleContent) Equal(rhs *caBundleContent) bool { if c == nil || rhs == nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 12 18:29:15 UTC 2021 - 1.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/serving_with_loopback.go
return fmt.Errorf("failed to generate self-signed certificate for loopback connection: %v", err) } // Write to the front of SNICerts so that this overrides any other certs with the same name (*secureServingInfo).SNICerts = append([]dynamiccertificates.SNICertKeyContentProvider{certProvider}, (*secureServingInfo).SNICerts...) secureLoopbackClientConfig, err := (*secureServingInfo).NewLoopbackClientConfig(uuid.New().String(), certPem) switch {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 23 00:50:06 UTC 2021 - 2.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/named_certificates_test.go
continue NextTest } bySignature[sig] = j } c := DynamicServingCertificateController{sniCerts: sniCerts} content, err := c.newTLSContent() assert.NoError(t, err) certMap, err := c.BuildNamedCertificates(content.sniCerts) if err == nil && len(test.errorString) != 0 { t.Errorf("%d - expected no error, got: %v", i, err)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Aug 20 08:42:09 UTC 2021 - 8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/serving_with_loopback_test.go
t.Errorf("unexpected error: %v", err) } if loopbackClientConfig == nil { t.Errorf("unexpected empty loopbackClientConfig") } if e, a := 1, len(secureServingInfo.SNICerts); e != a { t.Errorf("expected %d SNICert, got %d", e, a) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Aug 20 08:42:09 UTC 2021 - 1.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/config_selfclient.go
const LoopbackClientServerNameOverride = "apiserver-loopback-client" func (s *SecureServingInfo) NewClientConfig(caCert []byte) (*restclient.Config, error) { if s == nil || (s.Cert == nil && len(s.SNICerts) == 0) { return nil, nil } host, port, err := LoopbackHostPort(s.Listener.Addr().String()) if err != nil { return nil, err } return &restclient.Config{ // Do not limit loopback client QPS.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 23 00:06:34 UTC 2021 - 3.1K bytes - Viewed (0)