Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 29 for certRoot (0.33 sec)

  1. security/pkg/nodeagent/cache/secretcache.go

    }
    
    type secretCache struct {
    	mu       sync.RWMutex
    	workload *security.SecretItem
    	certRoot []byte
    }
    
    // GetRoot returns cached root cert and cert expiration time. This method is thread safe.
    func (s *secretCache) GetRoot() (rootCert []byte) {
    	s.mu.RLock()
    	defer s.mu.RUnlock()
    	return s.certRoot
    }
    
    // SetRoot sets root cert into cache. This method is thread safe.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 04 08:29:46 UTC 2024
    - 28.2K bytes
    - Viewed (0)
  2. pkg/test/echo/server/forwarder/config.go

    	}
    	if r.InsecureSkipVerify || r.CaCert == "" {
    		tlsConfig.InsecureSkipVerify = true
    	} else if r.CaCert != "" {
    		certPool := x509.NewCertPool()
    		if !certPool.AppendCertsFromPEM([]byte(r.CaCert)) {
    			return nil, fmt.Errorf("failed to create cert pool")
    		}
    		tlsConfig.RootCAs = certPool
    	}
    
    	setALPNForHTTP := func() {
    		if r.Alpn == nil {
    			switch {
    			case r.Http3:
    				// Do nothing.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sun Oct 08 09:39:20 UTC 2023
    - 9.8K bytes
    - Viewed (0)
  3. pkg/spiffe/spiffe.go

    type PeerCertVerifier struct {
    	generalCertPool *x509.CertPool
    	certPools       map[string]*x509.CertPool
    }
    
    // NewPeerCertVerifier returns a new PeerCertVerifier.
    func NewPeerCertVerifier() *PeerCertVerifier {
    	return &PeerCertVerifier{
    		generalCertPool: x509.NewCertPool(),
    		certPools:       make(map[string]*x509.CertPool),
    	}
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 11.1K bytes
    - Viewed (0)
  4. istioctl/pkg/kubeinject/kubeinject.go

    	var address string
    	if cc.URL != nil {
    		address = *cc.URL
    	}
    	var certPool *x509.CertPool
    	if len(cc.CABundle) > 0 {
    		certPool = x509.NewCertPool()
    		certPool.AppendCertsFromPEM(cc.CABundle)
    	} else {
    		var err error
    		certPool, err = x509.SystemCertPool()
    		if err != nil {
    			return nil, err
    		}
    	}
    	tlsClientConfig := &tls.Config{RootCAs: certPool, MinVersion: tls.VersionTLS12}
    	client := http.Client{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Mar 29 02:29:02 UTC 2024
    - 21.6K bytes
    - Viewed (0)
  5. staging/src/k8s.io/apiserver/pkg/server/egressselector/egress_selector.go

    	if err != nil {
    		return nil, fmt.Errorf("failed to read key pair %s & %s, got %v", clientCert, clientKey, err)
    	}
    	certPool := x509.NewCertPool()
    	if caCert != "" {
    		certBytes, err := os.ReadFile(caCert)
    		if err != nil {
    			return nil, fmt.Errorf("failed to read cert file %s, got %v", caCert, err)
    		}
    		ok := certPool.AppendCertsFromPEM(certBytes)
    		if !ok {
    			return nil, fmt.Errorf("failed to append CA cert to the cert pool")
    		}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jun 29 15:48:39 UTC 2023
    - 12.5K bytes
    - Viewed (0)
  6. api/go1.19.txt

    pkg crypto/x509, func ParseRevocationList([]uint8) (*RevocationList, error) #50674
    pkg crypto/x509, method (*CertPool) Clone() *CertPool #35044
    pkg crypto/x509, method (*CertPool) Equal(*CertPool) bool #46057
    pkg crypto/x509, method (*RevocationList) CheckSignatureFrom(*Certificate) error #50674
    pkg crypto/x509, type RevocationList struct, AuthorityKeyId []uint8 #50674
    pkg crypto/x509, type RevocationList struct, Extensions []pkix.Extension #50674
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Dec 02 16:29:41 UTC 2022
    - 17.9K bytes
    - Viewed (0)
  7. src/net/http/httptest/server.go

    	if err != nil {
    		panic(fmt.Sprintf("httptest: NewTLSServer: %v", err))
    	}
    	certpool := x509.NewCertPool()
    	certpool.AddCert(s.certificate)
    	s.client.Transport = &http.Transport{
    		TLSClientConfig: &tls.Config{
    			RootCAs: certpool,
    		},
    		ForceAttemptHTTP2: s.EnableHTTP2,
    	}
    	s.Listener = tls.NewListener(s.Listener, s.TLS)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri May 10 17:26:10 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  8. src/crypto/tls/boring_test.go

    	L2_I := boringCert(t, "L2_I", boringRSAKey(t, 1024), I_R1, boringCertLeaf)
    
    	// client verifying server cert
    	testServerCert := func(t *testing.T, desc string, pool *x509.CertPool, key interface{}, list [][]byte, ok bool) {
    		clientConfig := testConfig.Clone()
    		clientConfig.RootCAs = pool
    		clientConfig.InsecureSkipVerify = false
    		clientConfig.ServerName = "example.com"
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:45:37 UTC 2024
    - 19.4K bytes
    - Viewed (0)
  9. docs/em/docs/deployment/concepts.md

    & 📤 ✔️ 🕳 🈚 **♻ 🇺🇸🔍 📄**, ⚫️ 💪 🎏 🦲 ⚖️ ⚫️ 💪 🕳 🎏.
    
    ### 🖼 🧰 🇺🇸🔍
    
    🧰 👆 💪 ⚙️ 🤝 ❎ 🗳:
    
    * Traefik
        * 🔁 🍵 📄 🔕 👶
    * 📥
        * 🔁 🍵 📄 🔕 👶
    * 👌
        * ⏮️ 🔢 🦲 💖 Certbot 📄 🔕
    * ✳
        * ⏮️ 🔢 🦲 💖 Certbot 📄 🔕
    * Kubernetes ⏮️ 🚧 🕹 💖 👌
        * ⏮️ 🔢 🦲 💖 🛂-👨‍💼 📄 🔕
    * 🍵 🔘 ☁ 🐕‍🦺 🍕 👫 🐕‍🦺 (✍ 🔛 👶)
    
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Thu Apr 18 19:53:19 UTC 2024
    - 14.5K bytes
    - Viewed (0)
  10. docs/ru/docs/deployment/concepts.md

    * Traefik
        * С автоматическим обновлением сертификатов ✨
    * Caddy
        * С автоматическим обновлением сертификатов ✨
    * Nginx
        * С дополнительным компонентом типа Certbot для обновления сертификатов
    * HAProxy
        * С дополнительным компонентом типа Certbot для обновления сертификатов
    * Kubernetes с Ingress Controller похожим на Nginx
        * С дополнительным компонентом типа cert-manager для обновления сертификатов
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Thu Apr 18 19:53:19 UTC 2024
    - 32.5K bytes
    - Viewed (0)
Back to top