Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 24 for rootcert2 (0.17 sec)

  1. cmd/kubeadm/app/util/pkiutil/pki_helpers_test.go

    	}
    	defer os.RemoveAll(tmpdir)
    
    	rootCert2, rootKey2, err := NewCertificateAuthority(&CertConfig{
    		Config: certutil.Config{CommonName: "Root CA 2"},
    	})
    	if err != nil {
    		t.Errorf("failed to create root CA cert and key with an error: %v", err)
    	}
    
    	intCert2, intKey2, err := NewIntermediateCertificateAuthority(rootCert2, rootKey2, &CertConfig{
    		Config: certutil.Config{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jan 31 21:49:21 UTC 2024
    - 22.5K bytes
    - Viewed (0)
  2. security/pkg/pki/ca/ca_test.go

    	rootCert, err := util.ParsePemEncodedCertificate(rootCertBytes)
    	if err != nil {
    		t.Error(err)
    	}
    	// Root cert and siging cert are the same for self-signed CA.
    	if !rootCert.Equal(signingCert) {
    		t.Error("CA root cert does not match signing cert")
    	}
    
    	if ttl := rootCert.NotAfter.Sub(rootCert.NotBefore); ttl != caCertTTL {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Oct 31 08:51:27 UTC 2023
    - 29.1K bytes
    - Viewed (0)
  3. security/pkg/nodeagent/cache/secretcache.go

    	defer cancel()
    	if err := b.RetryWithContext(ctx, certValid); err != nil {
    		return nil, err
    	}
    
    	// Set the rootCert only if it is workload root cert.
    	if workload {
    		sc.cache.SetRoot(rootCert)
    	}
    	return &security.SecretItem{
    		ResourceName: resourceName,
    		RootCert:     rootCert,
    	}, nil
    }
    
    // Generate a key and certificate item from the existing key certificate files from the passed in file paths.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 04 08:29:46 UTC 2024
    - 28.2K bytes
    - Viewed (0)
  4. security/pkg/pki/ca/selfsignedcarootcertrotator.go

    			rootCerts, err := util.AppendRootCerts(caSecret.Data[CACertFile], rotator.config.rootCertFile)
    			if err != nil {
    				rootCertRotatorLog.Errorf("failed to append root certificates from file: %s", err.Error())
    				return
    			}
    
    			if err := rotator.ca.GetCAKeyCertBundle().VerifyAndSetAll(caSecret.Data[CACertFile],
    				caSecret.Data[CAPrivateKeyFile], nil, rootCerts); err != nil {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Nov 30 19:33:26 UTC 2023
    - 10.4K bytes
    - Viewed (0)
  5. security/pkg/pki/ca/ca.go

    			}
    
    			rootCerts, err := util.AppendRootCerts(pemCert, rootCertFile)
    			if err != nil {
    				pkiCaLog.Warnf("failed to append root certificates (%v)", err)
    				return fmt.Errorf("failed to append root certificates (%v)", err)
    			}
    			if caOpts.KeyCertBundle, err = util.NewVerifiedKeyCertBundleFromPem(pemCert, pemKey, nil, rootCerts); err != nil {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Nov 30 19:33:26 UTC 2023
    - 17.2K bytes
    - Viewed (0)
  6. security/pkg/nodeagent/cache/secretcache_test.go

    	if expectedSecret.ResourceName == security.RootCertReqResourceName || (ok && cfg.IsRootCertificate()) {
    		if !bytes.Equal(expectedSecret.RootCert, gotSecret.RootCert) {
    			t.Fatalf("root cert: expected %v but got %v", expectedSecret.RootCert,
    				gotSecret.RootCert)
    		}
    	} else {
    		if !bytes.Equal(expectedSecret.CertificateChain, gotSecret.CertificateChain) {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 16 22:12:28 UTC 2024
    - 23.9K bytes
    - Viewed (0)
  7. security/pkg/nodeagent/caclient/providers/citadel/client_test.go

    			CredFetcher: plugin.CreateTokenPlugin("testdata/token"),
    			ProvCert:    certDir,
    		}
    		rootCert := path.Join(certDir, constants.RootCertFilename)
    		key := path.Join(certDir, constants.KeyFilename)
    		cert := path.Join(certDir, constants.CertChainFilename)
    		tlsOpts := &TLSOptions{
    			RootCert: rootCert,
    			Key:      key,
    			Cert:     cert,
    		}
    		cli, err := NewCitadelClient(opts, tlsOpts)
    		if err != nil {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 24 21:03:23 UTC 2024
    - 11.8K bytes
    - Viewed (0)
  8. security/pkg/server/ca/server_test.go

    			SignedCert:    []byte("cert"),
    			KeyCertBundle: util.NewKeyCertBundleFromPem(nil, nil, []byte("cert_chain"), []byte("root_cert")),
    		},
    		Authenticators: []security.Authenticator{auth},
    		monitoring:     newMonitoringMetrics(),
    	}
    	mockCertChain := []string{"cert", "cert_chain", "root_cert"}
    	mockIPAddr := &net.IPAddr{IP: net.IPv4(192, 168, 1, 1)}
    	testCerts := map[string]struct {
    		certChain    [][]*x509.Certificate
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Feb 28 16:41:38 UTC 2024
    - 15.8K bytes
    - Viewed (0)
  9. security/pkg/nodeagent/sds/sdsservice_test.go

    	s.t.Helper()
    	s.store.Set(name, secret)
    	s.server.OnSecretUpdate(name)
    }
    
    type Expectation struct {
    	ResourceName string
    	CertChain    []byte
    	Key          []byte
    	RootCert     []byte
    }
    
    func (s *TestServer) extractPrivateKeyProvider(provider *tlsv3.PrivateKeyProvider) []byte {
    	var cmb cryptomb.CryptoMbPrivateKeyMethodConfig
    	provider.GetTypedConfig().UnmarshalTo(&cmb)
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jan 17 20:12:58 UTC 2024
    - 11.6K bytes
    - Viewed (0)
  10. pkg/adsc/adsc.go

    	XDSSAN string
    
    	// XDSRootCAFile explicitly set the root CA to be used for the XDS connection.
    	// Mirrors Envoy file.
    	XDSRootCAFile string
    
    	// RootCert contains the XDS root certificate. Used mainly for tests, apps will normally use
    	// XDSRootCAFile
    	RootCert []byte
    
    	// InsecureSkipVerify skips client verification the server's certificate chain and host name.
    	InsecureSkipVerify bool
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Feb 05 22:18:49 UTC 2024
    - 35K bytes
    - Viewed (0)
Back to top