- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 24 for rootcert2 (0.17 sec)
-
cmd/kubeadm/app/util/pkiutil/pki_helpers_test.go
} defer os.RemoveAll(tmpdir) rootCert2, rootKey2, err := NewCertificateAuthority(&CertConfig{ Config: certutil.Config{CommonName: "Root CA 2"}, }) if err != nil { t.Errorf("failed to create root CA cert and key with an error: %v", err) } intCert2, intKey2, err := NewIntermediateCertificateAuthority(rootCert2, rootKey2, &CertConfig{ Config: certutil.Config{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 31 21:49:21 UTC 2024 - 22.5K bytes - Viewed (0) -
security/pkg/pki/ca/ca_test.go
rootCert, err := util.ParsePemEncodedCertificate(rootCertBytes) if err != nil { t.Error(err) } // Root cert and siging cert are the same for self-signed CA. if !rootCert.Equal(signingCert) { t.Error("CA root cert does not match signing cert") } if ttl := rootCert.NotAfter.Sub(rootCert.NotBefore); ttl != caCertTTL {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Oct 31 08:51:27 UTC 2023 - 29.1K bytes - Viewed (0) -
security/pkg/nodeagent/cache/secretcache.go
defer cancel() if err := b.RetryWithContext(ctx, certValid); err != nil { return nil, err } // Set the rootCert only if it is workload root cert. if workload { sc.cache.SetRoot(rootCert) } return &security.SecretItem{ ResourceName: resourceName, RootCert: rootCert, }, nil } // Generate a key and certificate item from the existing key certificate files from the passed in file paths.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 04 08:29:46 UTC 2024 - 28.2K bytes - Viewed (0) -
security/pkg/pki/ca/selfsignedcarootcertrotator.go
rootCerts, err := util.AppendRootCerts(caSecret.Data[CACertFile], rotator.config.rootCertFile) if err != nil { rootCertRotatorLog.Errorf("failed to append root certificates from file: %s", err.Error()) return } if err := rotator.ca.GetCAKeyCertBundle().VerifyAndSetAll(caSecret.Data[CACertFile], caSecret.Data[CAPrivateKeyFile], nil, rootCerts); err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Nov 30 19:33:26 UTC 2023 - 10.4K bytes - Viewed (0) -
security/pkg/pki/ca/ca.go
} rootCerts, err := util.AppendRootCerts(pemCert, rootCertFile) if err != nil { pkiCaLog.Warnf("failed to append root certificates (%v)", err) return fmt.Errorf("failed to append root certificates (%v)", err) } if caOpts.KeyCertBundle, err = util.NewVerifiedKeyCertBundleFromPem(pemCert, pemKey, nil, rootCerts); err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Nov 30 19:33:26 UTC 2023 - 17.2K bytes - Viewed (0) -
security/pkg/nodeagent/cache/secretcache_test.go
if expectedSecret.ResourceName == security.RootCertReqResourceName || (ok && cfg.IsRootCertificate()) { if !bytes.Equal(expectedSecret.RootCert, gotSecret.RootCert) { t.Fatalf("root cert: expected %v but got %v", expectedSecret.RootCert, gotSecret.RootCert) } } else { if !bytes.Equal(expectedSecret.CertificateChain, gotSecret.CertificateChain) {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 16 22:12:28 UTC 2024 - 23.9K bytes - Viewed (0) -
security/pkg/nodeagent/caclient/providers/citadel/client_test.go
CredFetcher: plugin.CreateTokenPlugin("testdata/token"), ProvCert: certDir, } rootCert := path.Join(certDir, constants.RootCertFilename) key := path.Join(certDir, constants.KeyFilename) cert := path.Join(certDir, constants.CertChainFilename) tlsOpts := &TLSOptions{ RootCert: rootCert, Key: key, Cert: cert, } cli, err := NewCitadelClient(opts, tlsOpts) if err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 24 21:03:23 UTC 2024 - 11.8K bytes - Viewed (0) -
security/pkg/server/ca/server_test.go
SignedCert: []byte("cert"), KeyCertBundle: util.NewKeyCertBundleFromPem(nil, nil, []byte("cert_chain"), []byte("root_cert")), }, Authenticators: []security.Authenticator{auth}, monitoring: newMonitoringMetrics(), } mockCertChain := []string{"cert", "cert_chain", "root_cert"} mockIPAddr := &net.IPAddr{IP: net.IPv4(192, 168, 1, 1)} testCerts := map[string]struct { certChain [][]*x509.Certificate
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Feb 28 16:41:38 UTC 2024 - 15.8K bytes - Viewed (0) -
security/pkg/nodeagent/sds/sdsservice_test.go
s.t.Helper() s.store.Set(name, secret) s.server.OnSecretUpdate(name) } type Expectation struct { ResourceName string CertChain []byte Key []byte RootCert []byte } func (s *TestServer) extractPrivateKeyProvider(provider *tlsv3.PrivateKeyProvider) []byte { var cmb cryptomb.CryptoMbPrivateKeyMethodConfig provider.GetTypedConfig().UnmarshalTo(&cmb)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 17 20:12:58 UTC 2024 - 11.6K bytes - Viewed (0) -
pkg/adsc/adsc.go
XDSSAN string // XDSRootCAFile explicitly set the root CA to be used for the XDS connection. // Mirrors Envoy file. XDSRootCAFile string // RootCert contains the XDS root certificate. Used mainly for tests, apps will normally use // XDSRootCAFile RootCert []byte // InsecureSkipVerify skips client verification the server's certificate chain and host name. InsecureSkipVerify bool
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Feb 05 22:18:49 UTC 2024 - 35K bytes - Viewed (0)