- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for tls (0.17 sec)
-
common-protos/k8s.io/api/networking/v1beta1/generated.proto
// +optional optional IngressBackend backend = 1; // tls represents the TLS configuration. Currently the Ingress only supports a // single TLS port, 443. If multiple members of this list specify different hosts, // they will be multiplexed on the same port according to the hostname specified // through the SNI TLS extension, if the ingress controller fulfilling the // ingress supports SNI. // +optional
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 14.9K bytes - Viewed (0) -
common-protos/k8s.io/api/certificates/v1/generated.proto
optional int32 expirationSeconds = 8; // usages specifies a set of key usages requested in the issued certificate. // // Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth". // // Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth". // // Valid values are:
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 11.6K bytes - Viewed (0) -
common-protos/k8s.io/api/admissionregistration/v1beta1/generated.proto
// List of ValidatingWebhookConfiguration. repeated ValidatingWebhookConfiguration items = 2; } // WebhookClientConfig contains the information to make a TLS // connection with the webhook message WebhookClientConfig { // `url` gives the location of the webhook, in standard URL form // (`scheme://host:port/path`). Exactly one of `url` or `service` // must be specified.
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 22.6K bytes - Viewed (0) -
common-protos/k8s.io/api/extensions/v1beta1/generated.proto
// TLS configuration. Currently the Ingress only supports a single TLS // port, 443. If multiple members of this list specify different hosts, they // will be multiplexed on the same port according to the hostname specified // through the SNI TLS extension, if the ingress controller fulfilling the // ingress supports SNI. // +optional repeated IngressTLS tls = 2;
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 45.6K bytes - Viewed (0) -
common-protos/k8s.io/api/networking/v1/generated.proto
// +optional optional IngressBackend defaultBackend = 1; // tls represents the TLS configuration. Currently the Ingress only supports a // single TLS port, 443. If multiple members of this list specify different hosts, // they will be multiplexed on the same port according to the hostname specified // through the SNI TLS extension, if the ingress controller fulfilling the // ingress supports SNI.
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 25.2K bytes - Viewed (0) -
common-protos/k8s.io/api/admissionregistration/v1/generated.proto
// List of ValidatingWebhookConfiguration. repeated ValidatingWebhookConfiguration items = 2; } // WebhookClientConfig contains the information to make a TLS // connection with the webhook message WebhookClientConfig { // `url` gives the location of the webhook, in standard URL form // (`scheme://host:port/path`). Exactly one of `url` or `service` // must be specified.
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 24.4K bytes - Viewed (0) -
common-protos/k8s.io/api/core/v1/generated.proto
// and the backend insecure. This means the apiserver cannot verify the log data it is receiving came from the real // kubelet. If the kubelet is configured to verify the apiserver's TLS credentials, it does not mean the // connection to the real kubelet is vulnerable to a man in the middle attack (e.g. an attacker could not intercept // the actual log data coming from the real kubelet). // +optional
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 255.8K bytes - Viewed (0)