- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 40 for certPem (0.2 sec)
-
security/pkg/pki/ca/ca_test.go
} if !bytes.Equal(caSecret.Data[CACertFile], CertPem) { t.Fatalf("CA cert does not match, want %v got %v", CertPem, caSecret.Data[CACertFile]) } if !bytes.Equal(caSecret.Data[CAPrivateKeyFile], KeyPem) { t.Fatalf("CA cert does not match, want %v got %v", KeyPem, caSecret.Data[CAPrivateKeyFile]) } serverSecret := BuildSecret(CACertsSecret, namespace, CertPem, KeyPem, nil, nil, nil, v1.SecretType(secretType))
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Oct 31 08:51:27 UTC 2023 - 29.1K bytes - Viewed (0) -
src/crypto/x509/root_unix_test.go
startComRoot, } var certDirs []string for i, certPEM := range rootPEMs { certDir := filepath.Join(tmpDir, fmt.Sprintf("cert-%d", i)) if err := os.MkdirAll(certDir, 0755); err != nil { t.Fatalf("Failed to create certificate dir: %v", err) } certOutFile := filepath.Join(certDir, "cert.crt") if err := os.WriteFile(certOutFile, []byte(certPEM), 0655); err != nil {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Mar 01 00:36:38 UTC 2023 - 6.1K bytes - Viewed (0) -
security/pkg/pki/util/generate_cert_test.go
expectedErr: "", expectedRootCert: []byte(certPem + "\n"), }, "Non empty pem cert": { pemCert: []byte(certPem), rootFile: "", expectedErr: "", expectedRootCert: []byte(certPem), }, "Non empty pem cert and non empty root file": { pemCert: []byte(certPem), rootFile: "../testdata/cert.pem", expectedErr: "",
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 06 12:48:53 UTC 2023 - 29.4K bytes - Viewed (0) -
security/pkg/k8s/chiron/utils.go
// First try to read the signed CSR through a watching mechanism certPEM, err := readSignedCsr(client, csr.Name, watchTimeout) if err != nil { return nil, nil, err } if len(certPEM) == 0 { return nil, nil, fmt.Errorf("no certificate returned for the CSR: %q", csr.Name) } certsParsed, _, err := util.ParsePemEncodedCertificateChain(certPEM) if err != nil { return nil, nil, fmt.Errorf("decoding certificate failed")
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 05 18:11:22 UTC 2024 - 9.2K bytes - Viewed (0) -
src/crypto/tls/example_test.go
-----END EC PRIVATE KEY-----`) cert, err := tls.X509KeyPair(certPem, keyPem) if err != nil { log.Fatal(err) } cfg := &tls.Config{Certificates: []tls.Certificate{cert}} listener, err := tls.Listen("tcp", ":2000", cfg) if err != nil { log.Fatal(err) } _ = listener } func ExampleX509KeyPair_httpServer() { certPem := []byte(`-----BEGIN CERTIFICATE-----
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Mar 27 18:23:49 UTC 2024 - 7.8K bytes - Viewed (0) -
security/tools/generate_cert/main.go
log.Fatalf("--mode=%v is incompatible with --signer-cert or --signer-priv.", citadelMode) } default: log.Fatalf("Unsupported mode %v", *mode) } } func saveCreds(certPem []byte, privPem []byte) { err := os.WriteFile(*outCert, certPem, 0o644) if err != nil { log.Fatalf("Could not write output certificate: %s.", err) } err = os.WriteFile(*outPriv, privPem, 0o600) if err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 28 16:21:30 UTC 2023 - 5.7K bytes - Viewed (0) -
tests/integration/pilot/testdata/forward-proxy/configmap.tmpl.yaml
kind: ConfigMap metadata: name: external-forward-proxy-config data: envoy.yaml: |- {{ .envoyYaml | indent 4 }} external-forward-proxy-key.pem: |- {{ .keyPem | indent 4 }} external-forward-proxy-cert.pem: |-
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Sep 07 13:42:37 UTC 2022 - 256 bytes - Viewed (0) -
security/pkg/nodeagent/test/mock/caserver.go
// CAServer is a mock CA server. type CAServer struct { pb.UnimplementedIstioCertificateServiceServer URL string GRPCServer *grpc.Server Authenticators []security.Authenticator certPem []byte keyPem []byte KeyCertBundle *util.KeyCertBundle certLifetime time.Duration rejectCSR bool emptyCert bool faultInjectLock *sync.Mutex }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 5.9K bytes - Viewed (0) -
pilot/pkg/keycertbundle/watcher.go
// limitations under the License. package keycertbundle import ( "os" "sync" ) // KeyCertBundle stores the cert, private key and root cert for istiod. type KeyCertBundle struct { CertPem []byte KeyPem []byte CABundle []byte } type Watcher struct { mutex sync.RWMutex bundle KeyCertBundle watcherID int32 watchers map[int32]chan struct{} }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jun 05 14:00:18 UTC 2023 - 2.6K bytes - Viewed (0) -
security/pkg/pki/util/keycertbundle.go
return fmt.Errorf("the cert does not match the key: %v", err) } return nil } func extractCertExpiryTimestamp(certType string, certPem []byte) (float64, error) { cert, err := ParsePemEncodedCertificate(certPem) if err != nil { return -1, fmt.Errorf("failed to parse the %s: %v", certType, err) } end := cert.NotAfter expiryTimestamp := float64(end.Unix())
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Jan 21 06:07:50 UTC 2024 - 10.5K bytes - Viewed (0)