Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 40 for certPem (0.2 sec)

  1. security/pkg/pki/ca/ca_test.go

    	}
    	if !bytes.Equal(caSecret.Data[CACertFile], CertPem) {
    		t.Fatalf("CA cert does not match, want %v got %v", CertPem, caSecret.Data[CACertFile])
    	}
    	if !bytes.Equal(caSecret.Data[CAPrivateKeyFile], KeyPem) {
    		t.Fatalf("CA cert does not match, want %v got %v", KeyPem, caSecret.Data[CAPrivateKeyFile])
    	}
    	serverSecret := BuildSecret(CACertsSecret, namespace, CertPem, KeyPem, nil, nil, nil, v1.SecretType(secretType))
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Oct 31 08:51:27 UTC 2023
    - 29.1K bytes
    - Viewed (0)
  2. src/crypto/x509/root_unix_test.go

    		startComRoot,
    	}
    
    	var certDirs []string
    	for i, certPEM := range rootPEMs {
    		certDir := filepath.Join(tmpDir, fmt.Sprintf("cert-%d", i))
    		if err := os.MkdirAll(certDir, 0755); err != nil {
    			t.Fatalf("Failed to create certificate dir: %v", err)
    		}
    		certOutFile := filepath.Join(certDir, "cert.crt")
    		if err := os.WriteFile(certOutFile, []byte(certPEM), 0655); err != nil {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Mar 01 00:36:38 UTC 2023
    - 6.1K bytes
    - Viewed (0)
  3. security/pkg/pki/util/generate_cert_test.go

    			expectedErr:      "",
    			expectedRootCert: []byte(certPem + "\n"),
    		},
    		"Non empty pem cert": {
    			pemCert:          []byte(certPem),
    			rootFile:         "",
    			expectedErr:      "",
    			expectedRootCert: []byte(certPem),
    		},
    		"Non empty pem cert and non empty root file": {
    			pemCert:          []byte(certPem),
    			rootFile:         "../testdata/cert.pem",
    			expectedErr:      "",
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Nov 06 12:48:53 UTC 2023
    - 29.4K bytes
    - Viewed (0)
  4. security/pkg/k8s/chiron/utils.go

    	// First try to read the signed CSR through a watching mechanism
    	certPEM, err := readSignedCsr(client, csr.Name, watchTimeout)
    	if err != nil {
    		return nil, nil, err
    	}
    	if len(certPEM) == 0 {
    		return nil, nil, fmt.Errorf("no certificate returned for the CSR: %q", csr.Name)
    	}
    	certsParsed, _, err := util.ParsePemEncodedCertificateChain(certPEM)
    	if err != nil {
    		return nil, nil, fmt.Errorf("decoding certificate failed")
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Apr 05 18:11:22 UTC 2024
    - 9.2K bytes
    - Viewed (0)
  5. src/crypto/tls/example_test.go

    -----END EC PRIVATE KEY-----`)
    	cert, err := tls.X509KeyPair(certPem, keyPem)
    	if err != nil {
    		log.Fatal(err)
    	}
    	cfg := &tls.Config{Certificates: []tls.Certificate{cert}}
    	listener, err := tls.Listen("tcp", ":2000", cfg)
    	if err != nil {
    		log.Fatal(err)
    	}
    	_ = listener
    }
    
    func ExampleX509KeyPair_httpServer() {
    	certPem := []byte(`-----BEGIN CERTIFICATE-----
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Mar 27 18:23:49 UTC 2024
    - 7.8K bytes
    - Viewed (0)
  6. security/tools/generate_cert/main.go

    			log.Fatalf("--mode=%v is incompatible with --signer-cert or --signer-priv.", citadelMode)
    		}
    	default:
    		log.Fatalf("Unsupported mode %v", *mode)
    	}
    }
    
    func saveCreds(certPem []byte, privPem []byte) {
    	err := os.WriteFile(*outCert, certPem, 0o644)
    	if err != nil {
    		log.Fatalf("Could not write output certificate: %s.", err)
    	}
    
    	err = os.WriteFile(*outPriv, privPem, 0o600)
    	if err != nil {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Apr 28 16:21:30 UTC 2023
    - 5.7K bytes
    - Viewed (0)
  7. tests/integration/pilot/testdata/forward-proxy/configmap.tmpl.yaml

    kind: ConfigMap
    metadata:
      name: external-forward-proxy-config
    data:
      envoy.yaml: |-
    {{ .envoyYaml | indent 4 }}
      external-forward-proxy-key.pem: |-
    {{ .keyPem | indent 4 }}
      external-forward-proxy-cert.pem: |-
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Sep 07 13:42:37 UTC 2022
    - 256 bytes
    - Viewed (0)
  8. security/pkg/nodeagent/test/mock/caserver.go

    // CAServer is a mock CA server.
    type CAServer struct {
    	pb.UnimplementedIstioCertificateServiceServer
    	URL            string
    	GRPCServer     *grpc.Server
    	Authenticators []security.Authenticator
    
    	certPem       []byte
    	keyPem        []byte
    	KeyCertBundle *util.KeyCertBundle
    	certLifetime  time.Duration
    
    	rejectCSR       bool
    	emptyCert       bool
    	faultInjectLock *sync.Mutex
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 5.9K bytes
    - Viewed (0)
  9. pilot/pkg/keycertbundle/watcher.go

    // limitations under the License.
    
    package keycertbundle
    
    import (
    	"os"
    	"sync"
    )
    
    // KeyCertBundle stores the cert, private key and root cert for istiod.
    type KeyCertBundle struct {
    	CertPem  []byte
    	KeyPem   []byte
    	CABundle []byte
    }
    
    type Watcher struct {
    	mutex     sync.RWMutex
    	bundle    KeyCertBundle
    	watcherID int32
    	watchers  map[int32]chan struct{}
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jun 05 14:00:18 UTC 2023
    - 2.6K bytes
    - Viewed (0)
  10. security/pkg/pki/util/keycertbundle.go

    		return fmt.Errorf("the cert does not match the key: %v", err)
    	}
    
    	return nil
    }
    
    func extractCertExpiryTimestamp(certType string, certPem []byte) (float64, error) {
    	cert, err := ParsePemEncodedCertificate(certPem)
    	if err != nil {
    		return -1, fmt.Errorf("failed to parse the %s: %v", certType, err)
    	}
    
    	end := cert.NotAfter
    	expiryTimestamp := float64(end.Unix())
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sun Jan 21 06:07:50 UTC 2024
    - 10.5K bytes
    - Viewed (0)
Back to top