- Sort Score
- Result 10 results
- Languages All
Results 1 - 5 of 5 for not_after (0.18 sec)
-
istioctl/pkg/writer/compare/sds/util.go
} } today := time.Now() return SecretMeta{ SerialNumber: fmt.Sprintf("%x", cert.SerialNumber), NotAfter: cert.NotAfter.Format(time.RFC3339), NotBefore: cert.NotBefore.Format(time.RFC3339), Type: certType, Valid: today.After(cert.NotBefore) && today.Before(cert.NotAfter), TrustDomain: trustDomain, }, nil }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Oct 28 19:52:53 UTC 2024 - 8.5K bytes - Viewed (0) -
istioctl/pkg/writer/compare/sds/writer.go
if !hasUnknownTrustDomain { fmt.Fprintf(tw, "%s\t%s\t%s\t%t\t%s\t%s\t%s\t%s\n", s.Name, s.Type, s.State, s.Valid, s.SerialNumber, s.NotAfter, s.NotBefore, s.SecretMeta.TrustDomain) } else { fmt.Fprintf(tw, "%s\t%s\t%s\t%t\t%s\t%s\t%s\n", s.Name, s.Type, s.State, s.Valid, s.SerialNumber, s.NotAfter, s.NotBefore) } } return tw.Flush() }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Oct 28 19:52:53 UTC 2024 - 4.8K bytes - Viewed (0) -
cmd/test-utils_test.go
} template := x509.Certificate{ SerialNumber: serialNumber, Subject: pkix.Name{ Organization: []string{"Acme Co"}, }, NotBefore: notBefore, NotAfter: notAfter, KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature, ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth}, BasicConstraintsValid: true, }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 01 22:13:18 UTC 2024 - 77K bytes - Viewed (0) -
cmd/admin-handlers.go
} tlsInfo.Certs = append(tlsInfo.Certs, madmin.TLSCert{ PubKeyAlgo: c.PublicKeyAlgorithm.String(), SignatureAlgo: c.SignatureAlgorithm.String(), NotBefore: c.NotBefore, NotAfter: c.NotAfter, Checksum: strconv.FormatUint(check, 16), }) } } return tlsInfo } // ServerInfoHandler - GET /minio/admin/v3/info // ---------- // Get server information
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Oct 04 11:32:32 UTC 2024 - 99.7K bytes - Viewed (0) -
cmd/sts-handlers.go
// configured expiry and the duration until the certificate itself // expires. // We must not issue credentials that out-live the certificate. if validUntil := time.Until(certificate.NotAfter); validUntil < expiry { expiry = validUntil } // Associate any service accounts to the certificate CN parentUser := "tls" + getKeySeparator() + certificate.Subject.CommonName
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Aug 15 01:29:20 UTC 2024 - 33.9K bytes - Viewed (0)