Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for IsRootCertificate (0.86 sec)

  1. pkg/security/security_test.go

    			got, _ := SdsCertificateConfigFromResourceName(tt.resource)
    			if got != tt.output {
    				t.Fatalf("got %v, expected %v", got, tt.output)
    			}
    			if root := got.IsRootCertificate(); root != tt.root {
    				t.Fatalf("unexpected isRootCertificate got %v, expected %v", root, tt.root)
    			}
    			if key := got.IsKeyCertificate(); key != tt.key {
    				t.Fatalf("unexpected IsKeyCertificate got %v, expected %v", key, tt.key)
    			}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Sep 10 21:51:09 UTC 2021
    - 2.2K bytes
    - Viewed (0)
  2. pkg/security/security.go

    func (s SdsCertificateConfig) GetRootResourceName() string {
    	if s.IsRootCertificate() {
    		return "file-root:" + s.CaCertificatePath // Format: file-root:%s
    	}
    	return ""
    }
    
    // IsRootCertificate returns true if this config represents a root certificate config.
    func (s SdsCertificateConfig) IsRootCertificate() bool {
    	return s.CaCertificatePath != ""
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 17:48:28 UTC 2024
    - 19.1K bytes
    - Viewed (0)
  3. pilot/pkg/networking/core/cluster_tls.go

    				CaCertificatePath: tls.CaCertificates,
    			}
    			// If tls.CaCertificate or CaCertificate in Metadata isn't configured, or tls.InsecureSkipVerify is true,
    			// don't set up SdsSecretConfig
    			if !res.IsRootCertificate() || tls.GetInsecureSkipVerify().GetValue() {
    				tlsContext.CommonTlsContext.ValidationContextType = &tlsv3.CommonTlsContext_ValidationContext{}
    			} else {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 18 19:09:43 UTC 2024
    - 19.2K bytes
    - Viewed (0)
  4. security/pkg/nodeagent/sds/sdsservice.go

    	} else {
    		cfg, ok = security.SdsCertificateConfigFromResourceName(s.ResourceName)
    	}
    	if s.ResourceName == security.RootCertReqResourceName || (ok && cfg.IsRootCertificate()) {
    		secret.Type = &tls.Secret_ValidationContext{
    			ValidationContext: &tls.CertificateValidationContext{
    				TrustedCa: &core.DataSource{
    					Specifier: &core.DataSource_InlineBytes{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat May 25 00:20:04 UTC 2024
    - 10.9K bytes
    - Viewed (0)
  5. security/pkg/nodeagent/cache/secretcache_test.go

    			gotSecret.ResourceName)
    	}
    	cfg, ok := security.SdsCertificateConfigFromResourceName(expectedSecret.ResourceName)
    	if expectedSecret.ResourceName == security.RootCertReqResourceName || (ok && cfg.IsRootCertificate()) {
    		if !bytes.Equal(expectedSecret.RootCert, gotSecret.RootCert) {
    			t.Fatalf("root cert: expected %v but got %v", expectedSecret.RootCert,
    				gotSecret.RootCert)
    		}
    	} else {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 16 22:12:28 UTC 2024
    - 23.9K bytes
    - Viewed (0)
  6. security/pkg/nodeagent/cache/secretcache.go

    		cfg, ok := security.SdsCertificateConfigFromResourceName(resourceName)
    		sdsFromFile = ok
    		switch {
    		case ok && cfg.IsRootCertificate():
    			if sitem, err = sc.generateRootCertFromExistingFile(cfg.CaCertificatePath, resourceName, false); err == nil {
    				sc.addFileWatcher(cfg.CaCertificatePath, resourceName)
    			}
    		case ok && cfg.IsKeyCertificate():
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 04 08:29:46 UTC 2024
    - 28.2K bytes
    - Viewed (0)
Back to top