Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for PrivateKeyFromFile (0.43 sec)

  1. cmd/kubeadm/app/util/pkiutil/pki_helpers.go

    func TryLoadKeyFromDisk(pkiPath, name string) (crypto.Signer, error) {
    	privateKeyPath := pathForKey(pkiPath, name)
    
    	// Parse the private key from a file
    	privKey, err := keyutil.PrivateKeyFromFile(privateKeyPath)
    	if err != nil {
    		return nil, errors.Wrapf(err, "couldn't load the private key file %s", privateKeyPath)
    	}
    
    	// Allow RSA and ECDSA formats only
    	var key crypto.Signer
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 01 16:01:49 UTC 2024
    - 25.5K bytes
    - Viewed (0)
  2. pkg/controlplane/apiserver/options/options.go

    			}
    		}
    	}
    
    	if completed.ServiceAccountSigningKeyFile != "" && len(completed.Authentication.ServiceAccounts.Issuers) != 0 && completed.Authentication.ServiceAccounts.Issuers[0] != "" {
    		sk, err := keyutil.PrivateKeyFromFile(completed.ServiceAccountSigningKeyFile)
    		if err != nil {
    			return CompletedOptions{}, fmt.Errorf("failed to parse service-account-issuer-key-file: %v", err)
    		}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Apr 27 12:19:56 UTC 2024
    - 15.4K bytes
    - Viewed (0)
  3. cmd/kubeadm/app/phases/certs/certs.go

    func CreateServiceAccountKeyAndPublicKeyFiles(certsDir string, keyType kubeadmapi.EncryptionAlgorithmType) error {
    	klog.V(1).Infoln("creating new public/private key files for signing service account users")
    	_, err := keyutil.PrivateKeyFromFile(filepath.Join(certsDir, kubeadmconstants.ServiceAccountPrivateKeyName))
    	if err == nil {
    		// kubeadm doesn't validate the existing certificate key more than this;
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Dec 05 10:17:14 UTC 2023
    - 19.4K bytes
    - Viewed (0)
  4. cmd/kube-controller-manager/app/controllermanager.go

    		logger.Info("Controller is disabled because there is no private key", "controller", controllerName)
    		return nil, false, nil
    	}
    	privateKey, err := keyutil.PrivateKeyFromFile(controllerContext.ComponentConfig.SAController.ServiceAccountKeyFile)
    	if err != nil {
    		return nil, true, fmt.Errorf("error reading key for service account token controller: %v", err)
    	}
    
    	var rootCA []byte
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 01 13:03:53 UTC 2024
    - 37.5K bytes
    - Viewed (0)
Back to top