Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for RetrieveSpiffeBundleRootCerts (0.49 sec)

  1. pkg/spiffe/spiffe.go

    	}
    	return parsed.TrustDomain, nil
    }
    
    // RetrieveSpiffeBundleRootCerts retrieves the trusted CA certificates from a list of SPIFFE bundle endpoints.
    // It can use the system cert pool and the supplied certificates to validate the endpoints.
    func RetrieveSpiffeBundleRootCerts(config map[string]string, caCertPool *x509.CertPool, retryTimeout time.Duration) (
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 11.1K bytes
    - Viewed (0)
  2. pilot/pkg/trustbundle/trustbundle.go

    	tb.endpointMutex.RUnlock()
    	remoteCerts := []string{}
    
    	currentTrustDomain := tb.meshConfig.Mesh().GetTrustDomain()
    	for _, endpoint := range remoteEndpoints {
    		trustDomainAnchorMap, err := spiffe.RetrieveSpiffeBundleRootCerts(
    			map[string]string{currentTrustDomain: endpoint}, tb.remoteCaCertPool, remoteTimeout)
    		if err != nil {
    			trustBundleLog.Errorf("unable to fetch trust Anchors from endpoint %s: %s", endpoint, err)
    			continue
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 7.8K bytes
    - Viewed (0)
  3. pkg/spiffe/spiffe_test.go

    				t.Fatalf("failed to get SystemCertPool: %v", err)
    			}
    			for _, cert := range c.extraCerts {
    				caCertPool.AddCert(cert)
    			}
    
    			// This is the system-under-test.
    			rootCertMap, err := RetrieveSpiffeBundleRootCerts(c.in, caCertPool, time.Millisecond*50)
    
    			if c.errContains != "" {
    				if err == nil {
    					t.Fatalf("got nil error; wanted error to contain %q", c.errContains)
    				}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 18.1K bytes
    - Viewed (0)
Back to top