- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for TryLoadKeyFromDisk (0.21 sec)
-
cmd/kubeadm/app/util/pkiutil/testing/testing.go
ecdsa++ keyName = fmt.Sprintf("%d.ecdsa", ecdsa) default: rsa++ keyName = fmt.Sprintf("%d.rsa", rsa) } if len(keyName) > 0 { privKey, err := pkiutil.TryLoadKeyFromDisk(fixtureDir, keyName) if err == nil { return privKey, nil } } fmt.Println("GeneratePrivateKey " + keyName + " for " + thisTest) signer, err := pkiutil.GeneratePrivateKey(keyType)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 31 21:49:21 UTC 2024 - 3K bytes - Viewed (0) -
cmd/kubeadm/app/phases/certs/certs.go
// Checks if the signed certificate exists in the PKI directory if pkiutil.CertOrKeyExist(pkiDir, baseName) { // Try to load key from the PKI directory _, err := pkiutil.TryLoadKeyFromDisk(pkiDir, baseName) if err != nil { return errors.Wrapf(err, "failure loading %s key", baseName) } // Try to load certificate from the PKI directory
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Dec 05 10:17:14 UTC 2023 - 19.4K bytes - Viewed (0) -
cmd/kubeadm/app/util/pkiutil/pki_helpers.go
} cert := certs[0] intermediates := certs[1:] return cert, intermediates, nil } // TryLoadKeyFromDisk tries to load the key from the disk and validates that it is valid func TryLoadKeyFromDisk(pkiPath, name string) (crypto.Signer, error) { privateKeyPath := pathForKey(pkiPath, name) // Parse the private key from a file
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 25.5K bytes - Viewed (0) -
cmd/kubeadm/app/cmd/phases/init/certs.go
if err != nil { return errors.Wrapf(err, "could not copy %s to dry run directory %s", kubeadmconstants.CACertName, data.CertificateWriteDir()) } } if _, err := pkiutil.TryLoadKeyFromDisk(data.CertificateDir(), ca.BaseName); err == nil { // If CA Key existed while dryrun, copy CA Key to dryrun dir for later use if data.DryRun() {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 08 06:35:45 UTC 2024 - 9.8K bytes - Viewed (0) -
cmd/kubeadm/app/phases/certs/certlist.go
// Cert exists already, make sure it's valid if !caCert.IsCA { return errors.Errorf("certificate %q is not a CA", ca.Name) } // Try and load a CA Key caKey, err = pkiutil.TryLoadKeyFromDisk(ic.CertificatesDir, ca.BaseName) if err != nil { // If there's no CA key, make sure every certificate exists. for _, leaf := range leaves { cl := certKeyLocation{ pkiDir: ic.CertificatesDir,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 15.8K bytes - Viewed (0) -
cmd/kubeadm/app/cmd/certs_test.go
require.NoError(t, err, "expected runGenCSR to not fail") t.Log("The command generates key and CSR files in the configured --cert-dir") for _, name := range expectedCertificates { _, err = pkiutil.TryLoadKeyFromDisk(certDir, name) assert.NoErrorf(t, err, "failed to load key file: %s", name) _, err = pkiutil.TryLoadCSRFromDisk(certDir, name) assert.NoError(t, err, "failed to load CSR file: %s", name) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Feb 21 13:26:12 UTC 2024 - 20.1K bytes - Viewed (0) -
cmd/kubeadm/app/util/pkiutil/pki_helpers_test.go
defer os.RemoveAll(tmpdir) err = WriteKey(tmpdir, "foo", rt.caKey) if err != nil { t.Errorf( "failed to write key with an error: %v", err, ) } _, actual := TryLoadKeyFromDisk(tmpdir+rt.pathSuffix, rt.name) if (actual == nil) != rt.expected { t.Errorf( "failed TryLoadCertAndKeyFromDisk:\n\texpected: %t\n\t actual: %t", rt.expected, (actual == nil), )
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 31 21:49:21 UTC 2024 - 22.5K bytes - Viewed (0)