- Sort Score
- Result 10 results
- Languages All
Results 1 - 4 of 4 for defaultVerifyOptions (0.4 sec)
-
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/dynamic_cafile_content.go
var err error verifyOptions := defaultVerifyOptions() verifyOptions.Roots, err = cert.NewPoolFromBytes(caBundle) if err != nil { return nil, fmt.Errorf("error loading CA bundle for %q: %v", name, err) } return &caBundleAndVerifier{ caBundle: caBundle, verifyOptions: verifyOptions, }, nil }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 8.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authentication/request/x509/verify_options.go
func NewStaticVerifierFromFile(clientCA string) (VerifyOptionFunc, error) { if len(clientCA) == 0 { return nil, nil } // Wrap with an x509 verifier var err error opts := DefaultVerifyOptions() opts.Roots, err = cert.NewPool(clientCA) if err != nil { return nil, fmt.Errorf("error loading certs from %s: %v", clientCA, err) } return StaticVerifierFn(opts), nil }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Nov 07 19:48:24 UTC 2019 - 2.2K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authentication/request/x509/x509.go
} } return fmt.Errorf("x509: subject with cn=%s is not in the allowed list", subject.CommonName) } // DefaultVerifyOptions returns VerifyOptions that use the system root certificates, current time, // and requires certificates to be valid for client auth (x509.ExtKeyUsageClientAuth) func DefaultVerifyOptions() x509.VerifyOptions { return x509.VerifyOptions{ KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth}, } }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Aug 18 01:31:22 UTC 2023 - 10.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authentication/request/x509/x509_test.go
uZ2SvNPAIBLsItTo1Jef2jw1oOmjjNFCfMEnH4qbWwM9K5vfJbaop1pID+gfJksO PKJQCs0CM0zkesktuLi/gFpuB0nEwyOgLg== -----END CERTIFICATE-----` ) func TestX509(t *testing.T) { multilevelOpts := DefaultVerifyOptions() multilevelOpts.Roots = x509.NewCertPool() multilevelOpts.Roots.AddCert(getCertsFromFile(t, "root")[0]) testCases := map[string]struct { Insecure bool Certs []*x509.Certificate
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 02 23:23:03 UTC 2024 - 36.9K bytes - Viewed (0)