- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 60 for rootcert2 (0.26 sec)
-
tests/integration/security/external_ca/main_test.go
value: |- name: inject-volume mountPath: /var/lib/istio/inject {{- end }} `, map[string]any{ "rootcert1": cert1.Rootcert, "signer1": cert1.Signer, "rootcert2": cert2.Rootcert, "signer2": cert2.Signer, "isConfigCluster": isConfigCluster, "isExternalControlPlane": isExternalControlPlane, })
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Mar 22 14:18:21 UTC 2023 - 4.7K bytes - Viewed (0) -
cmd/kubeadm/app/util/pkiutil/pki_helpers_test.go
} defer os.RemoveAll(tmpdir) rootCert2, rootKey2, err := NewCertificateAuthority(&CertConfig{ Config: certutil.Config{CommonName: "Root CA 2"}, }) if err != nil { t.Errorf("failed to create root CA cert and key with an error: %v", err) } intCert2, intKey2, err := NewIntermediateCertificateAuthority(rootCert2, rootKey2, &CertConfig{ Config: certutil.Config{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 31 21:49:21 UTC 2024 - 22.5K bytes - Viewed (0) -
security/pkg/pki/ca/ca_test.go
rootCert, err := util.ParsePemEncodedCertificate(rootCertBytes) if err != nil { t.Error(err) } // Root cert and siging cert are the same for self-signed CA. if !rootCert.Equal(signingCert) { t.Error("CA root cert does not match signing cert") } if ttl := rootCert.NotAfter.Sub(rootCert.NotBefore); ttl != caCertTTL {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Oct 31 08:51:27 UTC 2023 - 29.1K bytes - Viewed (0) -
security/pkg/pki/util/generate_csr.go
func AppendCertByte(pemCert []byte, rootCert []byte) []byte { rootCerts := []byte{} if len(pemCert) > 0 { // Copy the input certificate rootCerts = []byte(strings.TrimSuffix(string(pemCert), "\n") + "\n") } rootCerts = append(rootCerts, rootCert...) return rootCerts
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 06 12:48:53 UTC 2023 - 4.1K bytes - Viewed (0) -
security/pkg/nodeagent/cache/secretcache.go
defer cancel() if err := b.RetryWithContext(ctx, certValid); err != nil { return nil, err } // Set the rootCert only if it is workload root cert. if workload { sc.cache.SetRoot(rootCert) } return &security.SecretItem{ ResourceName: resourceName, RootCert: rootCert, }, nil } // Generate a key and certificate item from the existing key certificate files from the passed in file paths.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 04 08:29:46 UTC 2024 - 28.2K bytes - Viewed (0) -
security/pkg/pki/ca/selfsignedcarootcertrotator.go
rootCerts, err := util.AppendRootCerts(caSecret.Data[CACertFile], rotator.config.rootCertFile) if err != nil { rootCertRotatorLog.Errorf("failed to append root certificates from file: %s", err.Error()) return } if err := rotator.ca.GetCAKeyCertBundle().VerifyAndSetAll(caSecret.Data[CACertFile], caSecret.Data[CAPrivateKeyFile], nil, rootCerts); err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Nov 30 19:33:26 UTC 2023 - 10.4K bytes - Viewed (0) -
security/pkg/pki/ca/ca.go
} rootCerts, err := util.AppendRootCerts(pemCert, rootCertFile) if err != nil { pkiCaLog.Warnf("failed to append root certificates (%v)", err) return fmt.Errorf("failed to append root certificates (%v)", err) } if caOpts.KeyCertBundle, err = util.NewVerifiedKeyCertBundleFromPem(pemCert, pemKey, nil, rootCerts); err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Nov 30 19:33:26 UTC 2023 - 17.2K bytes - Viewed (0) -
security/pkg/nodeagent/cache/secretcache_test.go
if expectedSecret.ResourceName == security.RootCertReqResourceName || (ok && cfg.IsRootCertificate()) { if !bytes.Equal(expectedSecret.RootCert, gotSecret.RootCert) { t.Fatalf("root cert: expected %v but got %v", expectedSecret.RootCert, gotSecret.RootCert) } } else { if !bytes.Equal(expectedSecret.CertificateChain, gotSecret.CertificateChain) {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 16 22:12:28 UTC 2024 - 23.9K bytes - Viewed (0) -
pilot/pkg/grpc/tls.go
// TLSOptions include TLS options that a grpc client uses to connect with server. type TLSOptions struct { RootCert string Key string Cert string ServerAddress string SAN string } func getTLSDialOption(opts *TLSOptions) (grpc.DialOption, error) { rootCert, err := getRootCertificate(opts.RootCert) if err != nil { return nil, err } config := tls.Config{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Mar 28 22:11:02 UTC 2024 - 2.9K bytes - Viewed (0) -
pkg/istio-agent/plugins.go
} else { tlsOpts = &citadel.TLSOptions{} tlsOpts.RootCert, err = a.FindRootCAForCA() if err != nil { return nil, fmt.Errorf("failed to find root CA cert for CA: %v", err) } if tlsOpts.RootCert == "" { log.Infof("Using CA %s cert with system certs", opts.CAEndpoint) } else if !fileExists(tlsOpts.RootCert) {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat May 11 03:32:57 UTC 2024 - 2.7K bytes - Viewed (0)