Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for secretcontroller (0.29 sec)

  1. pkg/kube/multicluster/secretcontroller.go

    John Howard <******@****.***> 1709691190 -0800
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Mar 06 02:13:10 UTC 2024
    - 12.7K bytes
    - Viewed (0)
  2. pilot/pkg/xds/ecds.go

    		}
    	}
    
    	var secrets map[string][]byte
    	if len(wasmSecrets) > 0 {
    		// Generate the pull secrets first, which will be used when populating the extension config.
    		if e.secretController != nil {
    			var err error
    			secretController, err := e.secretController.ForCluster(proxy.Metadata.ClusterID)
    			if err != nil {
    				log.Warnf("proxy %s is from an unknown cluster, cannot retrieve certificates for Wasm image pull: %v", proxy.ID, err)
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Jan 16 18:25:42 UTC 2024
    - 7.2K bytes
    - Viewed (0)
  3. security/pkg/k8s/controller/casecret.go

    )
    
    var k8sControllerLog = log.RegisterScope("secretcontroller", "Citadel kubernetes controller log")
    
    // CaSecretController manages the self-signed signing CA secret.
    type CaSecretController struct {
    	client corev1.CoreV1Interface
    }
    
    // NewCaSecretController returns a pointer to a newly constructed SecretController instance.
    func NewCaSecretController(core corev1.CoreV1Interface) *CaSecretController {
    	cs := &CaSecretController{
    		client: core,
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue May 23 17:08:31 UTC 2023
    - 2.6K bytes
    - Viewed (0)
  4. pilot/pkg/xds/sds.go

    	var secretController credscontroller.Controller
    	switch sr.ResourceType {
    	case credentials.KubernetesGatewaySecretType:
    		secretController = configClusterSecrets
    	default:
    		secretController = proxyClusterSecrets
    	}
    
    	isCAOnlySecret := strings.HasSuffix(sr.Name, securitymodel.SdsCaSuffix)
    	if isCAOnlySecret {
    		caCertInfo, err := secretController.GetCaCert(sr.Name, sr.Namespace)
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Apr 15 23:04:36 UTC 2024
    - 15.8K bytes
    - Viewed (0)
  5. security/pkg/pki/ca/selfsignedcarootcertrotator.go

    }
    
    // SelfSignedCARootCertRotator automatically checks self-signed signing root
    // certificate and rotates root certificate if it is going to expire.
    type SelfSignedCARootCertRotator struct {
    	caSecretController *controller.CaSecretController
    	config             *SelfSignedCARootCertRotatorConfig
    	backOffTime        time.Duration
    	ca                 *IstioCA
    	onRootCertUpdate   func() error
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Nov 30 19:33:26 UTC 2023
    - 10.4K bytes
    - Viewed (0)
  6. pilot/pkg/bootstrap/discovery.go

    	ecdsGen := &xds.EcdsGenerator{ConfigGenerator: cg}
    	if env.CredentialsController != nil {
    		generators[v3.SecretType] = xds.NewSecretGen(env.CredentialsController, s.Cache, clusterID, env.Mesh())
    		ecdsGen.SetCredController(env.CredentialsController)
    	}
    	generators[v3.ExtensionConfigurationType] = ecdsGen
    	generators[v3.NameTableType] = &xds.NdsGenerator{ConfigGenerator: cg}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Jan 16 18:25:42 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  7. pilot/test/xds/fake.go

    	s.Generators[v3.SecretType] = xds.NewSecretGen(creds, s.Cache, opts.DefaultClusterName, nil)
    	s.Generators[v3.ExtensionConfigurationType].(*xds.EcdsGenerator).SetCredController(creds)
    
    	memRegistry := cg.MemRegistry
    	memRegistry.XdsUpdater = s
    
    	// Setup config handlers
    	// TODO code re-use from server.go
    	configHandler := func(_, curr config.Config, event model.Event) {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jun 10 16:08:52 UTC 2024
    - 18.4K bytes
    - Viewed (0)
Back to top