- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 139 for cpsr (3.25 sec)
-
pkg/test/csrctrl/controllers/csr_controller.go
switch { case !csr.DeletionTimestamp.IsZero(): log.Info("CSR has been deleted. Ignoring.") case csr.Spec.SignerName == "": log.Info("CSR does not have a signer name. Ignoring.") case !exist: log.Infof("CSR signer name does not match. Ignoring. signer-name: %s, have %v", csr.Spec.SignerName, strings.Join(maps.Keys(s.signers), ",")) case csr.Status.Certificate != nil:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed May 24 17:36:41 UTC 2023 - 3.9K bytes - Viewed (0) -
security/pkg/nodeagent/test/mock/caserver.go
s.faultInjectLock.Unlock() return empty } // CreateCertificate handles CSR. func (s *CAServer) CreateCertificate(ctx context.Context, request *pb.IstioCertificateRequest) ( *pb.IstioCertificateResponse, error, ) { caServerLog.Infof("received CSR request") if s.shouldReject() { caServerLog.Info("force rejecting CSR request") return nil, status.Error(codes.Unavailable, "CA server is not available") }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 5.9K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/util/webhook/gencerts.sh
openssl x509 -req -in caCertInter.csr -CA caCert.pem -CAkey caKey.pem -CAcreateserial -out caCertInter.pem -days 100000 -extensions v3_ca -extfile intermediate_ca.conf # Create an intermediate certificate authority with sha1 signature openssl req -new -nodes -key caKeyInter.pem -days 100000 -out caCertInterSHA1.csr -subj "/CN=${CN_BASE}_intermediate_ca"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 25 15:57:40 UTC 2022 - 5.7K bytes - Viewed (0) -
security/pkg/pki/util/generate_csr_test.go
} else { t.Errorf("%s: failed to gen CSR", id) } } pemBlock, _ := pem.Decode(csrPem) if pemBlock == nil { t.Fatalf("%s: failed to decode csr", id) } csr, err := x509.ParseCertificateRequest(pemBlock.Bytes) if err != nil { t.Fatalf("%s: failed to parse csr", id) } if err = csr.CheckSignature(); err != nil { t.Errorf("%s: csr signature is invalid", id) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Feb 25 09:40:13 UTC 2022 - 5.5K bytes - Viewed (0) -
security/pkg/pki/testdata/multilevelpki/certs.sh
openssl req -new -key root-key.pem -out root-cert.csr -sha256 <<EOF US California Sunnyvale Istio Test Root CA ******@****.*** EOF openssl x509 -req -days 3650 -in root-cert.csr -sha256 -signkey root-key.pem -out root-cert.pem # Intermediate CA #openssl genrsa -out int-key.pem 4096 openssl req -new -key int-key.pem -out int-cert.csr -config int-cert.cfg -batch -sha256
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Sep 14 20:15:07 UTC 2019 - 1.8K bytes - Viewed (0) -
pkg/controller/certificates/certificate_controller_test.go
handler := func(ctx context.Context, csr *certificates.CertificateSigningRequest) error { csr.Status.Conditions = append(csr.Status.Conditions, certificates.CertificateSigningRequestCondition{ Type: certificates.CertificateApproved, Reason: "test reason", Message: "test message", }) _, err := client.CertificatesV1().CertificateSigningRequests().UpdateApproval(context.TODO(), csr.Name, csr, metav1.UpdateOptions{}) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 15 03:26:08 UTC 2023 - 2.5K bytes - Viewed (0) -
tools/certs/Makefile.selfsigned.mk
.SUFFIXES: .csr .pem .conf .PRECIOUS: %/ca-key.pem %/ca-cert.pem %/cert-chain.pem .PRECIOUS: %/workload-cert.pem %/key.pem %/workload-cert-chain.pem .SECONDARY: root-cert.csr root-ca.conf %/cluster-ca.csr %/intermediate.conf .DEFAULT_GOAL := help SELF_DIR := $(dir $(lastword $(MAKEFILE_LIST))) include $(SELF_DIR)common.mk #------------------------------------------------------------------------ ##help: print this help message .PHONY: help
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 28 19:49:09 UTC 2022 - 3.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/testdata/generate.sh
cfssl gencert -initca root.csr.json | cfssljson -bare root cfssl gencert -initca intermediate.csr.json | cfssljson -bare intermediate cfssl sign -ca root.pem -ca-key root-key.pem -config intermediate.config.json intermediate.csr | cfssljson -bare intermediate cfssl gencert -ca intermediate.pem -ca-key intermediate-key.pem -config client.config.json --profile=valid client.csr.json | cfssljson -bare client-valid
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Oct 01 13:50:20 UTC 2019 - 1.2K bytes - Viewed (0) -
pkg/controller/certificates/approver/sarapprove_test.go
if got, expected := a.Subresource, "approval"; got != expected { t.Errorf("got: %v, expected: %v", got, expected) } csr := a.Object.(*capi.CertificateSigningRequest) if len(csr.Status.Conditions) != 1 { t.Errorf("expected CSR to have approved condition: %#v", csr) } c := csr.Status.Conditions[0] if got, expected := c.Type, capi.CertificateApproved; got != expected {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Aug 02 21:12:04 UTC 2022 - 7.7K bytes - Viewed (0) -
tests/integration/security/sds_ingress/util/generate_certs.sh
openssl req -new -key "${WD}/clientA.key" -out "${WD}/clientA.csr" -subj "/CN=*.example.com" -config "${WD}/client.conf" openssl x509 -req -days 3650 -CA "${WD}/rootA.crt" -CAkey "${WD}/rootA.key" -set_serial 0 -in "${WD}/clientA.csr" -out "${WD}/clientA.crt" -extensions v3_req -extfile "${WD}/client.conf" openssl genrsa -out "${WD}/serverA.key" 2048 openssl req -new -key "${WD}/serverA.key" -out "${WD}/serverA.csr" -subj "/CN=*.example.com" -config "${WD}/server.conf"
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jul 05 22:01:21 UTC 2023 - 5K bytes - Viewed (0)