- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 23 for certPools (0.24 sec)
-
pkg/spiffe/spiffe.go
func (v *PeerCertVerifier) GetGeneralCertPool() *x509.CertPool { return v.generalCertPool } // AddMapping adds a new trust domain to certificates mapping to the certPools map. func (v *PeerCertVerifier) AddMapping(trustDomain string, certs []*x509.Certificate) { if v.certPools[trustDomain] == nil { v.certPools[trustDomain] = x509.NewCertPool() } for _, cert := range certs { v.certPools[trustDomain].AddCert(cert)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 11.1K bytes - Viewed (0) -
pkg/test/echo/server/forwarder/config.go
} if r.InsecureSkipVerify || r.CaCert == "" { tlsConfig.InsecureSkipVerify = true } else if r.CaCert != "" { certPool := x509.NewCertPool() if !certPool.AppendCertsFromPEM([]byte(r.CaCert)) { return nil, fmt.Errorf("failed to create cert pool") } tlsConfig.RootCAs = certPool } setALPNForHTTP := func() { if r.Alpn == nil { switch { case r.Http3: // Do nothing.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Oct 08 09:39:20 UTC 2023 - 9.8K bytes - Viewed (0) -
istioctl/pkg/kubeinject/kubeinject.go
var address string if cc.URL != nil { address = *cc.URL } var certPool *x509.CertPool if len(cc.CABundle) > 0 { certPool = x509.NewCertPool() certPool.AppendCertsFromPEM(cc.CABundle) } else { var err error certPool, err = x509.SystemCertPool() if err != nil { return nil, err } } tlsClientConfig := &tls.Config{RootCAs: certPool, MinVersion: tls.VersionTLS12} client := http.Client{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Mar 29 02:29:02 UTC 2024 - 21.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/egressselector/egress_selector.go
if err != nil { return nil, fmt.Errorf("failed to read key pair %s & %s, got %v", clientCert, clientKey, err) } certPool := x509.NewCertPool() if caCert != "" { certBytes, err := os.ReadFile(caCert) if err != nil { return nil, fmt.Errorf("failed to read cert file %s, got %v", caCert, err) } ok := certPool.AppendCertsFromPEM(certBytes) if !ok { return nil, fmt.Errorf("failed to append CA cert to the cert pool") }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jun 29 15:48:39 UTC 2023 - 12.5K bytes - Viewed (0) -
api/go1.19.txt
pkg crypto/x509, func ParseRevocationList([]uint8) (*RevocationList, error) #50674 pkg crypto/x509, method (*CertPool) Clone() *CertPool #35044 pkg crypto/x509, method (*CertPool) Equal(*CertPool) bool #46057 pkg crypto/x509, method (*RevocationList) CheckSignatureFrom(*Certificate) error #50674 pkg crypto/x509, type RevocationList struct, AuthorityKeyId []uint8 #50674 pkg crypto/x509, type RevocationList struct, Extensions []pkix.Extension #50674
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Dec 02 16:29:41 UTC 2022 - 17.9K bytes - Viewed (0) -
src/net/http/httptest/server.go
if err != nil { panic(fmt.Sprintf("httptest: NewTLSServer: %v", err)) } certpool := x509.NewCertPool() certpool.AddCert(s.certificate) s.client.Transport = &http.Transport{ TLSClientConfig: &tls.Config{ RootCAs: certpool, }, ForceAttemptHTTP2: s.EnableHTTP2, } s.Listener = tls.NewListener(s.Listener, s.TLS)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri May 10 17:26:10 UTC 2024 - 10.7K bytes - Viewed (0) -
src/crypto/tls/boring_test.go
L2_I := boringCert(t, "L2_I", boringRSAKey(t, 1024), I_R1, boringCertLeaf) // client verifying server cert testServerCert := func(t *testing.T, desc string, pool *x509.CertPool, key interface{}, list [][]byte, ok bool) { clientConfig := testConfig.Clone() clientConfig.RootCAs = pool clientConfig.InsecureSkipVerify = false clientConfig.ServerName = "example.com"
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:45:37 UTC 2024 - 19.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/authentication/request/x509/x509.go
// for cases where the options (particularly the CAs) can change. If the bool is false, then the returned VerifyOptions // are ignored and the authenticator will express "no opinion". This allows a clear signal for cases where a CertPool // is eventually expected, but not currently present. type VerifyOptionFunc func() (x509.VerifyOptions, bool) // Authenticator implements request.Authenticator by extracting user info from verified client certificates
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Aug 18 01:31:22 UTC 2023 - 10.3K bytes - Viewed (0) -
internal/logger/target/kafka/kafka.go
Brokers []xnet.Host `json:"brokers"` Topic string `json:"topic"` Version string `json:"version"` TLS struct { Enable bool `json:"enable"` RootCAs *x509.CertPool `json:"-"` SkipVerify bool `json:"skipVerify"` ClientAuth tls.ClientAuthType `json:"clientAuth"` ClientTLSCert string `json:"clientTLSCert"`
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Sun Jun 02 03:03:39 UTC 2024 - 10.2K bytes - Viewed (0) -
internal/event/target/kafka.go
QueueLimit uint64 `json:"queueLimit"` Version string `json:"version"` BatchSize uint32 `json:"batchSize"` TLS struct { Enable bool `json:"enable"` RootCAs *x509.CertPool `json:"-"` SkipVerify bool `json:"skipVerify"` ClientAuth tls.ClientAuthType `json:"clientAuth"` ClientTLSCert string `json:"clientTLSCert"`
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Sat Jun 01 15:02:59 UTC 2024 - 13.1K bytes - Viewed (0)