- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 551 for xtls (0.21 sec)
-
docs/config/README.md
### Certificate Directory TLS certificates by default are expected to be stored under ``${HOME}/.minio/certs`` directory. You need to place certificates here to enable `HTTPS` based access. Read more about [How to secure access to MinIO server with TLS](https://min.io/docs/minio/linux/operations/network-encryption.html). Following is a sample directory structure for MinIO server with TLS certificates. ```sh $ mc tree --files ~/.minio
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Mon Sep 11 21:48:54 UTC 2023 - 17.7K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_builder_test.go
80: true, 82: true, // This is 'auto', but for STRICT we always get requests over TLS so HTTP inspector is not in play 81: true, // Even for passthrough, we do not need HTTP inspector because it is handled by TLS inspector 1000: true, }, tls: map[int]bool{ // strict mode: inspector is set everywhere. 80: false, 82: false, 81: false,
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 24.7K bytes - Viewed (0) -
pilot/pkg/model/authentication.go
) // MutualTLSMode is the mutual TLS mode specified by authentication policy. type MutualTLSMode int const ( // MTLSUnknown is used to indicate the variable hasn't been initialized correctly (with the authentication policy). MTLSUnknown MutualTLSMode = iota // MTLSDisable if authentication policy disable mTLS. MTLSDisable // MTLSPermissive if authentication policy enable mTLS in permissive mode. MTLSPermissive
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 22:20:44 UTC 2024 - 10.1K bytes - Viewed (0) -
pkg/istio-agent/agent_test.go
} for _, r := range extraRoots { if err := peerCertVerifier.AddMappingFromPEM("cluster.local", r); err != nil { t.Fatal(err) } } return grpc.Creds(credentials.NewTLS(&tls.Config{ Certificates: []tls.Certificate{cert}, ClientAuth: tls.VerifyClientCertIfGiven, ClientCAs: peerCertVerifier.GetGeneralCertPool(), VerifyPeerCertificate: func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 16 22:12:28 UTC 2024 - 33.4K bytes - Viewed (0) -
security/pkg/nodeagent/sds/sdsservice.go
}, }, }) secret.Type = &tls.Secret_TlsCertificate{ TlsCertificate: &tls.TlsCertificate{ CertificateChain: &core.DataSource{ Specifier: &core.DataSource_InlineBytes{ InlineBytes: s.CertificateChain, }, }, PrivateKeyProvider: &tls.PrivateKeyProvider{ ProviderName: "cryptomb", ConfigType: &tls.PrivateKeyProvider_TypedConfig{ TypedConfig: msg,
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat May 25 00:20:04 UTC 2024 - 10.9K bytes - Viewed (0) -
tests/integration/security/filebased_tls_origination/egress_gateway_origination_test.go
// only use Simple TLS as it doesn't verify client side cert // TODO: mechanism to enforce mutual TLS(client cert) validation by the server // 1. Mutual TLS origination from egress gateway to https endpoint: // internalClient ) ---HTTP request (Host: some-external-site.com----> Hits listener 0.0.0.0_80 -> // VS Routing (add Egress Header) --> Egress Gateway(originates mTLS with client certs)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 08 22:02:59 UTC 2024 - 11.9K bytes - Viewed (0) -
pilot/pkg/serviceregistry/kube/controller/ambient/authorization.go
}) } return res } func isMtlsModeUnset(mtls *v1beta1.PeerAuthentication_MutualTLS) bool { return mtls == nil || mtls.Mode == v1beta1.PeerAuthentication_MutualTLS_UNSET } func isMtlsModeStrict(mtls *v1beta1.PeerAuthentication_MutualTLS) bool { return mtls != nil && mtls.Mode == v1beta1.PeerAuthentication_MutualTLS_STRICT } func isMtlsModeDisable(mtls *v1beta1.PeerAuthentication_MutualTLS) bool {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 15 16:23:36 UTC 2024 - 18.4K bytes - Viewed (0) -
pilot/pkg/networking/grpcgen/grpcgen_test.go
t.Run("gRPC-svc-tls", func(t *testing.T) { // Replaces: insecure.NewCredentials creds, err := xdscreds.NewServerCredentials(xdscreds.ServerOptions{FallbackCreds: insecure.NewCredentials()}) if err != nil { t.Fatal(err) } grpcOptions := []grpc.ServerOption{ grpc.Creds(creds), } bootstrapB := GRPCBootstrap("echo-rbac-mtls", "test", "127.0.1.1", xdsPort)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Mar 28 09:04:02 UTC 2024 - 16.9K bytes - Viewed (0) -
pkg/config/analysis/analyzers/analyzers_test.go
{msg.VirtualServiceIneffectiveMatch, "VirtualService duplicate-tcp-match"}, {msg.VirtualServiceUnreachableRule, "VirtualService none/tls-routing"}, {msg.VirtualServiceIneffectiveMatch, "VirtualService none/tls-routing-almostmatch"}, {msg.VirtualServiceIneffectiveMatch, "VirtualService none/tls-routing"}, {msg.VirtualServiceIneffectiveMatch, "VirtualService non-method-get"},
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jun 14 07:22:31 UTC 2024 - 42.6K bytes - Viewed (0) -
cluster/gce/gci/configure-kubeapiserver.sh
else echo "ERROR: Some of ETCD_APISERVER_CA_KEY, ETCD_APISERVER_CA_CERT, ETCD_APISERVER_SERVER_KEY, ETCD_APISERVER_SERVER_CERT, ETCD_APISERVER_CLIENT_KEY and ETCD_APISERVER_CLIENT_CERT are missing, mTLS between etcd server and kube-apiserver cannot be enabled. Please provide all mTLS credential." exit 1 fi
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 07 11:08:30 UTC 2024 - 25.8K bytes - Viewed (0)