- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for RetrieveSpiffeBundleRootCerts (0.28 sec)
-
pkg/spiffe/spiffe.go
} return parsed.TrustDomain, nil } // RetrieveSpiffeBundleRootCerts retrieves the trusted CA certificates from a list of SPIFFE bundle endpoints. // It can use the system cert pool and the supplied certificates to validate the endpoints. func RetrieveSpiffeBundleRootCerts(config map[string]string, caCertPool *x509.CertPool, retryTimeout time.Duration) (
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 11.1K bytes - Viewed (0) -
pilot/pkg/trustbundle/trustbundle.go
tb.endpointMutex.RUnlock() remoteCerts := []string{} currentTrustDomain := tb.meshConfig.Mesh().GetTrustDomain() for _, endpoint := range remoteEndpoints { trustDomainAnchorMap, err := spiffe.RetrieveSpiffeBundleRootCerts( map[string]string{currentTrustDomain: endpoint}, tb.remoteCaCertPool, remoteTimeout) if err != nil { trustBundleLog.Errorf("unable to fetch trust Anchors from endpoint %s: %s", endpoint, err) continue
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 7.8K bytes - Viewed (0) -
pkg/spiffe/spiffe_test.go
t.Fatalf("failed to get SystemCertPool: %v", err) } for _, cert := range c.extraCerts { caCertPool.AddCert(cert) } // This is the system-under-test. rootCertMap, err := RetrieveSpiffeBundleRootCerts(c.in, caCertPool, time.Millisecond*50) if c.errContains != "" { if err == nil { t.Fatalf("got nil error; wanted error to contain %q", c.errContains) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 18.1K bytes - Viewed (0)