- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 169 for cpsr (0.11 sec)
-
pkg/controller/certificates/cleaner/cleaner.go
if err := ccc.csrClient.Delete(ctx, csr.Name, metav1.DeleteOptions{}); err != nil { return fmt.Errorf("unable to delete CSR %q: %v", csr.Name, err) } } return nil } // isIssuedExpired checks if the CSR has been issued a certificate and if the // expiration of the certificate (the NotAfter value) has passed.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 15 03:26:08 UTC 2023 - 8K bytes - Viewed (0) -
pkg/controller/certificates/certificate_controller.go
defer func() { logger.V(4).Info("Finished syncing certificate request", "csr", key, "elapsedTime", time.Since(startTime)) }() csr, err := cc.csrLister.Get(key) if errors.IsNotFound(err) { logger.V(3).Info("csr has been deleted", "csr", key) return nil } if err != nil { return err } if len(csr.Status.Certificate) > 0 { // no need to do anything because it already has a cert
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 6.4K bytes - Viewed (0) -
pkg/controller/certificates/approver/sarapprove.go
} func (a *sarApprover) handle(ctx context.Context, csr *capi.CertificateSigningRequest) error { if len(csr.Status.Certificate) != 0 { return nil } if approved, denied := certificates.GetCertApprovalCondition(&csr.Status); approved || denied { return nil } x509cr, err := capihelper.ParseCSR(csr.Spec.Request) if err != nil { return fmt.Errorf("unable to parse csr %q: %v", csr.Name, err) } tried := []string{}
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jun 21 16:03:42 UTC 2023 - 5.3K bytes - Viewed (0) -
pkg/test/csrctrl/controllers/csr_controller.go
switch { case !csr.DeletionTimestamp.IsZero(): log.Info("CSR has been deleted. Ignoring.") case csr.Spec.SignerName == "": log.Info("CSR does not have a signer name. Ignoring.") case !exist: log.Infof("CSR signer name does not match. Ignoring. signer-name: %s, have %v", csr.Spec.SignerName, strings.Join(maps.Keys(s.signers), ",")) case csr.Status.Certificate != nil:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed May 24 17:36:41 UTC 2023 - 3.9K bytes - Viewed (0) -
security/pkg/nodeagent/test/mock/caserver.go
s.faultInjectLock.Unlock() return empty } // CreateCertificate handles CSR. func (s *CAServer) CreateCertificate(ctx context.Context, request *pb.IstioCertificateRequest) ( *pb.IstioCertificateResponse, error, ) { caServerLog.Infof("received CSR request") if s.shouldReject() { caServerLog.Info("force rejecting CSR request") return nil, status.Error(codes.Unavailable, "CA server is not available") }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 5.9K bytes - Viewed (0) -
pkg/controller/certificates/certificate_controller_test.go
handler := func(ctx context.Context, csr *certificates.CertificateSigningRequest) error { csr.Status.Conditions = append(csr.Status.Conditions, certificates.CertificateSigningRequestCondition{ Type: certificates.CertificateApproved, Reason: "test reason", Message: "test message", }) _, err := client.CertificatesV1().CertificateSigningRequests().UpdateApproval(context.TODO(), csr.Name, csr, metav1.UpdateOptions{}) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 15 03:26:08 UTC 2023 - 2.5K bytes - Viewed (0) -
tools/certs/Makefile.selfsigned.mk
.SUFFIXES: .csr .pem .conf .PRECIOUS: %/ca-key.pem %/ca-cert.pem %/cert-chain.pem .PRECIOUS: %/workload-cert.pem %/key.pem %/workload-cert-chain.pem .SECONDARY: root-cert.csr root-ca.conf %/cluster-ca.csr %/intermediate.conf .DEFAULT_GOAL := help SELF_DIR := $(dir $(lastword $(MAKEFILE_LIST))) include $(SELF_DIR)common.mk #------------------------------------------------------------------------ ##help: print this help message .PHONY: help
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 28 19:49:09 UTC 2022 - 3.1K bytes - Viewed (0) -
pkg/apis/certificates/v1beta1/defaults_test.go
strPtr := func(s string) *string { return &s } tests := map[string]struct { csr capi.CertificateSigningRequestSpec expectedSignerName string expectedUsages []capi.KeyUsage }{ "defaults to legacy-unknown if request is not a CSR": { csr: capi.CertificateSigningRequestSpec{ Request: []byte("invalid data"), Usages: kubeletServerUsages, },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Dec 27 08:04:25 UTC 2022 - 16.9K bytes - Viewed (0) -
pkg/controller/certificates/signer/signer.go
if err != nil { return fmt.Errorf("unable to parse csr %q: %v", csr.Name, err) } if recognized, err := s.isRequestForSignerFn(x509cr, csr.Spec.Usages, csr.Spec.SignerName); err != nil { csr.Status.Conditions = append(csr.Status.Conditions, capi.CertificateSigningRequestCondition{ Type: capi.CertificateFailed, Status: v1.ConditionTrue,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Mar 15 03:26:08 UTC 2023 - 10.3K bytes - Viewed (0) -
pkg/apis/certificates/validation/validation.go
} if csr.Spec.ExpirationSeconds != nil && *csr.Spec.ExpirationSeconds < 600 { allErrs = append(allErrs, field.Invalid(specPath.Child("expirationSeconds"), *csr.Spec.ExpirationSeconds, "may not specify a duration less than 600 seconds (10 minutes)")) } allErrs = append(allErrs, validateConditions(field.NewPath("status", "conditions"), csr, opts)...)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 03 18:40:49 UTC 2023 - 20.1K bytes - Viewed (0)