- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 46 for commonName (0.22 sec)
-
cmd/kubeadm/app/util/certs/util.go
// the expected SubjectCommonName func AssertCertificateHasCommonName(t *testing.T, cert *x509.Certificate, commonName string) { if cert.Subject.CommonName != commonName { t.Errorf("cert has Subject.CommonName %s, expected %s", cert.Subject.CommonName, commonName) } } // AssertCertificateHasOrganizations is a utility function for kubeadm testing that asserts if a given certificate has
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 9.1K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/internal/tls/ClientAuthTest.kt
.serialNumber(1L) .certificateAuthority(1) .commonName("root") .addSubjectAlternativeName("root_ca.com") .build() serverIntermediateCa = HeldCertificate.Builder() .signedBy(serverRootCa) .certificateAuthority(0) .serialNumber(2L) .commonName("intermediate_ca") .addSubjectAlternativeName("intermediate_ca.com") .build()
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Sun Jan 14 10:20:09 UTC 2024 - 12.5K bytes - Viewed (0) -
cmd/kubeadm/app/phases/certs/renewal/manager_test.go
DNSNames: []string{"test-domain.space"}, IPAddresses: []net.IP{netutils.ParseIPSloppy("10.100.0.1")}, } cfg := certToConfig(cert) if cfg.CommonName != expectedConfig.CommonName { t.Errorf("expected common name %q, got %q", expectedConfig.CommonName, cfg.CommonName) } if len(cfg.Organization) != 1 || cfg.Organization[0] != expectedConfig.Organization[0] {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 13.9K bytes - Viewed (0) -
cmd/kubeadm/app/phases/certs/certlist.go
LongName: "self-signed Kubernetes CA to provision identities for other Kubernetes components", BaseName: kubeadmconstants.CACertAndKeyBaseName, config: pkiutil.CertConfig{ Config: certutil.Config{ CommonName: "kubernetes", }, }, } } // KubeadmCertAPIServer is the definition of the cert used to serve the Kubernetes API. func KubeadmCertAPIServer() *KubeadmCert { return &KubeadmCert{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 15.8K bytes - Viewed (0) -
cmd/kubeadm/app/util/pkiutil/pki_helpers_test.go
{ name: "has ServerAuth", config: CertConfig{ Config: certutil.Config{ CommonName: "test", Usages: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth}, }, }, expected: true, }, { name: "has ServerAuth ECDSA", config: CertConfig{ Config: certutil.Config{ CommonName: "test", Usages: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth}, },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 31 21:49:21 UTC 2024 - 22.5K bytes - Viewed (0) -
src/crypto/x509/x509_test.go
t.Errorf("%s: failed to parse excluded URIs: %#v", test.name, cert.ExcludedURIDomains) } if cert.Subject.CommonName != commonName { t.Errorf("%s: subject wasn't correctly copied from the template. Got %s, want %s", test.name, cert.Subject.CommonName, commonName) } if len(cert.Subject.Country) != 1 || cert.Subject.Country[0] != "NL" { t.Errorf("%s: ExtraNames didn't override Country", test.name)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:00:16 UTC 2024 - 163.4K bytes - Viewed (0) -
cmd/kubeadm/app/util/pkiutil/pki_helpers.go
if !cfg.NotAfter.IsZero() { notAfter = cfg.NotAfter } tmpl := x509.Certificate{ SerialNumber: serial, Subject: pkix.Name{ CommonName: cfg.CommonName, Organization: cfg.Organization, }, DNSNames: []string{cfg.CommonName}, NotBefore: notBefore, NotAfter: notAfter, KeyUsage: keyUsage, BasicConstraintsValid: true,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 16:01:49 UTC 2024 - 25.5K bytes - Viewed (0) -
cmd/kubeadm/app/phases/certs/certs_test.go
} assert.ElementsMatch(t, certConfig.Organization, csr.Subject.Organization, "organizations not equal") if csr.Subject.CommonName != certConfig.CommonName { t.Errorf("expected common name %q, got %q", certConfig.CommonName, csr.Subject.CommonName) } assert.ElementsMatch(t, certConfig.AltNames.DNSNames, csr.DNSNames, "dns names not equal")
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jan 31 21:49:21 UTC 2024 - 23.3K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/OpenJSSETest.kt
// Generate a self-signed cert for the server to serve and the client to trust. // can't use TlsUtil.localhost with a non OpenJSSE trust manager val heldCertificate = HeldCertificate.Builder() .commonName("localhost") .addSubjectAlternativeName("localhost") .build() val handshakeCertificates = HandshakeCertificates.Builder() .heldCertificate(heldCertificate)
Registered: Sun Jun 16 04:42:17 UTC 2024 - Last Modified: Sat Jan 20 10:30:28 UTC 2024 - 3.7K bytes - Viewed (0) -
security/pkg/server/ca/authenticate/xfcc_authenticator.go
return nil, fmt.Errorf(message) } ids := []string{} for _, cc := range clientCerts { ids = append(ids, cc.URI...) ids = append(ids, cc.DNS...) if cc.Subject != nil { ids = append(ids, cc.Subject.CommonName) } } return &security.Caller{ AuthSource: security.AuthSourceClientCertificate, Identities: ids, }, nil } func isTrustedAddress(addr string, trustedCidrs []string) bool {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 08 17:05:56 UTC 2024 - 3K bytes - Viewed (0)