- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 13 for SNICerts (0.12 sec)
-
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/named_certificates.go
nameToCertificate := map[string]*tls.Certificate{} byNameExplicit := map[string]*tls.Certificate{} // Iterate backwards so that earlier certs take precedence in the names map for i := len(sniCerts) - 1; i >= 0; i-- { cert, err := tls.X509KeyPair(sniCerts[i].cert, sniCerts[i].key) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jul 21 07:29:30 UTC 2022 - 3.2K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/server_test.go
certProvider, err := createTestTLSCerts(certSpec, names) if err != nil { t.Fatal(err) } sniCerts = append(sniCerts, certProvider) } dynamicCertificateController := NewDynamicServingCertificateController( tlsConfig, &nullCAContent{name: "client-ca"}, defaultCertProvider, sniCerts, nil, // TODO see how to plumb an event recorder down in here. For now this results in simply klog messages. )
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 12 18:29:15 UTC 2021 - 6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/tlsconfig_test.go
clientCA CAContentProvider servingCert CertKeyContentProvider sniCerts []SNICertKeyContentProvider expected *dynamicCertificateContent expectedErr string }{ { name: "filled", clientCA: &staticCAContent{name: "test-ca", caBundle: &caBundleAndVerifier{caBundle: []byte("content-1")}}, servingCert: testCertProvider, sniCerts: []SNICertKeyContentProvider{testCertProvider},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 14 00:05:53 UTC 2023 - 5.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/tlsconfig.go
clientCA CAContentProvider, servingCert CertKeyContentProvider, sniCerts []SNICertKeyContentProvider, eventRecorder events.EventRecorder, ) *DynamicServingCertificateController { c := &DynamicServingCertificateController{ baseTLSConfig: baseTLSConfig, clientCA: clientCA, servingCert: servingCert, sniCerts: sniCerts, queue: workqueue.NewTypedRateLimitingQueueWithConfig(
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 10.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/client_ca.go
} if !c.clientCA.Equal(&rhs.clientCA) { return false } if !c.servingCert.Equal(&rhs.servingCert) { return false } if len(c.sniCerts) != len(rhs.sniCerts) { return false } for i := range c.sniCerts { if !c.sniCerts[i].Equal(&rhs.sniCerts[i]) { return false } } return true } func (c *caBundleContent) Equal(rhs *caBundleContent) bool { if c == nil || rhs == nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 12 18:29:15 UTC 2021 - 1.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/serving_with_loopback.go
return fmt.Errorf("failed to generate self-signed certificate for loopback connection: %v", err) } // Write to the front of SNICerts so that this overrides any other certs with the same name (*secureServingInfo).SNICerts = append([]dynamiccertificates.SNICertKeyContentProvider{certProvider}, (*secureServingInfo).SNICerts...) secureLoopbackClientConfig, err := (*secureServingInfo).NewLoopbackClientConfig(uuid.New().String(), certPem) switch {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 23 00:50:06 UTC 2021 - 2.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/named_certificates_test.go
continue NextTest } bySignature[sig] = j } c := DynamicServingCertificateController{sniCerts: sniCerts} content, err := c.newTLSContent() assert.NoError(t, err) certMap, err := c.BuildNamedCertificates(content.sniCerts) if err == nil && len(test.errorString) != 0 { t.Errorf("%d - expected no error, got: %v", i, err)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Aug 20 08:42:09 UTC 2021 - 8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/serving_test.go
host: "localhost", ips: []string{"127.0.0.1"}, }, SNICerts: []NamedTestCertSpec{ { TestCertSpec: TestCertSpec{ host: "localhost", }, }, }, ExpectedCertIndex: 0, }, "matching SNI cert": { Cert: TestCertSpec{ host: "localhost", ips: []string{"127.0.0.1"}, }, SNICerts: []NamedTestCertSpec{ { TestCertSpec: TestCertSpec{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 09 15:52:39 UTC 2024 - 13.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/serving_with_loopback_test.go
t.Errorf("unexpected error: %v", err) } if loopbackClientConfig == nil { t.Errorf("unexpected empty loopbackClientConfig") } if e, a := 1, len(secureServingInfo.SNICerts); e != a { t.Errorf("expected %d SNICert, got %d", e, a) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Aug 20 08:42:09 UTC 2021 - 1.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/secure_serving.go
tlsConfig.ClientAuth = tls.RequestClientCert } if s.ClientCA != nil || s.Cert != nil || len(s.SNICerts) > 0 { dynamicCertificateController := dynamiccertificates.NewDynamicServingCertificateController( tlsConfig, s.ClientCA, s.Cert, s.SNICerts, nil, // TODO see how to plumb an event recorder down in here. For now this results in simply klog messages. ) if s.ClientCA != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Oct 12 20:54:07 UTC 2023 - 10.3K bytes - Viewed (0)