- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 20 for serverAuth (0.27 sec)
-
tests/testdata/certs/generate.sh
req_extensions = v3_req distinguished_name = req_distinguished_name [req_distinguished_name] [ v3_req ] basicConstraints = CA:FALSE keyUsage = nonRepudiation, digitalSignature, keyEncipherment extendedKeyUsage = clientAuth, serverAuth subjectAltName = @alt_names [alt_names] URI = spiffe://cluster.local/ns/default/sa/default EOF cat > "${WD}/dns-client.conf" <<EOF [req] req_extensions = v3_req distinguished_name = req_distinguished_name
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jul 05 19:49:21 UTC 2023 - 7.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/util/webhook/gencerts.sh
extendedKeyUsage = clientAuth, serverAuth EOF cat > client.conf << EOF [req] req_extensions = v3_req distinguished_name = req_distinguished_name [req_distinguished_name] [ v3_req ] basicConstraints = CA:FALSE keyUsage = nonRepudiation, digitalSignature, keyEncipherment extendedKeyUsage = clientAuth, serverAuth subjectAltName = @alt_names [alt_names] IP.1 = 127.0.0.1 EOF
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 25 15:57:40 UTC 2022 - 5.7K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/admission/plugin/webhook/testcerts/gencerts.sh
req_extensions = v3_req distinguished_name = req_distinguished_name [req_distinguished_name] [ v3_req ] basicConstraints = CA:FALSE keyUsage = nonRepudiation, digitalSignature, keyEncipherment extendedKeyUsage = clientAuth, serverAuth subjectAltName = @alt_names [alt_names] IP.1 = 127.0.0.1 DNS.1 = webhook-test.default.svc EOF cat > client.conf << EOF [req] req_extensions = v3_req distinguished_name = req_distinguished_name
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jan 24 05:55:09 UTC 2019 - 3.5K bytes - Viewed (0) -
src/crypto/x509/name_constraints_test.go
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 09 22:40:21 UTC 2024 - 45.2K bytes - Viewed (0) -
tests/integration/security/sds_ingress/util/generate_certs.sh
req_extensions = v3_req distinguished_name = req_distinguished_name [req_distinguished_name] [ v3_req ] basicConstraints = CA:FALSE keyUsage = nonRepudiation, digitalSignature, keyEncipherment extendedKeyUsage = clientAuth, serverAuth subjectAltName = @alt_names [alt_names] DNS = *.example.com EOF cat > "${WD}/server.conf" <<EOF [req] req_extensions = v3_req distinguished_name = req_distinguished_name [req_distinguished_name]
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jul 05 22:01:21 UTC 2023 - 5K bytes - Viewed (0) -
pkg/testcerts/generate-certs.sh
req_extensions = v3_req distinguished_name = req_distinguished_name [req_distinguished_name] [ v3_req ] basicConstraints = CA:FALSE keyUsage = nonRepudiation, digitalSignature, keyEncipherment extendedKeyUsage = clientAuth, serverAuth subjectAltName = @alt_names [alt_names] IP.1 = 127.0.0.1 IP.2 = ::1 EOF cat > server.conf <<EOF [req] req_extensions = v3_req distinguished_name = req_distinguished_name [req_distinguished_name]
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed May 24 14:06:41 UTC 2023 - 3.3K bytes - Viewed (0) -
tools/certs/common.mk
@echo "[ req_ext ]" >> $@ @echo "subjectKeyIdentifier = hash" >> $@ @echo "basicConstraints = critical, CA:false" >> $@ @echo "keyUsage = digitalSignature, keyEncipherment" >> $@ @echo "extendedKeyUsage = serverAuth, clientAuth" >> $@ @echo "subjectAltName=@san" >> $@ @echo "[ san ]" >> $@ @echo "URI.1 = spiffe://cluster.local/ns/$(L)sa/$(SERVICE_ACCOUNT)" >> $@ @echo "[ req_dn ]" >> $@ @echo "O = $(INTERMEDIATE_ORG)" >> $@
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Feb 20 08:51:56 UTC 2023 - 3.6K bytes - Viewed (0) -
samples/certs/generate-workload.sh
req_extensions = v3_req x509_extensions = v3_req prompt = no [req_distinguished_name] countryName = US [v3_req] keyUsage = critical, digitalSignature, keyEncipherment extendedKeyUsage = serverAuth, clientAuth basicConstraints = critical, CA:FALSE subjectAltName = critical, @alt_names [alt_names] URI = $san EOF certchain="$FINAL_DIR"/cert-chain.pem cacert="$FINAL_DIR"/ca-cert.pem
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Feb 07 23:57:35 UTC 2023 - 3.2K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/plugin/pkg/authorizer/webhook/gencerts.sh
[req] req_extensions = v3_req distinguished_name = req_distinguished_name [req_distinguished_name] [ v3_req ] basicConstraints = CA:FALSE keyUsage = nonRepudiation, digitalSignature, keyEncipherment extendedKeyUsage = serverAuth subjectAltName = @alt_names [alt_names] IP.1 = 127.0.0.1 EOF cat > client.conf << EOF [req] req_extensions = v3_req distinguished_name = req_distinguished_name [req_distinguished_name] [ v3_req ]
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Feb 23 02:28:04 UTC 2019 - 3.4K bytes - Viewed (0) -
plugin/pkg/admission/imagepolicy/gencerts.sh
[req] req_extensions = v3_req distinguished_name = req_distinguished_name [req_distinguished_name] [ v3_req ] basicConstraints = CA:FALSE keyUsage = nonRepudiation, digitalSignature, keyEncipherment extendedKeyUsage = serverAuth subjectAltName = @alt_names [alt_names] IP.1 = 127.0.0.1 EOF cat > client.conf << EOF [req] req_extensions = v3_req distinguished_name = req_distinguished_name [req_distinguished_name] [ v3_req ]
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Oct 10 14:59:09 UTC 2019 - 3.5K bytes - Viewed (0)