- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 13 for sniCerts (0.13 sec)
-
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/named_certificates.go
nameToCertificate := map[string]*tls.Certificate{} byNameExplicit := map[string]*tls.Certificate{} // Iterate backwards so that earlier certs take precedence in the names map for i := len(sniCerts) - 1; i >= 0; i-- { cert, err := tls.X509KeyPair(sniCerts[i].cert, sniCerts[i].key) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jul 21 07:29:30 UTC 2022 - 3.2K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/server_test.go
certProvider, err := createTestTLSCerts(certSpec, names) if err != nil { t.Fatal(err) } sniCerts = append(sniCerts, certProvider) } dynamicCertificateController := NewDynamicServingCertificateController( tlsConfig, &nullCAContent{name: "client-ca"}, defaultCertProvider, sniCerts, nil, // TODO see how to plumb an event recorder down in here. For now this results in simply klog messages. )
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 12 18:29:15 UTC 2021 - 6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/tlsconfig.go
} for i, sniCert := range c.sniCerts { currCert, currKey := sniCert.CurrentCertKeyContent() if len(currCert) == 0 || len(currKey) == 0 { return nil, fmt.Errorf("not loading an empty SNI certificate from %d/%q", i, sniCert.Name()) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 10.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/tlsconfig_test.go
clientCA CAContentProvider servingCert CertKeyContentProvider sniCerts []SNICertKeyContentProvider expected *dynamicCertificateContent expectedErr string }{ { name: "filled", clientCA: &staticCAContent{name: "test-ca", caBundle: &caBundleAndVerifier{caBundle: []byte("content-1")}}, servingCert: testCertProvider, sniCerts: []SNICertKeyContentProvider{testCertProvider},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 14 00:05:53 UTC 2023 - 5.3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/client_ca.go
} if !c.clientCA.Equal(&rhs.clientCA) { return false } if !c.servingCert.Equal(&rhs.servingCert) { return false } if len(c.sniCerts) != len(rhs.sniCerts) { return false } for i := range c.sniCerts { if !c.sniCerts[i].Equal(&rhs.sniCerts[i]) { return false } } return true } func (c *caBundleContent) Equal(rhs *caBundleContent) bool { if c == nil || rhs == nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 12 18:29:15 UTC 2021 - 1.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/serving_with_loopback.go
return fmt.Errorf("failed to generate self-signed certificate for loopback connection: %v", err) } // Write to the front of SNICerts so that this overrides any other certs with the same name (*secureServingInfo).SNICerts = append([]dynamiccertificates.SNICertKeyContentProvider{certProvider}, (*secureServingInfo).SNICerts...) secureLoopbackClientConfig, err := (*secureServingInfo).NewLoopbackClientConfig(uuid.New().String(), certPem) switch {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 23 00:50:06 UTC 2021 - 2.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/named_certificates_test.go
continue NextTest } bySignature[sig] = j } c := DynamicServingCertificateController{sniCerts: sniCerts} content, err := c.newTLSContent() assert.NoError(t, err) certMap, err := c.BuildNamedCertificates(content.sniCerts) if err == nil && len(test.errorString) != 0 { t.Errorf("%d - expected no error, got: %v", i, err)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Aug 20 08:42:09 UTC 2021 - 8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/serving_test.go
host: "localhost", ips: []string{"127.0.0.1"}, }, SNICerts: []NamedTestCertSpec{ { TestCertSpec: TestCertSpec{ host: "localhost", }, }, }, ExpectedCertIndex: 0, }, "matching SNI cert": { Cert: TestCertSpec{ host: "localhost", ips: []string{"127.0.0.1"}, }, SNICerts: []NamedTestCertSpec{ { TestCertSpec: TestCertSpec{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 09 15:52:39 UTC 2024 - 13.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/serving_with_loopback_test.go
t.Errorf("unexpected error: %v", err) } if loopbackClientConfig == nil { t.Errorf("unexpected empty loopbackClientConfig") } if e, a := 1, len(secureServingInfo.SNICerts); e != a { t.Errorf("expected %d SNICert, got %d", e, a) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Aug 20 08:42:09 UTC 2021 - 1.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/secure_serving.go
klog.Warningf("Initial population of default serving certificate failed: %v", err) } go controller.Run(ctx, 1) } for _, sniCert := range s.SNICerts { sniCert.AddListener(dynamicCertificateController) if controller, ok := sniCert.(dynamiccertificates.ControllerRunner); ok { // runonce to try to prime data. If this fails, it's ok because we fail closed.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Oct 12 20:54:07 UTC 2023 - 10.3K bytes - Viewed (0)