Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 60 for rootCert (0.31 sec)

  1. tests/integration/security/external_ca/main_test.go

                  value: |-
                    name: inject-volume
                    mountPath: /var/lib/istio/inject
    {{- end }}
    `, map[string]any{
    		"rootcert1":              cert1.Rootcert,
    		"signer1":                cert1.Signer,
    		"rootcert2":              cert2.Rootcert,
    		"signer2":                cert2.Signer,
    		"isConfigCluster":        isConfigCluster,
    		"isExternalControlPlane": isExternalControlPlane,
    	})
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Mar 22 14:18:21 UTC 2023
    - 4.7K bytes
    - Viewed (0)
  2. security/pkg/nodeagent/cache/secretcache.go

    	defer cancel()
    	if err := b.RetryWithContext(ctx, certValid); err != nil {
    		return nil, err
    	}
    
    	// Set the rootCert only if it is workload root cert.
    	if workload {
    		sc.cache.SetRoot(rootCert)
    	}
    	return &security.SecretItem{
    		ResourceName: resourceName,
    		RootCert:     rootCert,
    	}, nil
    }
    
    // Generate a key and certificate item from the existing key certificate files from the passed in file paths.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 04 08:29:46 UTC 2024
    - 28.2K bytes
    - Viewed (0)
  3. security/pkg/nodeagent/util/util.go

    	}
    	return cert.NotAfter, nil
    }
    
    // OutputKeyCertToDir output the key and certificate to the given directory.
    // If directory string is empty, return nil.
    func OutputKeyCertToDir(dir string, privateKey, certChain, rootCert []byte) error {
    	var err error
    	if len(dir) == 0 {
    		return nil
    	}
    
    	certFileMode := os.FileMode(0o600)
    	if k8sInCluster.Get() != "" {
    		// If this is running on k8s, give more permission to the file certs.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Oct 17 10:33:38 UTC 2023
    - 2.9K bytes
    - Viewed (0)
  4. tests/integration/security/ca_custom_root/main_test.go

    			{
    				Name:         "https",
    				Protocol:     protocol.HTTPS,
    				ServicePort:  443,
    				WorkloadPort: 8443,
    				TLS:          true,
    			},
    		},
    		TLSSettings: &common.TLSSettings{
    			RootCert:      rootCert,
    			ClientCert:    clientCert,
    			Key:           Key,
    			AcceptAnyALPN: true,
    		},
    	}
    
    	serverNakedBarConfig := echo.Config{
    		Namespace: customNs.Get(),
    		Service:   "server-naked-bar",
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 02 21:29:40 UTC 2024
    - 9.2K bytes
    - Viewed (0)
  5. cmd/kubeadm/app/phases/certs/certlist_test.go

    	}
    }
    
    func TestMakeCertTree(t *testing.T) {
    	rootCert := &KubeadmCert{
    		Name: "root",
    	}
    	leaf0 := &KubeadmCert{
    		Name:   "leaf0",
    		CAName: "root",
    	}
    	leaf1 := &KubeadmCert{
    		Name:   "leaf1",
    		CAName: "root",
    	}
    	selfSigned := &KubeadmCert{
    		Name: "self-signed",
    	}
    
    	certMap := CertificateMap{
    		"root":        rootCert,
    		"leaf0":       leaf0,
    		"leaf1":       leaf1,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 01 16:01:49 UTC 2024
    - 8.8K bytes
    - Viewed (0)
  6. samples/certs/generate-workload.sh

    EOF
    
    certchain="$FINAL_DIR"/cert-chain.pem
    cacert="$FINAL_DIR"/ca-cert.pem
    cakey="$FINAL_DIR"/ca-key.pem
    rootcert="$FINAL_DIR"/root-cert.pem
    
    if [[ "$rootselect" = "use-alternative-root" ]] ; then
      certchain="$FINAL_DIR"/cert-chain-alt.pem
      cacert="$FINAL_DIR"/ca-cert-alt.pem
      cakey="$FINAL_DIR"/ca-key-alt.pem
      rootcert="$FINAL_DIR"/root-cert-alt.pem
    fi
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Feb 07 23:57:35 UTC 2023
    - 3.2K bytes
    - Viewed (0)
  7. tests/integration/security/util/cert/cert.go

    	if err != nil {
    		return err
    	}
    
    	var caCert, caKey, certChain, rootCert []byte
    	if caCert, err = ReadSampleCertFromFile(caCertFile); err != nil {
    		return err
    	}
    	if caKey, err = ReadSampleCertFromFile(caKeyFile); err != nil {
    		return err
    	}
    	if certChain, err = ReadSampleCertFromFile(certChainFile); err != nil {
    		return err
    	}
    	if rootCert, err = ReadSampleCertFromFile(rootCertFile); err != nil {
    		return err
    	}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Dec 15 16:44:37 UTC 2023
    - 6.2K bytes
    - Viewed (0)
  8. security/pkg/nodeagent/caclient/providers/citadel/client.go

    	}
    
    	return resp.CertChain, nil
    }
    
    func (c *CitadelClient) getTLSOptions() *istiogrpc.TLSOptions {
    	if c.tlsOpts != nil {
    		return &istiogrpc.TLSOptions{
    			RootCert:      c.tlsOpts.RootCert,
    			Key:           c.tlsOpts.Key,
    			Cert:          c.tlsOpts.Cert,
    			ServerAddress: c.opts.CAEndpoint,
    			SAN:           c.opts.CAEndpointSAN,
    		}
    	}
    	return nil
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 16 22:12:28 UTC 2024
    - 4.9K bytes
    - Viewed (0)
  9. tests/integration/security/ca_custom_root/secure_naming_test.go

    			exampleCertChainLength, len(certs))
    		return
    	}
    	var rootCert []byte
    	var err error
    	if rootCert, err = cert.ReadSampleCertFromFile("root-cert.pem"); err != nil {
    		t.Errorf("error when reading expected CA cert: %v", err)
    		return
    	}
    	// Verify that the CA certificate is as expected
    	if strings.TrimSpace(string(rootCert)) != strings.TrimSpace(certs[2]) {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Apr 08 22:02:59 UTC 2024
    - 7.5K bytes
    - Viewed (0)
  10. pkg/test/echo/client.go

    		var certPool *x509.CertPool
    		certPool, err = x509.SystemCertPool()
    		if err != nil {
    			return nil, fmt.Errorf("failed to fetch Cert from SystemCertPool: %v", err)
    		}
    
    		if tlsSettings.RootCert != "" && !certPool.AppendCertsFromPEM([]byte(tlsSettings.RootCert)) {
    			return nil, fmt.Errorf("failed to create cert pool")
    		}
    		cfg := credentials.NewTLS(&tls.Config{Certificates: []tls.Certificate{cert}, RootCAs: certPool, MinVersion: tls.VersionTLS12})
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Nov 14 20:23:34 UTC 2022
    - 4.1K bytes
    - Viewed (0)
Back to top