- Sort Score
- Result 10 results
- Languages All
Results 61 - 70 of 94 for rootTask (0.14 sec)
-
src/crypto/tls/common.go
// settings. VerifyConnection func(ConnectionState) error // RootCAs defines the set of root certificate authorities // that clients use when verifying server certificates. // If RootCAs is nil, TLS uses the host's root CA set. RootCAs *x509.CertPool // NextProtos is a list of supported application level protocols, in
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 59.1K bytes - Viewed (0) -
src/crypto/tls/example_test.go
roots := x509.NewCertPool() ok := roots.AppendCertsFromPEM([]byte(rootPEM)) if !ok { panic("failed to parse root certificate") } conn, err := tls.Dial("tcp", "mail.google.com:443", &tls.Config{ RootCAs: roots, }) if err != nil { panic("failed to connect: " + err.Error()) } conn.Close() } func ExampleConfig_keyLogWriter() { // Debugging TLS applications by decrypting a network traffic capture.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Mar 27 18:23:49 UTC 2024 - 7.8K bytes - Viewed (0) -
plugin/pkg/admission/imagepolicy/admission_test.go
return nil, err } tlsConfig = &tls.Config{Certificates: []tls.Certificate{cert}} } if caCert != nil { rootCAs := x509.NewCertPool() rootCAs.AppendCertsFromPEM(caCert) if tlsConfig == nil { tlsConfig = &tls.Config{} } tlsConfig.ClientCAs = rootCAs tlsConfig.ClientAuth = tls.RequireAndVerifyClientCert } serveHTTP := func(w http.ResponseWriter, r *http.Request) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 02 06:05:06 UTC 2023 - 32.9K bytes - Viewed (0) -
staging/src/k8s.io/apiextensions-apiserver/test/integration/conversion/webhook.go
} webhookMux := http.NewServeMux() webhookMux.Handle("/convert", handler) webhookServer := httptest.NewUnstartedServer(webhookMux) webhookServer.TLS = &tls.Config{ RootCAs: roots, Certificates: []tls.Certificate{cert}, } webhookServer.StartTLS() endpoint := webhookServer.URL + "/convert" webhookConfig := &apiextensionsv1.WebhookClientConfig{ CABundle: localhostCert,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Dec 14 01:38:09 UTC 2022 - 10.2K bytes - Viewed (0) -
platforms/core-configuration/kotlin-dsl-integ-tests/src/integTest/kotlin/org/gradle/kotlin/dsl/integration/ProjectSchemaAccessorsIntegrationTest.kt
) withBuildScriptIn("a", "") val aTasks = build(":a:tasks").output assertThat(aTasks, containsString("kotlinDslAccessorsReport")) val rootTasks = build(":tasks").output assertThat( rootTasks, containsString("kotlinDslAccessorsReport") ) } @Test fun `accessor to extension of jvm type is accessible and typed`() {
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Mon Jan 29 11:39:00 UTC 2024 - 39.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/storage/storage_factory.go
klog.Errorf("failed to read ca file while getting backends: %s", err) } else { caPool := x509.NewCertPool() caPool.AppendCertsFromPEM(caCert) tlsConfig.RootCAs = caPool tlsConfig.InsecureSkipVerify = false } } backends := []Backend{} for server := range servers { backends = append(backends, Backend{ Server: server,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Oct 20 13:35:58 UTC 2023 - 14.1K bytes - Viewed (0) -
src/crypto/tls/bogo_shim_test.go
} block, _ := pem.Decode(certFile) cert, err := x509.ParseCertificate(block.Bytes) if err != nil { log.Fatalf("parse trust-cert err: %s", err) } pool.AddCert(cert) cfg.RootCAs = pool } if *requireAnyClientCertificate { cfg.ClientAuth = RequireAnyClientCert } if *verifyPeer { cfg.ClientAuth = VerifyClientCertIfGiven } if *echConfigListB64 != "" {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jun 11 17:25:39 UTC 2024 - 12.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/plugin/pkg/authorizer/webhook/webhook_v1_test.go
return nil, err } tlsConfig = &tls.Config{Certificates: []tls.Certificate{cert}} } if caCert != nil { rootCAs := x509.NewCertPool() rootCAs.AppendCertsFromPEM(caCert) if tlsConfig == nil { tlsConfig = &tls.Config{} } tlsConfig.ClientCAs = rootCAs tlsConfig.ClientAuth = tls.RequireAndVerifyClientCert } serveHTTP := func(w http.ResponseWriter, r *http.Request) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 24 18:25:29 UTC 2024 - 43.2K bytes - Viewed (0) -
cmd/config-current.go
} if err == nil && dnsURL != "" { bootstrapTraceMsg("initialize remote bucket DNS store") globalDNSConfig, err = dns.NewOperatorDNS(dnsURL, dns.Authentication(dnsUser, dnsPass), dns.RootCAs(globalRootCAs)) if err != nil { configLogIf(ctx, fmt.Errorf("Unable to initialize remote webhook DNS config %w", err)) } }
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu May 30 08:14:58 UTC 2024 - 30.8K bytes - Viewed (0) -
cmd/data-usage-cache.go
} return n } // root returns the root of the cache. func (d *dataUsageCache) root() *dataUsageEntry { return d.find(d.Info.Name) } // rootHash returns the root of the cache. func (d *dataUsageCache) rootHash() dataUsageHash { return hashPath(d.Info.Name) } // clone returns a copy of the cache with no references to the existing. func (d *dataUsageCache) clone() dataUsageCache {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 10 14:49:50 UTC 2024 - 42.8K bytes - Viewed (0)