- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 60 for rootcert2 (0.11 sec)
-
pilot/pkg/keycertbundle/watcher.go
func (w *Watcher) SetFromFilesAndNotify(keyFile, certFile, rootCert string) error { cert, err := os.ReadFile(certFile) if err != nil { return err } key, err := os.ReadFile(keyFile) if err != nil { return err } caBundle, err := os.ReadFile(rootCert) if err != nil { return err } w.SetAndNotify(key, cert, caBundle) return nil }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jun 05 14:00:18 UTC 2023 - 2.6K bytes - Viewed (0) -
tests/integration/security/filebased_tls_origination/main_test.go
WorkloadPort: 8092, TLS: true, }, }, // Set up TLS certs on the server. This will make the server listen with these credentials. TLSSettings: &common.TLSSettings{ RootCert: mustReadCert("root-cert.pem"), ClientCert: mustReadCert("cert-chain.pem"), Key: mustReadCert("key.pem"), // Override hostname to match the SAN in the cert we are using Hostname: "server.default.svc",
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 02 21:29:40 UTC 2024 - 7.3K bytes - Viewed (0) -
pilot/pkg/networking/core/cluster_tls_test.go
err error } // TestBuildUpstreamClusterTLSContext tests the buildUpstreamClusterTLSContext function func TestBuildUpstreamClusterTLSContext(t *testing.T) { clientCert := "/path/to/cert" rootCert := "path/to/cacert" clientKey := "/path/to/key" credentialName := "some-fake-credential" testCases := []struct { name string opts *buildClusterOpts
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 06 03:53:05 UTC 2024 - 60.9K bytes - Viewed (0) -
src/crypto/x509/root.go
"sync" _ "unsafe" // for linkname ) // systemRoots should be an internal detail, // but widely used packages access it using linkname. // Notable members of the hall of shame include: // - github.com/breml/rootcerts // // Do not remove or change the type signature. // See go.dev/issue/67401. // //go:linkname systemRoots var ( once sync.Once systemRootsMu sync.RWMutex systemRoots *CertPool
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 2.3K bytes - Viewed (0) -
pkg/test/framework/components/echo/common/deployment/external.go
Ports: ports.All(), // Set up TLS certs on the server. This will make the server listen with these credentials. TLSSettings: &common.TLSSettings{ // Echo has these test certs baked into the docker image RootCert: file.MustAsString(path.Join(env.IstioSrc, "tests/testdata/certs/dns/root-cert.pem")), ClientCert: file.MustAsString(path.Join(env.IstioSrc, "tests/testdata/certs/dns/cert-chain.pem")),
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 20 16:01:31 UTC 2024 - 2.7K bytes - Viewed (0) -
tools/packaging/common/gcp_envoy_bootstrap.json
"target_uri": "{{ .discovery_address }}", "stat_prefix": "googlegrpcxds", "channel_credentials": { "ssl_credentials": { {{ with .xds_root_cert}}"root_certs": {"filename": "{{.}}"}{{ end }} } }, "call_credentials": [{ {{ if .sts }} "sts_service": {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 16 17:05:28 UTC 2024 - 6.9K bytes - Viewed (0) -
pkg/adsc/adsc.go
XDSSAN string // XDSRootCAFile explicitly set the root CA to be used for the XDS connection. // Mirrors Envoy file. XDSRootCAFile string // RootCert contains the XDS root certificate. Used mainly for tests, apps will normally use // XDSRootCAFile RootCert []byte // InsecureSkipVerify skips client verification the server's certificate chain and host name. InsecureSkipVerify bool
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Feb 05 22:18:49 UTC 2024 - 35K bytes - Viewed (0) -
security/pkg/pki/ca/selfsignedcarootcertrotator_test.go
client := rotator.config.client caSecret, _ := client.Secrets(rotator.config.caStorageNamespace).Get(context.TODO(), rotator.config.secretName, metav1.GetOptions{}) rootCert := rotator.ca.keyCertBundle.GetRootCertPem() return rootCertItem{caSecret: caSecret, rootCertInKeyCertBundle: rootCert} } // TestRootCertRotatorForSigningCitadel verifies that rotator rotates root cert, // updates key cert bundle and config map.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Oct 11 23:33:41 UTC 2023 - 14.1K bytes - Viewed (0) -
pkg/test/framework/components/echo/kube/templates/deployment.yaml
--- {{- end }} {{- end }} {{- if .TLSSettings}}{{if not .TLSSettings.ProxyProvision }} apiVersion: v1 kind: ConfigMap metadata: name: {{ $.Service }}-certs data: root-cert.pem: | {{ .TLSSettings.RootCert | indent 4 }} cert-chain.pem: | {{ .TLSSettings.ClientCert | indent 4 }} key.pem: | {{.TLSSettings.Key | indent 4}} ---
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 02 21:29:40 UTC 2024 - 6.1K bytes - Viewed (0) -
pkg/spiffe/spiffe_test.go
if block == nil { t.Fatalf("Can't decode the root cert.") } rootCert, err := x509.ParseCertificate(block.Bytes) if err != nil { t.Fatalf("Failed to parse certificate: " + err.Error()) } certMap[trustDomain] = append(certMap[trustDomain], rootCert) } } verifier := NewPeerCertVerifier() verifier.AddMappings(certMap)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 18.1K bytes - Viewed (0)