- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 119 for certFiles (0.16 sec)
-
staging/src/k8s.io/cli-runtime/pkg/genericclioptions/config_flags.go
} if f.CacheDir != nil { flags.StringVar(f.CacheDir, flagCacheDir, *f.CacheDir, "Default cache directory") } // add config options if f.CertFile != nil { flags.StringVar(f.CertFile, flagCertFile, *f.CertFile, "Path to a client certificate file for TLS") } if f.KeyFile != nil { flags.StringVar(f.KeyFile, flagKeyFile, *f.KeyFile, "Path to a client key file for TLS") }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Oct 11 15:04:11 UTC 2023 - 16.9K bytes - Viewed (0) -
security/pkg/pki/util/keycertbundle.go
// NewVerifiedKeyCertBundleFromFile returns a new KeyCertBundle, or error if the provided certs failed the // verification. func NewVerifiedKeyCertBundleFromFile(certFile string, privKeyFile string, certChainFiles []string, rootCertFile string) ( *KeyCertBundle, error, ) { certBytes, err := os.ReadFile(certFile) if err != nil { return nil, err } privKeyBytes, err := os.ReadFile(privKeyFile) if err != nil { return nil, err }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Jan 21 06:07:50 UTC 2024 - 10.5K bytes - Viewed (0) -
pkg/test/echo/server/forwarder/config.go
} func getClientCertificateFunc(r *proto.ForwardEchoRequest) (func(info *tls.CertificateRequestInfo) (*tls.Certificate, error), error) { if r.KeyFile != "" && r.CertFile != "" { certData, err := os.ReadFile(r.CertFile) if err != nil { return nil, fmt.Errorf("failed to load client certificate: %v", err) } r.Cert = string(certData) keyData, err := os.ReadFile(r.KeyFile) if err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Oct 08 09:39:20 UTC 2023 - 9.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/serving_test.go
} } func x509CertSignature(cert *x509.Certificate) string { return base64.StdEncoding.EncodeToString(cert.Signature) } func certFileSignature(certFile, keyFile string) (string, error) { cert, err := tls.LoadX509KeyPair(certFile, keyFile) if err != nil { return "", err } return certSignature(cert) } func certSignature(cert tls.Certificate) (string, error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu May 09 15:52:39 UTC 2024 - 13.8K bytes - Viewed (0) -
pkg/webhooks/validation/server/server_test.go
t.Helper() dir := t.TempDir() var ( certFile = filepath.Join(dir, "cert-file.yaml") keyFile = filepath.Join(dir, "key-file.yaml") port = uint(0) ) // cert if err := os.WriteFile(certFile, testcerts.ServerCert, 0o644); err != nil { // nolint: vetshadow t.Fatalf("WriteFile(%v) failed: %v", certFile, err) } // key
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Mar 01 01:34:15 UTC 2023 - 9.6K bytes - Viewed (0) -
pkg/kubelet/client/kubelet_client.go
func (c *KubeletClientConfig) transportConfig() *transport.Config { cfg := &transport.Config{ TLS: transport.TLSConfig{ CAFile: c.TLSClientConfig.CAFile, CertFile: c.TLSClientConfig.CertFile, KeyFile: c.TLSClientConfig.KeyFile, // transport.loadTLSFiles would set this to true because we are only using files // it is clearer to set it explicitly here so we remember that this is happening
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 07 01:34:49 UTC 2023 - 7.4K bytes - Viewed (0) -
cluster/images/etcd/migrate/integration_test.go
} certDir := "/tmp/certs" certFile := filepath.Join(certDir, "test.crt") keyFile := filepath.Join(certDir, "test.key") err := getOrCreateTestCertFiles(certFile, keyFile, spec) if err != nil { t.Fatalf("failed to create server cert: %v", err) } return fmt.Sprintf("--peer-client-cert-auth --peer-trusted-ca-file=%s --peer-cert-file=%s --peer-key-file=%s", certFile, certFile, keyFile) } type TestCertSpec struct {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Mar 28 07:33:23 UTC 2022 - 11.4K bytes - Viewed (0) -
cmd/kubeadm/app/preflight/checks_test.go
) } } func TestConfigCertAndKey(t *testing.T) { certFile, err := os.CreateTemp(os.TempDir(), "kubeadm-external-etcd-test-certfile") if err != nil { t.Errorf( "failed configCertAndKey:\n\texpected: succeed creating temp CertFile file\n\tactual:%v", err, ) } defer utiltesting.CloseAndRemove(t, certFile) if _, err := certFile.Write([]byte(externalEtcdCertFileContent)); err != nil { t.Errorf(
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 29 06:58:01 UTC 2024 - 33.5K bytes - Viewed (0) -
staging/src/k8s.io/apiextensions-apiserver/test/integration/storage/objectreader.go
} // GetEtcdClients returns an initialized clientv3.Client and clientv3.KV. func GetEtcdClients(config storagebackend.TransportConfig) (*clientv3.Client, clientv3.KV, error) { tlsInfo := transport.TLSInfo{ CertFile: config.CertFile, KeyFile: config.KeyFile, TrustedCAFile: config.TrustedCAFile, } tlsConfig, err := tlsInfo.ClientConfig() if err != nil { return nil, nil, err }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jun 15 13:53:06 UTC 2021 - 4.7K bytes - Viewed (0) -
pkg/test/echo/proto/echo.proto
string cert = 10; string key = 11; // If non-empty, verify the server CA string caCert = 12; // If non-empty, make the request with the corresponding cert and key file. string certFile = 16; string keyFile = 17; // If non-empty, verify the server CA with the ca cert file. string caCertFile = 18; // Skip verifying peer's certificate. bool insecureSkipVerify = 19;
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jan 31 17:42:23 UTC 2023 - 3.8K bytes - Viewed (0)