- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 61 for rootcert1 (0.18 sec)
-
pkg/spiffe/spiffe_test.go
if block == nil { t.Fatalf("Can't decode the root cert.") } rootCert, err := x509.ParseCertificate(block.Bytes) if err != nil { t.Fatalf("Failed to parse certificate: " + err.Error()) } certMap[trustDomain] = append(certMap[trustDomain], rootCert) } } verifier := NewPeerCertVerifier() verifier.AddMappings(certMap)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 18.1K bytes - Viewed (0) -
security/pkg/pki/util/keycertbundle_test.go
IsCA: true, IsSelfSigned: true, TTL: time.Hour, RSAKeySize: 2048, }) if err != nil { t.Errorf("failed to gen root cert for Citadel self signed cert %v", err) } rootCert, err := ParsePemEncodedCertificate(rootCertBytes) if err != nil { t.Errorf("failed to parsing pem for root cert %v", err) } rootKey, err := ParsePemEncodedKey(rootKeyBytes) if err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Jan 21 06:07:50 UTC 2024 - 15.8K bytes - Viewed (0) -
pkg/apis/certificates/validation/validation_test.go
goodCert2Block := string(mustMakePEMBlock("CERTIFICATE", nil, goodCert2)) goodCert1AlternateBlock := strings.ReplaceAll(goodCert1Block, "\n", "\n\t\n") badNotCACertBlock := string(mustMakePEMBlock("CERTIFICATE", nil, badNotCACert)) badBlockHeadersBlock := string(mustMakePEMBlock("CERTIFICATE", map[string]string{"key": "value"}, goodCert1))
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Nov 03 18:40:49 UTC 2023 - 61K bytes - Viewed (0) -
tests/integration/security/util/framework.go
}, }, // Set up TLS certs on the server. This will make the server listen with these credentials. TLSSettings: &common.TLSSettings{ // Echo has these test certs baked into the docker image RootCert: mustReadCert("root-cert.pem"), ClientCert: mustReadCert("cert-chain.pem"), Key: mustReadCert("key.pem"), // Override hostname to match the SAN in the cert we are using Hostname: "server.default.svc",
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 02 21:29:40 UTC 2024 - 8.4K bytes - Viewed (0) -
pilot/pkg/bootstrap/server.go
var err error if s.CA != nil { // If IstioCA is setup, derive trustAnchor directly from CA rootCerts := []string{string(s.CA.GetCAKeyCertBundle().GetRootCertPem())} err = s.workloadTrustBundle.UpdateTrustAnchor(&tb.TrustAnchorUpdate{ TrustAnchorConfig: tb.TrustAnchorConfig{Certs: rootCerts}, Source: tb.SourceIstioCA, }) if err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 17:48:28 UTC 2024 - 46.3K bytes - Viewed (0) -
security/pkg/pki/util/keycertbundle.go
"time" ) // KeyCertBundle stores the cert, private key, cert chain and root cert for an entity. It is thread safe. // The cert and privKey should be a public/private key pair. // The cert should be verifiable from the rootCert through the certChain. // cert and priveKey are pointers to the cert/key parsed from certBytes/privKeyBytes. type KeyCertBundle struct { certBytes []byte cert *x509.Certificate privKeyBytes []byte
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Jan 21 06:07:50 UTC 2024 - 10.5K bytes - Viewed (0) -
security/pkg/k8s/chiron/utils_test.go
func TestGenKeyCertK8sCA(t *testing.T) { log.FindScope("default").SetOutputLevel(log.DebugLevel) signers, client := runTestSigner(t) ca := filepath.Join(t.TempDir(), "root-cert.pem") os.WriteFile(ca, []byte(signers[0].Rootcert), 0o666) _, _, _, err := GenKeyCertK8sCA(client.Kube(), "foo", ca, testSigner, true, DefaulCertTTL) assert.NoError(t, err) } func TestReadCACert(t *testing.T) { testCases := map[string]struct {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed May 15 03:58:11 UTC 2024 - 13K bytes - Viewed (0) -
src/crypto/x509/name_constraints_test.go
var parent *Certificate parentKey := rootKey for _, root := range test.roots { rootCert, err := makeConstraintsCACert(root, rootName, rootKey, nil, rootKey) if err != nil { t.Fatalf("failed to create root: %s", err) } parent = rootCert rootPool.AddCert(rootCert) } intermediatePool := NewCertPool()
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 09 22:40:21 UTC 2024 - 45.2K bytes - Viewed (0) -
hack/unwanted-dependencies.json
"github.com/hashicorp/go-multierror": "MPL license not in CNCF allowlist", "github.com/hashicorp/go-retryablehttp": "MPL license not in CNCF allowlist", "github.com/hashicorp/go-rootcerts": "MPL license not in CNCF allowlist", "github.com/hashicorp/go-sockaddr": "MPL license not in CNCF allowlist", "github.com/hashicorp/go-uuid": "MPL license not in CNCF allowlist",
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jun 13 12:31:38 UTC 2024 - 9.8K bytes - Viewed (0) -
istioctl/pkg/workload/workload.go
// TODO: Make the following accurate when using the Kubernetes certificate signer func createCertsTokens(kubeClient kube.CLIClient, wg *clientv1alpha3.WorkloadGroup, dir string, out io.Writer) error { rootCert, err := kubeClient.Kube().CoreV1().ConfigMaps(wg.Namespace).Get(context.Background(), controller.CACertNamespaceConfigMap, metav1.GetOptions{}) // errors if the requested configmap does not exist in the given namespace
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 20:06:41 UTC 2024 - 25.5K bytes - Viewed (0)