/dports/sysutils/istio/istio-1.6.7/security/pkg/pki/util/ |
H A D | keycertbundle_test.go | 123 caKeyFile string 131 caKeyFile: rootKeyFile, 145 caKeyFile: keyFile1, 227 caKeyFile string 241 caKeyFile: intKeyFile, 255 caKeyFile: intKeyFile, 262 caKeyFile: intKeyFile, 269 caKeyFile: intKeyFile, 291 caKeyFile: intKeyFile, 300 caKeyFile: intKeyFile, [all …]
|
/dports/sysutils/kubectl/kubernetes-1.22.2/pkg/controller/certificates/signer/ |
H A D | signer.go | 51 caFile, caKeyFile string, 54 …g-kubelet-serving", capi.KubeletServingSignerName, client, csrInformer, caFile, caKeyFile, certTTL) 60 caFile, caKeyFile string, 63 …lient", capi.KubeAPIServerClientKubeletSignerName, client, csrInformer, caFile, caKeyFile, certTTL) 69 caFile, caKeyFile string, 78 caFile, caKeyFile string, 81 …acy-unknown", capiv1beta1.LegacyUnknownSignerName, client, csrInformer, caFile, caKeyFile, certTTL) 89 caFile, caKeyFile string, 92 signer, err := newSigner(signerName, caFile, caKeyFile, client, certTTL) 127 func newSigner(signerName, caFile, caKeyFile string, client clientset.Interface, certificateDuratio… [all …]
|
H A D | ca_provider.go | 31 func newCAProvider(caFile, caKeyFile string) (*caProvider, error) { 32 …, err := dynamiccertificates.NewDynamicServingContentFromFiles("csr-controller", caFile, caKeyFile)
|
/dports/security/certmgr/certmgr-3.0.3/vendor/github.com/cloudflare/cfssl/cfssl-2001f384ec4f/api/sign/ |
H A D | sign.go | 17 func NewHandler(caFile, caKeyFile string, policy *config.Signing) (http.Handler, error) { 21 "key-file": caKeyFile, 37 func NewAuthHandler(caFile, caKeyFile string, policy *config.Signing) (http.Handler, error) { 41 "key-file": caKeyFile,
|
/dports/security/certmgr/certmgr-3.0.3/vendor/github.com/cloudflare/cfssl/cfssl-2001f384ec4f/signer/local/ |
H A D | local_test.go | 396 caKeyFile := caKeys[i] 764 caKeyFile string 775 caKeyFile: testECDSACaKeyFile, 786 caKeyFile: testECDSACaKeyFile, 794 caKeyFile: testCaKeyFile, 802 caKeyFile: testCaKeyFile, 810 caKeyFile: testCaKeyFile, 818 caKeyFile: testECDSACaKeyFile, 831 caKeyFile: testECDSACaKeyFile, 839 caKeyFile: testECDSACaKeyFile, [all …]
|
H A D | local.go | 68 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { 74 log.Debug("Loading CA key: ", caKeyFile) 75 cakey, err := helpers.ReadBytes(caKeyFile)
|
/dports/net-mgmt/icinga2/icinga2-2.13.2/lib/remote/ |
H A D | pkiutility.cpp | 30 String caKeyFile = caDir + "/ca.key"; in NewCa() local 32 if (Utility::PathExists(caCertFile) && Utility::PathExists(caKeyFile)) { in NewCa() 34 << "CA files '" << caCertFile << "' and '" << caKeyFile << "' already exist."; in NewCa() 40 MakeX509CSR("Icinga CA", caKeyFile, String(), caCertFile, true); in NewCa()
|
/dports/sysutils/kubectl/kubernetes-1.22.2/cmd/kubeadm/app/util/staticpod/ |
H A D | utils_linux.go | 135 caKeyFile := filepath.Join(cfg.CertificatesDir, kubeadmconstants.CAKeyName) 136 err := updatePathOwnerAndPermissions(caKeyFile, *runAsUser, *runAsGroup, 0600)
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/ |
H A D | local.go | 66 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { 72 log.Debug("Loading CA key: ", caKeyFile) 73 cakey, err := ioutil.ReadFile(caKeyFile)
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/swarmkit/vendor/github.com/cloudflare/cfssl/signer/local/ |
H A D | local.go | 66 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { 72 log.Debug("Loading CA key: ", caKeyFile) 73 cakey, err := ioutil.ReadFile(caKeyFile)
|
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/ |
H A D | local.go | 66 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { 72 log.Debug("Loading CA key: ", caKeyFile) 73 cakey, err := ioutil.ReadFile(caKeyFile)
|
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/ |
H A D | local.go | 66 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { 72 log.Debug("Loading CA key: ", caKeyFile) 73 cakey, err := ioutil.ReadFile(caKeyFile)
|
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/ |
H A D | local.go | 66 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { 72 log.Debug("Loading CA key: ", caKeyFile) 73 cakey, err := ioutil.ReadFile(caKeyFile)
|
/dports/security/certmgr/certmgr-3.0.3/vendor/github.com/cloudflare/cfssl/cfssl-2001f384ec4f/api/generator/ |
H A D | generator.go | 169 func NewCertGeneratorHandler(validator Validator, caFile, caKeyFile string, policy *config.Signing)… 184 "ca-key-file": caKeyFile,
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/vendor/github.com/cloudflare/cfssl/signer/local/ |
H A D | local.go | 67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { 73 log.Debug("Loading CA key: ", caKeyFile) 74 cakey, err := helpers.ReadBytes(caKeyFile)
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/ |
H A D | local.go | 67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { 73 log.Debug("Loading CA key: ", caKeyFile) 74 cakey, err := helpers.ReadBytes(caKeyFile)
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/ |
H A D | local.go | 67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { 73 log.Debug("Loading CA key: ", caKeyFile) 74 cakey, err := helpers.ReadBytes(caKeyFile)
|
/dports/sysutils/docker/docker-ce-18.09.5/components/engine/vendor/github.com/cloudflare/cfssl/signer/local/ |
H A D | local.go | 67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { 73 log.Debug("Loading CA key: ", caKeyFile) 74 cakey, err := helpers.ReadBytes(caKeyFile)
|
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/ |
H A D | local.go | 67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { 73 log.Debug("Loading CA key: ", caKeyFile) 74 cakey, err := helpers.ReadBytes(caKeyFile)
|
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/ |
H A D | local.go | 67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { 73 log.Debug("Loading CA key: ", caKeyFile) 74 cakey, err := helpers.ReadBytes(caKeyFile)
|
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/ |
H A D | local.go | 67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { 73 log.Debug("Loading CA key: ", caKeyFile) 74 cakey, err := helpers.ReadBytes(caKeyFile)
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/ |
H A D | local.go | 67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { 73 log.Debug("Loading CA key: ", caKeyFile) 74 cakey, err := helpers.ReadBytes(caKeyFile)
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/builtin/credential/cert/ |
H A D | backend_test.go | 444 caKeyFile, err := ioutil.TempFile("", "caKey") 449 defer os.Remove(caKeyFile.Name()) 451 if _, err := caKeyFile.Write([]byte(caCertBundle.PrivateKey)); err != nil { 454 if err := caKeyFile.Close(); err != nil { 557 …connState, err := connectionState(caCertFile.Name(), caCertFile.Name(), caKeyFile.Name(), issuedCe…
|
/dports/sysutils/helmfile/vault-f6547fa8e820/builtin/credential/cert/ |
H A D | backend_test.go | 538 caKeyFile, err := ioutil.TempFile("", "caKey") 543 defer os.Remove(caKeyFile.Name()) 545 if _, err := caKeyFile.Write([]byte(caCertBundle.PrivateKey)); err != nil { 548 if err := caKeyFile.Close(); err != nil { 651 …connState, err := connectionState(caCertFile.Name(), caCertFile.Name(), caKeyFile.Name(), issuedCe…
|
/dports/misc/concourse/vault-bdd38fca2cff/builtin/credential/cert/ |
H A D | backend_test.go | 538 caKeyFile, err := ioutil.TempFile("", "caKey") 543 defer os.Remove(caKeyFile.Name()) 545 if _, err := caKeyFile.Write([]byte(caCertBundle.PrivateKey)); err != nil { 548 if err := caKeyFile.Close(); err != nil { 651 …connState, err := connectionState(caCertFile.Name(), caCertFile.Name(), caKeyFile.Name(), issuedCe…
|