Home
last modified time | relevance | path

Searched refs:caKeyFile (Results 1 – 25 of 34) sorted by relevance

12

/dports/sysutils/istio/istio-1.6.7/security/pkg/pki/util/
H A Dkeycertbundle_test.go123 caKeyFile string
131 caKeyFile: rootKeyFile,
145 caKeyFile: keyFile1,
227 caKeyFile string
241 caKeyFile: intKeyFile,
255 caKeyFile: intKeyFile,
262 caKeyFile: intKeyFile,
269 caKeyFile: intKeyFile,
291 caKeyFile: intKeyFile,
300 caKeyFile: intKeyFile,
[all …]
/dports/sysutils/kubectl/kubernetes-1.22.2/pkg/controller/certificates/signer/
H A Dsigner.go51 caFile, caKeyFile string,
54 …g-kubelet-serving", capi.KubeletServingSignerName, client, csrInformer, caFile, caKeyFile, certTTL)
60 caFile, caKeyFile string,
63 …lient", capi.KubeAPIServerClientKubeletSignerName, client, csrInformer, caFile, caKeyFile, certTTL)
69 caFile, caKeyFile string,
78 caFile, caKeyFile string,
81 …acy-unknown", capiv1beta1.LegacyUnknownSignerName, client, csrInformer, caFile, caKeyFile, certTTL)
89 caFile, caKeyFile string,
92 signer, err := newSigner(signerName, caFile, caKeyFile, client, certTTL)
127 func newSigner(signerName, caFile, caKeyFile string, client clientset.Interface, certificateDuratio…
[all …]
H A Dca_provider.go31 func newCAProvider(caFile, caKeyFile string) (*caProvider, error) {
32 …, err := dynamiccertificates.NewDynamicServingContentFromFiles("csr-controller", caFile, caKeyFile)
/dports/security/certmgr/certmgr-3.0.3/vendor/github.com/cloudflare/cfssl/cfssl-2001f384ec4f/api/sign/
H A Dsign.go17 func NewHandler(caFile, caKeyFile string, policy *config.Signing) (http.Handler, error) {
21 "key-file": caKeyFile,
37 func NewAuthHandler(caFile, caKeyFile string, policy *config.Signing) (http.Handler, error) {
41 "key-file": caKeyFile,
/dports/security/certmgr/certmgr-3.0.3/vendor/github.com/cloudflare/cfssl/cfssl-2001f384ec4f/signer/local/
H A Dlocal_test.go396 caKeyFile := caKeys[i]
764 caKeyFile string
775 caKeyFile: testECDSACaKeyFile,
786 caKeyFile: testECDSACaKeyFile,
794 caKeyFile: testCaKeyFile,
802 caKeyFile: testCaKeyFile,
810 caKeyFile: testCaKeyFile,
818 caKeyFile: testECDSACaKeyFile,
831 caKeyFile: testECDSACaKeyFile,
839 caKeyFile: testECDSACaKeyFile,
[all …]
H A Dlocal.go68 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) {
74 log.Debug("Loading CA key: ", caKeyFile)
75 cakey, err := helpers.ReadBytes(caKeyFile)
/dports/net-mgmt/icinga2/icinga2-2.13.2/lib/remote/
H A Dpkiutility.cpp30 String caKeyFile = caDir + "/ca.key"; in NewCa() local
32 if (Utility::PathExists(caCertFile) && Utility::PathExists(caKeyFile)) { in NewCa()
34 << "CA files '" << caCertFile << "' and '" << caKeyFile << "' already exist."; in NewCa()
40 MakeX509CSR("Icinga CA", caKeyFile, String(), caCertFile, true); in NewCa()
/dports/sysutils/kubectl/kubernetes-1.22.2/cmd/kubeadm/app/util/staticpod/
H A Dutils_linux.go135 caKeyFile := filepath.Join(cfg.CertificatesDir, kubeadmconstants.CAKeyName)
136 err := updatePathOwnerAndPermissions(caKeyFile, *runAsUser, *runAsGroup, 0600)
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/
H A Dlocal.go66 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) {
72 log.Debug("Loading CA key: ", caKeyFile)
73 cakey, err := ioutil.ReadFile(caKeyFile)
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/swarmkit/vendor/github.com/cloudflare/cfssl/signer/local/
H A Dlocal.go66 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) {
72 log.Debug("Loading CA key: ", caKeyFile)
73 cakey, err := ioutil.ReadFile(caKeyFile)
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/
H A Dlocal.go66 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) {
72 log.Debug("Loading CA key: ", caKeyFile)
73 cakey, err := ioutil.ReadFile(caKeyFile)
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/
H A Dlocal.go66 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) {
72 log.Debug("Loading CA key: ", caKeyFile)
73 cakey, err := ioutil.ReadFile(caKeyFile)
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/
H A Dlocal.go66 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) {
72 log.Debug("Loading CA key: ", caKeyFile)
73 cakey, err := ioutil.ReadFile(caKeyFile)
/dports/security/certmgr/certmgr-3.0.3/vendor/github.com/cloudflare/cfssl/cfssl-2001f384ec4f/api/generator/
H A Dgenerator.go169 func NewCertGeneratorHandler(validator Validator, caFile, caKeyFile string, policy *config.Signing)…
184 "ca-key-file": caKeyFile,
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/vendor/github.com/cloudflare/cfssl/signer/local/
H A Dlocal.go67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) {
73 log.Debug("Loading CA key: ", caKeyFile)
74 cakey, err := helpers.ReadBytes(caKeyFile)
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/
H A Dlocal.go67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) {
73 log.Debug("Loading CA key: ", caKeyFile)
74 cakey, err := helpers.ReadBytes(caKeyFile)
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/
H A Dlocal.go67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) {
73 log.Debug("Loading CA key: ", caKeyFile)
74 cakey, err := helpers.ReadBytes(caKeyFile)
/dports/sysutils/docker/docker-ce-18.09.5/components/engine/vendor/github.com/cloudflare/cfssl/signer/local/
H A Dlocal.go67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) {
73 log.Debug("Loading CA key: ", caKeyFile)
74 cakey, err := helpers.ReadBytes(caKeyFile)
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/
H A Dlocal.go67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) {
73 log.Debug("Loading CA key: ", caKeyFile)
74 cakey, err := helpers.ReadBytes(caKeyFile)
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/
H A Dlocal.go67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) {
73 log.Debug("Loading CA key: ", caKeyFile)
74 cakey, err := helpers.ReadBytes(caKeyFile)
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/
H A Dlocal.go67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) {
73 log.Debug("Loading CA key: ", caKeyFile)
74 cakey, err := helpers.ReadBytes(caKeyFile)
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/docker/docker/vendor/github.com/cloudflare/cfssl/signer/local/
H A Dlocal.go67 func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) {
73 log.Debug("Loading CA key: ", caKeyFile)
74 cakey, err := helpers.ReadBytes(caKeyFile)
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/builtin/credential/cert/
H A Dbackend_test.go444 caKeyFile, err := ioutil.TempFile("", "caKey")
449 defer os.Remove(caKeyFile.Name())
451 if _, err := caKeyFile.Write([]byte(caCertBundle.PrivateKey)); err != nil {
454 if err := caKeyFile.Close(); err != nil {
557 …connState, err := connectionState(caCertFile.Name(), caCertFile.Name(), caKeyFile.Name(), issuedCe…
/dports/sysutils/helmfile/vault-f6547fa8e820/builtin/credential/cert/
H A Dbackend_test.go538 caKeyFile, err := ioutil.TempFile("", "caKey")
543 defer os.Remove(caKeyFile.Name())
545 if _, err := caKeyFile.Write([]byte(caCertBundle.PrivateKey)); err != nil {
548 if err := caKeyFile.Close(); err != nil {
651 …connState, err := connectionState(caCertFile.Name(), caCertFile.Name(), caKeyFile.Name(), issuedCe…
/dports/misc/concourse/vault-bdd38fca2cff/builtin/credential/cert/
H A Dbackend_test.go538 caKeyFile, err := ioutil.TempFile("", "caKey")
543 defer os.Remove(caKeyFile.Name())
545 if _, err := caKeyFile.Write([]byte(caCertBundle.PrivateKey)); err != nil {
548 if err := caKeyFile.Close(); err != nil {
651 …connState, err := connectionState(caCertFile.Name(), caCertFile.Name(), caKeyFile.Name(), issuedCe…

12