Versions in this module Expand all Collapse all v1 v1.2.0 Jun 25, 2018 Changes in this version + const TestClusterID + func CalculateCertFingerprint(pemValue string) (string, error) + func CreateCSR(uri CertURI, privateKey crypto.Signer) (string, error) + func GeneratePrivateKey() (crypto.Signer, string, error) + func HexString(input []byte) string + func KeyId(raw interface{}) ([]byte, error) + func ParseCSR(pemValue string) (*x509.CertificateRequest, error) + func ParseCert(pemValue string) (*x509.Certificate, error) + func ParseSigner(pemValue string) (crypto.Signer, error) + func TestCA(t testing.T, xc *structs.CARoot) *structs.CARoot + func TestCAConfigSet(t testing.T, a TestAgentRPC, ca *structs.CARoot) *structs.CARoot + func TestCSR(t testing.T, uri CertURI) (string, string) + func TestLeaf(t testing.T, service string, root *structs.CARoot) (string, string) + type CertURI interface + Authorize func(*structs.Intention) (auth bool, match bool) + URI func() *url.URL + func ParseCertURI(input *url.URL) (CertURI, error) + type SpiffeIDService struct + Datacenter string + Host string + Namespace string + Service string + func TestSpiffeIDService(t testing.T, service string) *SpiffeIDService + func TestSpiffeIDServiceWithHost(t testing.T, service, host string) *SpiffeIDService + func (id *SpiffeIDService) Authorize(ixn *structs.Intention) (bool, bool) + func (id *SpiffeIDService) URI() *url.URL + type SpiffeIDSigning struct + ClusterID string + Domain string + func SpiffeIDSigningForCluster(config *structs.CAConfiguration) *SpiffeIDSigning + func (id *SpiffeIDSigning) Authorize(ixn *structs.Intention) (bool, bool) + func (id *SpiffeIDSigning) CanSign(cu CertURI) bool + func (id *SpiffeIDSigning) Host() string + func (id *SpiffeIDSigning) URI() *url.URL + type TestAgentRPC interface + RPC func(method string, args interface{}, reply interface{}) error