- Sort Score
- Result 10 results
- Languages All
Results 1 - 5 of 5 for InsecureSkipVerify (0.2 sec)
-
internal/config/identity/tls/config.go
// credentials and mapping client certificates to S3 policies. type Config struct { Enabled bool `json:"enabled"` // InsecureSkipVerify, if set to true, disables the client // certificate verification. It should only be set for // debugging or testing purposes. InsecureSkipVerify bool `json:"skip_verify"` } const ( defaultExpiry time.Duration = 1 * time.Hour minExpiry time.Duration = 15 * time.Minute
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 3.6K bytes - Viewed (0) -
internal/http/transports.go
func (s ConnSettings) NewRemoteTargetHTTPTransport(insecure bool) func() *http.Transport { tr := s.getDefaultTransport(0) tr.TLSHandshakeTimeout = 10 * time.Second tr.ResponseHeaderTimeout = 0 tr.TLSClientConfig.InsecureSkipVerify = insecure return func() *http.Transport { return tr }
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 6K bytes - Viewed (0) -
src/net/http/transport_internal_test.go
} roundTripped = true return nil, http2noCachedConnError{} }) }, }, DialTLS: func(_, _ string) (net.Conn, error) { tc, err := tls.Dial("tcp", addr, &tls.Config{ InsecureSkipVerify: true, NextProtos: []string{"foo"}, }) if err != nil { return nil, err } if err := tc.Handshake(); err != nil { return nil, err } return tc, nil },
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 16 15:57:17 UTC 2024 - 6.2K bytes - Viewed (0) -
internal/event/target/nsq.go
} func (target *NSQTarget) initNSQ() error { args := target.args config := nsq.NewConfig() if args.TLS.Enable { config.TlsV1 = true config.TlsConfig = &tls.Config{ InsecureSkipVerify: args.TLS.SkipVerify, } } target.config = config producer, err := nsq.NewProducer(args.NSQDAddress.String(), config) if err != nil {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 7.1K bytes - Viewed (0) -
src/cmd/pprof/pprof.go
url, err := url.Parse(source) if err != nil { return nil, err } var tlsConfig *tls.Config if url.Scheme == "https+insecure" { tlsConfig = &tls.Config{ InsecureSkipVerify: true, } url.Scheme = "https" source = url.String() } client := &http.Client{ Transport: &http.Transport{ ResponseHeaderTimeout: timeout + 5*time.Second,
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue May 14 19:41:17 UTC 2024 - 9.5K bytes - Viewed (0)