- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 33 for TLSConfig (0.15 sec)
-
staging/src/k8s.io/apiextensions-apiserver/test/integration/ratcheting_test_cases/invalid/gateway/tlsconfig-tcp.yaml
apiVersion: gateway.networking.k8s.io/v1beta1 kind: Gateway metadata: name: tlsconfig-tcp spec: gatewayClassName: acme-lb listeners: - name: example protocol: TCP port: 443 tls: certificateRefs: - kind: Secret group: ""
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Oct 27 17:15:18 UTC 2023 - 296 bytes - Viewed (0) -
staging/src/k8s.io/apimachinery/pkg/util/proxy/dial_test.go
testcases := map[string]struct { TLSConfig *tls.Config Dial utilnet.DialFunc ExpectError string ExpectProto string }{ "insecure": { TLSConfig: &tls.Config{InsecureSkipVerify: true}, }, "secure, no roots": { TLSConfig: &tls.Config{InsecureSkipVerify: false}, ExpectError: "unknown authority|not trusted", }, "secure with roots": {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Oct 23 22:33:38 UTC 2023 - 8.4K bytes - Viewed (0) -
pkg/kube/spdy.go
// Get the TLS config. tlsConfig, err := rest.TLSConfigFor(restConfig) if err != nil { return nil, nil, fmt.Errorf("failed getting TLS config: %w", err) } if tlsConfig == nil && restConfig.Transport != nil { // If using a custom transport, skip server verification on the upgrade. // nolint: gosec tlsConfig = &tls.Config{ InsecureSkipVerify: true, } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Dec 15 21:30:37 UTC 2023 - 1.8K bytes - Viewed (0) -
test/fixedbugs/issue25727.go
var _ = s.DoneChan // ERROR "s.DoneChan undefined .type http.Server has no field or method DoneChan.$|undefined field or method" var _ = http.Server{tlsConfig: nil} // ERROR "cannot refer to unexported field tlsConfig in struct literal|unknown field .?tlsConfig.? in .?http.Server|unknown field" var _ = http.Server{DoneChan: nil} // ERROR "unknown field DoneChan in struct literal of type http.Server$|unknown field .?DoneChan.? in .?http.Server"
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Feb 07 16:41:56 UTC 2024 - 1K bytes - Viewed (0) -
staging/src/k8s.io/apimachinery/pkg/util/proxy/dial.go
if supportsHTTP11(tlsConfig.NextProtos) { tlsConfig = tlsConfig.Clone() tlsConfig.NextProtos = []string{"http/1.1"} } tlsConn := tls.Client(netConn, tlsConfig) if err := tlsConn.HandshakeContext(ctx); err != nil { netConn.Close() return nil, err } return tlsConn, nil } else { // Dial. tlsDialer := tls.Dialer{ Config: tlsConfig, }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Oct 23 22:33:38 UTC 2023 - 3.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/egressselector/config.go
} return allErrs } func validateTLSConfig(tlsConfig *apiserver.TLSConfig, fldPath *field.Path) field.ErrorList { allErrs := field.ErrorList{} if tlsConfig == nil { allErrs = append(allErrs, field.Required( fldPath.Child("tlsConfig"), "TLSConfig must be present when using HTTPS")) return allErrs } if tlsConfig.CABundle != "" {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jun 29 15:48:39 UTC 2023 - 8.6K bytes - Viewed (0) -
pkg/kubelet/certificate/transport.go
tlsConfig, err := restclient.TLSConfigFor(clientConfig) if err != nil { return fmt.Errorf("unable to configure TLS for the rest client: %v", err) } if tlsConfig == nil { tlsConfig = &tls.Config{} } tlsConfig.Certificates = nil tlsConfig.GetClientCertificate = func(requestInfo *tls.CertificateRequestInfo) (*tls.Certificate, error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Dec 08 13:57:45 UTC 2022 - 6.5K bytes - Viewed (0) -
internal/http/server_test.go
} if testCase.certFn == nil { if server.TLSConfig != nil { t.Fatalf("Case %v: server.TLSConfig: expected: <nil>, got: %v", (i + 1), server.TLSConfig) } } else { if server.TLSConfig == nil { t.Fatalf("Case %v: server.TLSConfig: expected: <non-nil>, got: <nil>", (i + 1)) } } if server.ShutdownTimeout != DefaultShutdownTimeout {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 2.7K bytes - Viewed (0) -
src/net/http/alpn_test.go
} } // Request using the "tls-0.9" protocol, which we register here. // It is HTTP/0.9 over TLS. { c := ts.Client() tlsConfig := c.Transport.(*Transport).TLSClientConfig tlsConfig.NextProtos = []string{"tls-0.9"} conn, err := tls.Dial("tcp", ts.Listener.Addr().String(), tlsConfig) if err != nil { t.Fatal(err) } conn.Write([]byte("GET /foo\n")) body, err := io.ReadAll(conn) if err != nil {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Oct 20 18:41:18 UTC 2020 - 3K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/server_test.go
w.WriteHeader(http.StatusOK) }), MaxHeaderBytes: 1 << 20, TLSConfig: tlsConfig, } listener, _, err := createListener("tcp", "127.0.0.1:0") if err != nil { t.Fatal(err) } apiPort := listener.Addr().String() go func() { t.Logf("listening on %s", listener.Addr().String()) listener = tls.NewListener(listener, server.TLSConfig) if err := server.ServeTLS(listener, "", ""); err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 12 18:29:15 UTC 2021 - 6K bytes - Viewed (0)