Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 22 for InsecureSkipVerify (0.33 sec)

  1. pkg/test/echo/proto/echo.pb.go

    	CaCertFile string `protobuf:"bytes,18,opt,name=caCertFile,proto3" json:"caCertFile,omitempty"`
    	// Skip verifying peer's certificate.
    	InsecureSkipVerify bool `protobuf:"varint,19,opt,name=insecureSkipVerify,proto3" json:"insecureSkipVerify,omitempty"`
    	// List of ALPNs to present. If not set, this will be automatically be set based on the protocol
    	Alpn *Alpn `protobuf:"bytes,13,opt,name=alpn,proto3" json:"alpn,omitempty"`
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri May 31 02:27:10 UTC 2024
    - 33.3K bytes
    - Viewed (0)
  2. src/crypto/tls/handshake_client.go

    func (c *Conn) makeClientHello() (*clientHelloMsg, *keySharePrivateKeys, *echContext, error) {
    	config := c.config
    	if len(config.ServerName) == 0 && !config.InsecureSkipVerify {
    		return nil, nil, nil, errors.New("tls: either ServerName or InsecureSkipVerify must be specified in the tls.Config")
    	}
    
    	nextProtosLength := 0
    	for _, proto := range config.NextProtos {
    		if l := len(proto); l == 0 || l > 255 {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
  3. pilot/pkg/networking/core/cluster_tls.go

    			res := security.SdsCertificateConfig{
    				CaCertificatePath: tls.CaCertificates,
    			}
    			// If tls.CaCertificate or CaCertificate in Metadata isn't configured, or tls.InsecureSkipVerify is true,
    			// don't set up SdsSecretConfig
    			if !res.IsRootCertificate() || tls.GetInsecureSkipVerify().GetValue() {
    				tlsContext.CommonTlsContext.ValidationContextType = &tlsv3.CommonTlsContext_ValidationContext{}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 18 19:09:43 UTC 2024
    - 19.2K bytes
    - Viewed (0)
  4. istioctl/pkg/precheck/precheck.go

    		}
    		if tls.Mode == networking.ClientTLSSettings_DISABLE || tls.Mode == networking.ClientTLSSettings_ISTIO_MUTUAL {
    			return false
    		}
    		return tls.CaCertificates == "" && tls.CredentialName == "" && !tls.InsecureSkipVerify.GetValue()
    	}
    	checkSNI := func(tls *networking.ClientTLSSettings) bool {
    		if tls == nil {
    			return false
    		}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Apr 12 02:57:30 UTC 2024
    - 19.3K bytes
    - Viewed (0)
  5. pilot/pkg/security/model/authentication.go

    		tlsContext.TlsCertificateSdsSecretConfigs = []*tls.SdsSecretConfig{
    			ConstructSdsSecretConfigForCredential(tlsOpts.CredentialName, credentialSocketExist),
    		}
    	}
    
    	// If the InsecureSkipVerify is true, there is no need to configure CA Cert and SAN.
    	if tlsOpts.GetInsecureSkipVerify().GetValue() {
    		return
    	}
    
    	// create SDS config for gateway to fetch certificate validation context
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Mar 28 22:11:02 UTC 2024
    - 9.9K bytes
    - Viewed (0)
  6. internal/logger/target/kafka/kafka.go

    	if err != nil {
    		return err
    	}
    
    	sconfig.Net.TLS.Enable = h.kconfig.TLS.Enable
    	sconfig.Net.TLS.Config = tlsConfig
    	sconfig.Net.TLS.Config.InsecureSkipVerify = h.kconfig.TLS.SkipVerify
    	sconfig.Net.TLS.Config.ClientAuth = h.kconfig.TLS.ClientAuth
    	sconfig.Net.TLS.Config.RootCAs = h.kconfig.TLS.RootCAs
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Sun Jun 02 03:03:39 UTC 2024
    - 10.2K bytes
    - Viewed (0)
  7. internal/event/target/kafka.go

    	if err != nil {
    		target.loggerOnce(context.Background(), err, target.ID().String())
    		return err
    	}
    
    	config.Net.TLS.Enable = args.TLS.Enable
    	config.Net.TLS.Config = tlsConfig
    	config.Net.TLS.Config.InsecureSkipVerify = args.TLS.SkipVerify
    	config.Net.TLS.Config.ClientAuth = args.TLS.ClientAuth
    	config.Net.TLS.Config.RootCAs = args.TLS.RootCAs
    
    	// These settings are needed to ensure that kafka client doesn't hang on brokers
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Sat Jun 01 15:02:59 UTC 2024
    - 13.1K bytes
    - Viewed (0)
  8. pkg/controlplane/apiserver/config.go

    func CreateProxyTransport() *http.Transport {
    	var proxyDialerFn utilnet.DialFunc
    	// Proxying to pods and services is IP-based... don't expect to be able to verify the hostname
    	proxyTLSClientConfig := &tls.Config{InsecureSkipVerify: true}
    	proxyTransport := utilnet.SetTransportDefaults(&http.Transport{
    		DialContext:     proxyDialerFn,
    		TLSClientConfig: proxyTLSClientConfig,
    	})
    	return proxyTransport
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Jun 07 17:57:37 UTC 2024
    - 14.9K bytes
    - Viewed (0)
  9. pkg/config/validation/agent/validation.go

    			if settings.CaCertificates != "" || settings.CredentialName != "" || settings.SubjectAltNames != nil {
    				errs = AppendErrors(errs, fmt.Errorf("cannot specify CaCertificates or CredentialName or SubjectAltNames when InsecureSkipVerify is set true"))
    			}
    		}
    
    		if settings.Mode == networking.ClientTLSSettings_MUTUAL {
    			// In tls mutual mode, we can specify both client cert and ca cert by CredentialName.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 20:06:41 UTC 2024
    - 30.9K bytes
    - Viewed (0)
  10. src/crypto/tls/tls.go

    	c.handshakeFn = c.serverHandshake
    	return c
    }
    
    // Client returns a new TLS client side connection
    // using conn as the underlying transport.
    // The config cannot be nil: users must set either ServerName or
    // InsecureSkipVerify in the config.
    func Client(conn net.Conn, config *Config) *Conn {
    	c := &Conn{
    		conn:     conn,
    		config:   config,
    		isClient: true,
    	}
    	c.handshakeFn = c.clientHandshake
    	return c
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Jun 07 17:57:01 UTC 2024
    - 12.2K bytes
    - Viewed (0)
Back to top