- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 22 for InsecureSkipVerify (0.33 sec)
-
pkg/test/echo/proto/echo.pb.go
CaCertFile string `protobuf:"bytes,18,opt,name=caCertFile,proto3" json:"caCertFile,omitempty"` // Skip verifying peer's certificate. InsecureSkipVerify bool `protobuf:"varint,19,opt,name=insecureSkipVerify,proto3" json:"insecureSkipVerify,omitempty"` // List of ALPNs to present. If not set, this will be automatically be set based on the protocol Alpn *Alpn `protobuf:"bytes,13,opt,name=alpn,proto3" json:"alpn,omitempty"`
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 31 02:27:10 UTC 2024 - 33.3K bytes - Viewed (0) -
src/crypto/tls/handshake_client.go
func (c *Conn) makeClientHello() (*clientHelloMsg, *keySharePrivateKeys, *echContext, error) { config := c.config if len(config.ServerName) == 0 && !config.InsecureSkipVerify { return nil, nil, nil, errors.New("tls: either ServerName or InsecureSkipVerify must be specified in the tls.Config") } nextProtosLength := 0 for _, proto := range config.NextProtos { if l := len(proto); l == 0 || l > 255 {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 38.6K bytes - Viewed (0) -
pilot/pkg/networking/core/cluster_tls.go
res := security.SdsCertificateConfig{ CaCertificatePath: tls.CaCertificates, } // If tls.CaCertificate or CaCertificate in Metadata isn't configured, or tls.InsecureSkipVerify is true, // don't set up SdsSecretConfig if !res.IsRootCertificate() || tls.GetInsecureSkipVerify().GetValue() { tlsContext.CommonTlsContext.ValidationContextType = &tlsv3.CommonTlsContext_ValidationContext{}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 18 19:09:43 UTC 2024 - 19.2K bytes - Viewed (0) -
istioctl/pkg/precheck/precheck.go
} if tls.Mode == networking.ClientTLSSettings_DISABLE || tls.Mode == networking.ClientTLSSettings_ISTIO_MUTUAL { return false } return tls.CaCertificates == "" && tls.CredentialName == "" && !tls.InsecureSkipVerify.GetValue() } checkSNI := func(tls *networking.ClientTLSSettings) bool { if tls == nil { return false }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 12 02:57:30 UTC 2024 - 19.3K bytes - Viewed (0) -
pilot/pkg/security/model/authentication.go
tlsContext.TlsCertificateSdsSecretConfigs = []*tls.SdsSecretConfig{ ConstructSdsSecretConfigForCredential(tlsOpts.CredentialName, credentialSocketExist), } } // If the InsecureSkipVerify is true, there is no need to configure CA Cert and SAN. if tlsOpts.GetInsecureSkipVerify().GetValue() { return } // create SDS config for gateway to fetch certificate validation context
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Mar 28 22:11:02 UTC 2024 - 9.9K bytes - Viewed (0) -
internal/logger/target/kafka/kafka.go
if err != nil { return err } sconfig.Net.TLS.Enable = h.kconfig.TLS.Enable sconfig.Net.TLS.Config = tlsConfig sconfig.Net.TLS.Config.InsecureSkipVerify = h.kconfig.TLS.SkipVerify sconfig.Net.TLS.Config.ClientAuth = h.kconfig.TLS.ClientAuth sconfig.Net.TLS.Config.RootCAs = h.kconfig.TLS.RootCAs
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Sun Jun 02 03:03:39 UTC 2024 - 10.2K bytes - Viewed (0) -
internal/event/target/kafka.go
if err != nil { target.loggerOnce(context.Background(), err, target.ID().String()) return err } config.Net.TLS.Enable = args.TLS.Enable config.Net.TLS.Config = tlsConfig config.Net.TLS.Config.InsecureSkipVerify = args.TLS.SkipVerify config.Net.TLS.Config.ClientAuth = args.TLS.ClientAuth config.Net.TLS.Config.RootCAs = args.TLS.RootCAs // These settings are needed to ensure that kafka client doesn't hang on brokers
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Sat Jun 01 15:02:59 UTC 2024 - 13.1K bytes - Viewed (0) -
pkg/controlplane/apiserver/config.go
func CreateProxyTransport() *http.Transport { var proxyDialerFn utilnet.DialFunc // Proxying to pods and services is IP-based... don't expect to be able to verify the hostname proxyTLSClientConfig := &tls.Config{InsecureSkipVerify: true} proxyTransport := utilnet.SetTransportDefaults(&http.Transport{ DialContext: proxyDialerFn, TLSClientConfig: proxyTLSClientConfig, }) return proxyTransport
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 07 17:57:37 UTC 2024 - 14.9K bytes - Viewed (0) -
pkg/config/validation/agent/validation.go
if settings.CaCertificates != "" || settings.CredentialName != "" || settings.SubjectAltNames != nil { errs = AppendErrors(errs, fmt.Errorf("cannot specify CaCertificates or CredentialName or SubjectAltNames when InsecureSkipVerify is set true")) } } if settings.Mode == networking.ClientTLSSettings_MUTUAL { // In tls mutual mode, we can specify both client cert and ca cert by CredentialName.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 20:06:41 UTC 2024 - 30.9K bytes - Viewed (0) -
src/crypto/tls/tls.go
c.handshakeFn = c.serverHandshake return c } // Client returns a new TLS client side connection // using conn as the underlying transport. // The config cannot be nil: users must set either ServerName or // InsecureSkipVerify in the config. func Client(conn net.Conn, config *Config) *Conn { c := &Conn{ conn: conn, config: config, isClient: true, } c.handshakeFn = c.clientHandshake return c }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Jun 07 17:57:01 UTC 2024 - 12.2K bytes - Viewed (0)