- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 28 for InsecureSkipVerify (0.91 sec)
-
tests/integration/pilot/testdata/tunneling/destination-rule.tmpl.yaml
trafficPolicy: portLevelSettings: - port: number: {{ .forwardProxyPort }} tls: mode: SIMPLE sni: external-forward-proxy.{{ .externalNamespace }}.svc.cluster.local insecureSkipVerify: true
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Jan 20 19:37:50 UTC 2024 - 1K bytes - Viewed (0) -
pkg/test/echo/proto/echo.proto
string certFile = 16; string keyFile = 17; // If non-empty, verify the server CA with the ca cert file. string caCertFile = 18; // Skip verifying peer's certificate. bool insecureSkipVerify = 19; // List of ALPNs to present. If not set, this will be automatically be set based on the protocol Alpn alpn = 13; // Server name (SNI) to present in TLS connections. If not set, Host will be used for http requests.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jan 31 17:42:23 UTC 2023 - 3.8K bytes - Viewed (0) -
pkg/kube/spdy.go
} if tlsConfig == nil && restConfig.Transport != nil { // If using a custom transport, skip server verification on the upgrade. // nolint: gosec tlsConfig = &tls.Config{ InsecureSkipVerify: true, } } var upgrader *spdyStream.SpdyRoundTripper if restConfig.Proxy != nil { upgrader, err = spdyStream.NewRoundTripperWithProxy(tlsConfig, restConfig.Proxy) if err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Dec 15 21:30:37 UTC 2023 - 1.8K bytes - Viewed (0) -
src/crypto/x509/hybrid_pool_test.go
} time.Sleep(nextSleep) } } // Get the google.com chain, which should be valid on all platforms we // are testing c, err := tls.Dial("tcp", "google.com:443", &tls.Config{InsecureSkipVerify: true}) if err != nil { t.Fatalf("tls connection failed: %s", err) } googChain := c.ConnectionState().PeerCertificates rootTmpl := &x509.Certificate{ SerialNumber: big.NewInt(1),
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Feb 26 20:48:11 UTC 2024 - 3.7K bytes - Viewed (0) -
pkg/test/framework/components/istio/ca.go
certPool := x509.NewCertPool() ok := certPool.AppendCertsFromPEM(rootCert) if !ok { return nil, fmt.Errorf("failed to append certificates") } config := tls.Config{ RootCAs: certPool, InsecureSkipVerify: true, // nolint: gosec // test only code } transportCreds := credentials.NewTLS(&config) conn, err := grpc.Dial(endpoint, grpc.WithTransportCredentials(transportCreds)) if err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Mar 27 16:59:05 UTC 2024 - 4.5K bytes - Viewed (0) -
src/cmd/vendor/github.com/google/pprof/internal/transport/transport.go
} if req.URL.Scheme == "https+insecure" { // Make shallow copy of request, and req.URL, so the request's URL can be // modified. r := *req *r.URL = *req.URL req = &r tlsConfig.InsecureSkipVerify = true req.URL.Scheme = "https" } transport := http.Transport{ Proxy: http.ProxyFromEnvironment, TLSClientConfig: tlsConfig, } return transport.RoundTrip(req)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Nov 22 18:58:12 UTC 2022 - 3.8K bytes - Viewed (0) -
pkg/probe/http/http.go
// If disabled, redirects to other hosts will trigger a warning result. func New(followNonLocalRedirects bool) Prober { tlsConfig := &tls.Config{InsecureSkipVerify: true} return NewWithTLSConfig(tlsConfig, followNonLocalRedirects) } // NewWithTLSConfig takes tls config as parameter.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Feb 10 00:37:32 UTC 2023 - 5K bytes - Viewed (0) -
internal/http/transports.go
func (s ConnSettings) NewRemoteTargetHTTPTransport(insecure bool) func() *http.Transport { tr := s.getDefaultTransport(0) tr.TLSHandshakeTimeout = 10 * time.Second tr.ResponseHeaderTimeout = 0 tr.TLSClientConfig.InsecureSkipVerify = insecure return func() *http.Transport { return tr }
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 6K bytes - Viewed (0) -
pkg/wasm/httpfetcher.go
} transport := http.DefaultTransport.(*http.Transport).Clone() // nolint: gosec // This is only when a user explicitly sets a flag to enable insecure mode transport.TLSClientConfig = &tls.Config{InsecureSkipVerify: true} return &HTTPFetcher{ client: &http.Client{ Timeout: requestTimeout, }, insecureClient: &http.Client{ Timeout: requestTimeout, Transport: transport, },
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 14 20:23:34 UTC 2022 - 5.5K bytes - Viewed (0) -
src/net/http/transport_internal_test.go
} roundTripped = true return nil, http2noCachedConnError{} }) }, }, DialTLS: func(_, _ string) (net.Conn, error) { tc, err := tls.Dial("tcp", addr, &tls.Config{ InsecureSkipVerify: true, NextProtos: []string{"foo"}, }) if err != nil { return nil, err } if err := tc.Handshake(); err != nil { return nil, err } return tc, nil },
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 16 15:57:17 UTC 2024 - 6.2K bytes - Viewed (0)