Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 83 for InsecureSkipVerify (0.25 sec)

  1. pkg/adsc/adsc.go

    	XDSRootCAFile string
    
    	// RootCert contains the XDS root certificate. Used mainly for tests, apps will normally use
    	// XDSRootCAFile
    	RootCert []byte
    
    	// InsecureSkipVerify skips client verification the server's certificate chain and host name.
    	InsecureSkipVerify bool
    
    	// BackoffPolicy determines the reconnect policy. Based on MCP client.
    	BackoffPolicy backoff.BackOff
    
    	GrpcOpts []grpc.DialOption
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Feb 05 22:18:49 UTC 2024
    - 35K bytes
    - Viewed (0)
  2. istioctl/pkg/precheck/precheck.go

    		}
    		if tls.Mode == networking.ClientTLSSettings_DISABLE || tls.Mode == networking.ClientTLSSettings_ISTIO_MUTUAL {
    			return false
    		}
    		return tls.CaCertificates == "" && tls.CredentialName == "" && !tls.InsecureSkipVerify.GetValue()
    	}
    	checkSNI := func(tls *networking.ClientTLSSettings) bool {
    		if tls == nil {
    			return false
    		}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Apr 12 02:57:30 UTC 2024
    - 19.3K bytes
    - Viewed (0)
  3. pilot/pkg/security/model/authentication.go

    		tlsContext.TlsCertificateSdsSecretConfigs = []*tls.SdsSecretConfig{
    			ConstructSdsSecretConfigForCredential(tlsOpts.CredentialName, credentialSocketExist),
    		}
    	}
    
    	// If the InsecureSkipVerify is true, there is no need to configure CA Cert and SAN.
    	if tlsOpts.GetInsecureSkipVerify().GetValue() {
    		return
    	}
    
    	// create SDS config for gateway to fetch certificate validation context
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Mar 28 22:11:02 UTC 2024
    - 9.9K bytes
    - Viewed (0)
  4. internal/event/target/nsq.go

    }
    
    func (target *NSQTarget) initNSQ() error {
    	args := target.args
    
    	config := nsq.NewConfig()
    	if args.TLS.Enable {
    		config.TlsV1 = true
    		config.TlsConfig = &tls.Config{
    			InsecureSkipVerify: args.TLS.SkipVerify,
    		}
    	}
    	target.config = config
    
    	producer, err := nsq.NewProducer(args.NSQDAddress.String(), config)
    	if err != nil {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 7.1K bytes
    - Viewed (0)
  5. pkg/test/echo/server/endpoint/grpc.go

    		if s.Port.XDSReadinessTLS {
    			// TODO: using the servers key/cert is not always valid, it may not be allowed to make requests to itself
    			req.CertFile = cert
    			req.KeyFile = key
    			req.CaCertFile = ca
    			req.InsecureSkipVerify = true
    		}
    		_, err = s.f.ForwardEcho(context.Background(), &forwarder.Config{
    			XDSTestBootstrap: s.Port.XDSTestBootstrap,
    			Request:          req,
    		})
    		return err
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Sep 25 17:30:37 UTC 2023
    - 8.7K bytes
    - Viewed (0)
  6. src/cmd/go/internal/web/http.go

    var impatientInsecureHTTPClient = &http.Client{
    	CheckRedirect: checkRedirect,
    	Timeout:       5 * time.Second,
    	Transport: &http.Transport{
    		Proxy: http.ProxyFromEnvironment,
    		TLSClientConfig: &tls.Config{
    			InsecureSkipVerify: true,
    		},
    	},
    }
    
    var securityPreservingDefaultClient = securityPreservingHTTPClient(http.DefaultClient)
    
    // securityPreservingHTTPClient returns a client that is like the original
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Aug 10 17:34:27 UTC 2023
    - 9.7K bytes
    - Viewed (0)
  7. pilot/pkg/model/test/mockopenidserver.go

    			log.Errorf("Server failed to serve in %q: %v", ms.URL, err)
    		}
    	}()
    
    	// nolint: gosec  // test only code
    	httpClient := &http.Client{
    		Transport: &http.Transport{
    			TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
    		},
    	}
    	wait := 10 * time.Millisecond
    	for try := 0; try < 10; try++ {
    		// Try to call the server
    		res, err := httpClient.Get(fmt.Sprintf("%s/.well-known/openid-configuration", ms.URL))
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Feb 23 09:47:21 UTC 2024
    - 9.4K bytes
    - Viewed (0)
  8. src/cmd/pprof/pprof.go

    	url, err := url.Parse(source)
    	if err != nil {
    		return nil, err
    	}
    
    	var tlsConfig *tls.Config
    	if url.Scheme == "https+insecure" {
    		tlsConfig = &tls.Config{
    			InsecureSkipVerify: true,
    		}
    		url.Scheme = "https"
    		source = url.String()
    	}
    
    	client := &http.Client{
    		Transport: &http.Transport{
    			ResponseHeaderTimeout: timeout + 5*time.Second,
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue May 14 19:41:17 UTC 2024
    - 9.5K bytes
    - Viewed (0)
  9. internal/logger/target/kafka/kafka.go

    	if err != nil {
    		return err
    	}
    
    	sconfig.Net.TLS.Enable = h.kconfig.TLS.Enable
    	sconfig.Net.TLS.Config = tlsConfig
    	sconfig.Net.TLS.Config.InsecureSkipVerify = h.kconfig.TLS.SkipVerify
    	sconfig.Net.TLS.Config.ClientAuth = h.kconfig.TLS.ClientAuth
    	sconfig.Net.TLS.Config.RootCAs = h.kconfig.TLS.RootCAs
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Sun Jun 02 03:03:39 UTC 2024
    - 10.2K bytes
    - Viewed (0)
  10. staging/src/k8s.io/apimachinery/pkg/util/proxy/upgradeaware_test.go

    				return ts
    			},
    			ProxyTransport: utilnet.SetTransportDefaults(&http.Transport{TLSClientConfig: &tls.Config{
    				NextProtos:         []string{"http2", "http/1.1"},
    				InsecureSkipVerify: true,
    			}}),
    		},
    		"https (invalid hostname + InsecureSkipVerify)": {
    			ServerFunc: func(h http.Handler) *httptest.Server {
    				cert, err := tls.X509KeyPair(exampleCert, exampleKey)
    				if err != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 10 07:29:34 UTC 2023
    - 39.4K bytes
    - Viewed (0)
Back to top