- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 83 for InsecureSkipVerify (0.25 sec)
-
pkg/adsc/adsc.go
XDSRootCAFile string // RootCert contains the XDS root certificate. Used mainly for tests, apps will normally use // XDSRootCAFile RootCert []byte // InsecureSkipVerify skips client verification the server's certificate chain and host name. InsecureSkipVerify bool // BackoffPolicy determines the reconnect policy. Based on MCP client. BackoffPolicy backoff.BackOff GrpcOpts []grpc.DialOption }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Feb 05 22:18:49 UTC 2024 - 35K bytes - Viewed (0) -
istioctl/pkg/precheck/precheck.go
} if tls.Mode == networking.ClientTLSSettings_DISABLE || tls.Mode == networking.ClientTLSSettings_ISTIO_MUTUAL { return false } return tls.CaCertificates == "" && tls.CredentialName == "" && !tls.InsecureSkipVerify.GetValue() } checkSNI := func(tls *networking.ClientTLSSettings) bool { if tls == nil { return false }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 12 02:57:30 UTC 2024 - 19.3K bytes - Viewed (0) -
pilot/pkg/security/model/authentication.go
tlsContext.TlsCertificateSdsSecretConfigs = []*tls.SdsSecretConfig{ ConstructSdsSecretConfigForCredential(tlsOpts.CredentialName, credentialSocketExist), } } // If the InsecureSkipVerify is true, there is no need to configure CA Cert and SAN. if tlsOpts.GetInsecureSkipVerify().GetValue() { return } // create SDS config for gateway to fetch certificate validation context
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Mar 28 22:11:02 UTC 2024 - 9.9K bytes - Viewed (0) -
internal/event/target/nsq.go
} func (target *NSQTarget) initNSQ() error { args := target.args config := nsq.NewConfig() if args.TLS.Enable { config.TlsV1 = true config.TlsConfig = &tls.Config{ InsecureSkipVerify: args.TLS.SkipVerify, } } target.config = config producer, err := nsq.NewProducer(args.NSQDAddress.String(), config) if err != nil {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 7.1K bytes - Viewed (0) -
pkg/test/echo/server/endpoint/grpc.go
if s.Port.XDSReadinessTLS { // TODO: using the servers key/cert is not always valid, it may not be allowed to make requests to itself req.CertFile = cert req.KeyFile = key req.CaCertFile = ca req.InsecureSkipVerify = true } _, err = s.f.ForwardEcho(context.Background(), &forwarder.Config{ XDSTestBootstrap: s.Port.XDSTestBootstrap, Request: req, }) return err
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Sep 25 17:30:37 UTC 2023 - 8.7K bytes - Viewed (0) -
src/cmd/go/internal/web/http.go
var impatientInsecureHTTPClient = &http.Client{ CheckRedirect: checkRedirect, Timeout: 5 * time.Second, Transport: &http.Transport{ Proxy: http.ProxyFromEnvironment, TLSClientConfig: &tls.Config{ InsecureSkipVerify: true, }, }, } var securityPreservingDefaultClient = securityPreservingHTTPClient(http.DefaultClient) // securityPreservingHTTPClient returns a client that is like the original
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Aug 10 17:34:27 UTC 2023 - 9.7K bytes - Viewed (0) -
pilot/pkg/model/test/mockopenidserver.go
log.Errorf("Server failed to serve in %q: %v", ms.URL, err) } }() // nolint: gosec // test only code httpClient := &http.Client{ Transport: &http.Transport{ TLSClientConfig: &tls.Config{InsecureSkipVerify: true}, }, } wait := 10 * time.Millisecond for try := 0; try < 10; try++ { // Try to call the server res, err := httpClient.Get(fmt.Sprintf("%s/.well-known/openid-configuration", ms.URL))
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Feb 23 09:47:21 UTC 2024 - 9.4K bytes - Viewed (0) -
src/cmd/pprof/pprof.go
url, err := url.Parse(source) if err != nil { return nil, err } var tlsConfig *tls.Config if url.Scheme == "https+insecure" { tlsConfig = &tls.Config{ InsecureSkipVerify: true, } url.Scheme = "https" source = url.String() } client := &http.Client{ Transport: &http.Transport{ ResponseHeaderTimeout: timeout + 5*time.Second,
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue May 14 19:41:17 UTC 2024 - 9.5K bytes - Viewed (0) -
internal/logger/target/kafka/kafka.go
if err != nil { return err } sconfig.Net.TLS.Enable = h.kconfig.TLS.Enable sconfig.Net.TLS.Config = tlsConfig sconfig.Net.TLS.Config.InsecureSkipVerify = h.kconfig.TLS.SkipVerify sconfig.Net.TLS.Config.ClientAuth = h.kconfig.TLS.ClientAuth sconfig.Net.TLS.Config.RootCAs = h.kconfig.TLS.RootCAs
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Sun Jun 02 03:03:39 UTC 2024 - 10.2K bytes - Viewed (0) -
staging/src/k8s.io/apimachinery/pkg/util/proxy/upgradeaware_test.go
return ts }, ProxyTransport: utilnet.SetTransportDefaults(&http.Transport{TLSClientConfig: &tls.Config{ NextProtos: []string{"http2", "http/1.1"}, InsecureSkipVerify: true, }}), }, "https (invalid hostname + InsecureSkipVerify)": { ServerFunc: func(h http.Handler) *httptest.Server { cert, err := tls.X509KeyPair(exampleCert, exampleKey) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 10 07:29:34 UTC 2023 - 39.4K bytes - Viewed (0)