Search Options

Results per page
Sort
Preferred Languages
Advance

Results 71 - 80 of 83 for InsecureSkipVerify (0.31 sec)

  1. pilot/cmd/pilot-agent/status/server.go

    			// nolint: gosec
    			// This is matching Kubernetes. It is a reasonable usage of this, as it is just a health check over localhost.
    			transport, err := setTransportDefaults(&http.Transport{
    				TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
    				DialContext:     d.DialContext,
    				// https://github.com/kubernetes/kubernetes/blob/0153febd9f0098d4b8d0d484927710eaf899ef40/pkg/probe/http/http.go#L55
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 15:07:03 UTC 2024
    - 31.1K bytes
    - Viewed (1)
  2. src/net/smtp/smtp_test.go

    			return
    		}
    		defer conn.Close()
    
    		_, err = conn.Write([]byte("220 SIGNS\r\n"))
    		if err != nil {
    			t.Errorf("server: write: %v", err)
    			return
    		}
    	}()
    
    	config.InsecureSkipVerify = true
    	conn, err := tls.Dial("tcp", ln.Addr().String(), &config)
    	if err != nil {
    		t.Fatalf("client: dial: %v", err)
    	}
    	defer conn.Close()
    
    	client, err := NewClient(conn, ln.Addr().String())
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 18:42:28 UTC 2024
    - 28.5K bytes
    - Viewed (0)
  3. cmd/sts-handlers.go

    		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, errors.New("More than one client certificate provided"))
    		return
    	}
    
    	certificate := r.TLS.PeerCertificates[0]
    	if !globalIAMSys.STSTLSConfig.InsecureSkipVerify { // Verify whether the client certificate has been issued by a trusted CA.
    		_, err := certificate.Verify(x509.VerifyOptions{
    			KeyUsages: []x509.ExtKeyUsage{
    				x509.ExtKeyUsageClientAuth,
    			},
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Tue Jun 11 03:13:30 UTC 2024
    - 33.9K bytes
    - Viewed (0)
  4. cmd/test-utils_test.go

    //  https://golang.org/src/crypto/tls/generate_cert.go
    //    $ go run generate_cert.go -ca --host 127.0.0.1
    // The generated certificate contains IP SAN, that way we don't need
    // to enable InsecureSkipVerify in TLS config
    
    // Starts the test server and returns the TestServer with TLS configured instance.
    func StartTestTLSServer(t TestErrHandler, instanceType string, cert, key []byte) TestServer {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Mon Jun 10 15:50:49 UTC 2024
    - 76.9K bytes
    - Viewed (0)
  5. tests/integration/ambient/baseline_test.go

    				Headers:            nil,
    				Cert:               string(cert.ClientCert),
    				Key:                string(cert.Key),
    				CaCert:             string(cert.RootCert),
    				InsecureSkipVerify: true,
    			}
    			hbsvc := echo.HBONE{
    				Address:            apps.WaypointProxies[apps.ServiceAddressedWaypoint.Config().ServiceWaypointProxy].Inbound(),
    				Headers:            nil,
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 12 00:07:28 UTC 2024
    - 78.4K bytes
    - Viewed (0)
  6. src/net/http/transport_test.go

    			},
    		},
    		Dial: func(_, _ string) (net.Conn, error) {
    			panic("shouldn't be called")
    		},
    		DialTLS: func(_, _ string) (net.Conn, error) {
    			tc, err := tls.Dial("tcp", addr, &tls.Config{
    				InsecureSkipVerify: true,
    				NextProtos:         []string{"foo"},
    			})
    			if err != nil {
    				return nil, err
    			}
    			if err := tc.Handshake(); err != nil {
    				return nil, err
    			}
    			close(cancel)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Jun 06 21:59:21 UTC 2024
    - 192.6K bytes
    - Viewed (0)
  7. src/net/http/clientserver_test.go

    		fmt.Fprintf(w, "Hello, %v", r.RemoteAddr)
    	}))
    	defer cst.close()
    
    	var numOpen, numClose int32 // atomic
    
    	tlsConfig := &tls.Config{InsecureSkipVerify: true}
    	tr := &Transport{
    		TLSClientConfig: tlsConfig,
    		DialTLS: func(_, addr string) (net.Conn, error) {
    			time.Sleep(10 * time.Millisecond)
    			rc, err := net.Dial("tcp", addr)
    			if err != nil {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 01:00:11 UTC 2024
    - 46.6K bytes
    - Viewed (0)
  8. src/net/http/client_test.go

    	// would require a new cert for testing, and probably
    	// redundant with these tests.
    	c := ts.Client()
    	for _, insecure := range []bool{true, false} {
    		c.Transport.(*Transport).TLSClientConfig = &tls.Config{
    			InsecureSkipVerify: insecure,
    		}
    		res, err := c.Get(ts.URL)
    		if (err == nil) != insecure {
    			t.Errorf("insecure=%v: got unexpected err=%v", insecure, err)
    		}
    		if res != nil {
    			res.Body.Close()
    		}
    	}
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:30:50 UTC 2024
    - 63.8K bytes
    - Viewed (0)
  9. cmd/iam.go

    	stsTLSConfig, err := xtls.Lookup(s[config.IdentityTLSSubSys][config.Default])
    	if err != nil {
    		iamLogIf(ctx, fmt.Errorf("Unable to initialize X.509/TLS STS API: %w", err), logger.WarningKind)
    	}
    
    	if stsTLSConfig.InsecureSkipVerify {
    		iamLogIf(ctx, fmt.Errorf("Enabling %s is not recommended in a production environment", xtls.EnvIdentityTLSSkipVerify), logger.WarningKind)
    	}
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Jun 13 22:26:38 UTC 2024
    - 71.9K bytes
    - Viewed (0)
  10. src/net/http/serve_test.go

    	select {
    	case err := <-errc:
    		t.Fatalf("ServeTLS: %v", err)
    	case <-serving:
    	}
    
    	c, err := tls.Dial("tcp", ln.Addr().String(), &tls.Config{
    		InsecureSkipVerify: true,
    		NextProtos:         []string{"h2", "http/1.1"},
    	})
    	if err != nil {
    		t.Fatal(err)
    	}
    	defer c.Close()
    	if got, want := c.ConnectionState().NegotiatedProtocol, "h2"; got != want {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Jun 07 17:57:01 UTC 2024
    - 202K bytes
    - Viewed (0)
Back to top