- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 31 for InsecureSkipVerify (0.23 sec)
-
pilot/pkg/security/model/authentication.go
tlsContext.TlsCertificateSdsSecretConfigs = []*tls.SdsSecretConfig{ ConstructSdsSecretConfigForCredential(tlsOpts.CredentialName, credentialSocketExist), } } // If the InsecureSkipVerify is true, there is no need to configure CA Cert and SAN. if tlsOpts.GetInsecureSkipVerify().GetValue() { return } // create SDS config for gateway to fetch certificate validation context
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Mar 28 22:11:02 UTC 2024 - 9.9K bytes - Viewed (0) -
staging/src/k8s.io/apimachinery/pkg/util/proxy/upgradeaware_test.go
return ts }, ProxyTransport: utilnet.SetTransportDefaults(&http.Transport{TLSClientConfig: &tls.Config{ NextProtos: []string{"http2", "http/1.1"}, InsecureSkipVerify: true, }}), }, "https (invalid hostname + InsecureSkipVerify)": { ServerFunc: func(h http.Handler) *httptest.Server { cert, err := tls.X509KeyPair(exampleCert, exampleKey) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 10 07:29:34 UTC 2023 - 39.4K bytes - Viewed (0) -
internal/logger/target/kafka/kafka.go
if err != nil { return err } sconfig.Net.TLS.Enable = h.kconfig.TLS.Enable sconfig.Net.TLS.Config = tlsConfig sconfig.Net.TLS.Config.InsecureSkipVerify = h.kconfig.TLS.SkipVerify sconfig.Net.TLS.Config.ClientAuth = h.kconfig.TLS.ClientAuth sconfig.Net.TLS.Config.RootCAs = h.kconfig.TLS.RootCAs
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Sun Jun 02 03:03:39 UTC 2024 - 10.2K bytes - Viewed (0) -
internal/event/target/kafka.go
if err != nil { target.loggerOnce(context.Background(), err, target.ID().String()) return err } config.Net.TLS.Enable = args.TLS.Enable config.Net.TLS.Config = tlsConfig config.Net.TLS.Config.InsecureSkipVerify = args.TLS.SkipVerify config.Net.TLS.Config.ClientAuth = args.TLS.ClientAuth config.Net.TLS.Config.RootCAs = args.TLS.RootCAs // These settings are needed to ensure that kafka client doesn't hang on brokers
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Sat Jun 01 15:02:59 UTC 2024 - 13.1K bytes - Viewed (0) -
pkg/controlplane/apiserver/config.go
func CreateProxyTransport() *http.Transport { var proxyDialerFn utilnet.DialFunc // Proxying to pods and services is IP-based... don't expect to be able to verify the hostname proxyTLSClientConfig := &tls.Config{InsecureSkipVerify: true} proxyTransport := utilnet.SetTransportDefaults(&http.Transport{ DialContext: proxyDialerFn, TLSClientConfig: proxyTLSClientConfig, }) return proxyTransport
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 07 17:57:37 UTC 2024 - 14.9K bytes - Viewed (0) -
pkg/config/validation/agent/validation.go
if settings.CaCertificates != "" || settings.CredentialName != "" || settings.SubjectAltNames != nil { errs = AppendErrors(errs, fmt.Errorf("cannot specify CaCertificates or CredentialName or SubjectAltNames when InsecureSkipVerify is set true")) } } if settings.Mode == networking.ClientTLSSettings_MUTUAL { // In tls mutual mode, we can specify both client cert and ca cert by CredentialName.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 20:06:41 UTC 2024 - 30.9K bytes - Viewed (0) -
src/crypto/tls/tls.go
c.handshakeFn = c.serverHandshake return c } // Client returns a new TLS client side connection // using conn as the underlying transport. // The config cannot be nil: users must set either ServerName or // InsecureSkipVerify in the config. func Client(conn net.Conn, config *Config) *Conn { c := &Conn{ conn: conn, config: config, isClient: true, } c.handshakeFn = c.clientHandshake return c }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Jun 07 17:57:01 UTC 2024 - 12.2K bytes - Viewed (0) -
cmd/kubeadm/app/util/apiclient/wait.go
for _, comp := range components { fmt.Printf("[control-plane-check] Checking %s at %s\n", comp.name, comp.url) go func(comp controlPlaneComponent) { tr := &http.Transport{ TLSClientConfig: &tls.Config{InsecureSkipVerify: true}, } client := &http.Client{Transport: tr} start := time.Now() var lastError error err := wait.PollUntilContextTimeout( context.Background(),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 01 07:10:31 UTC 2024 - 13.3K bytes - Viewed (0) -
pkg/test/echo/server/endpoint/http.go
return net.Dial("unix", s.UDSServer) }, } } else if s.Port.TLS { url = fmt.Sprintf("https://%s", address) client.Transport = &http.Transport{TLSClientConfig: &tls.Config{InsecureSkipVerify: true}} // nolint: gosec // test only code } else { url = fmt.Sprintf("http://%s", address) } err := retry.UntilSuccess(func() error { resp, err := client.Get(url) if err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue May 23 16:20:31 UTC 2023 - 12.8K bytes - Viewed (0) -
pkg/wasm/imagefetcher.go
if opt.Insecure { t := remote.DefaultTransport.(*http.Transport).Clone() // nolint: gosec // This is only when a user explicitly sets a flag to enable insecure mode t.TLSClientConfig = &tls.Config{ InsecureSkipVerify: opt.Insecure, } fetchOpts = append(fetchOpts, remote.WithTransport(t)) } return &ImageFetcher{ fetchOpts: append(fetchOpts, remote.WithContext(ctx)), } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Dec 10 05:44:51 UTC 2023 - 12K bytes - Viewed (0)