- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 83 for InsecureSkipVerify (0.38 sec)
-
internal/event/target/kafka.go
if err != nil { target.loggerOnce(context.Background(), err, target.ID().String()) return err } config.Net.TLS.Enable = args.TLS.Enable config.Net.TLS.Config = tlsConfig config.Net.TLS.Config.InsecureSkipVerify = args.TLS.SkipVerify config.Net.TLS.Config.ClientAuth = args.TLS.ClientAuth config.Net.TLS.Config.RootCAs = args.TLS.RootCAs // These settings are needed to ensure that kafka client doesn't hang on brokers
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Sat Jun 01 15:02:59 UTC 2024 - 13.1K bytes - Viewed (0) -
pkg/controlplane/apiserver/config.go
func CreateProxyTransport() *http.Transport { var proxyDialerFn utilnet.DialFunc // Proxying to pods and services is IP-based... don't expect to be able to verify the hostname proxyTLSClientConfig := &tls.Config{InsecureSkipVerify: true} proxyTransport := utilnet.SetTransportDefaults(&http.Transport{ DialContext: proxyDialerFn, TLSClientConfig: proxyTLSClientConfig, }) return proxyTransport
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 07 17:57:37 UTC 2024 - 14.9K bytes - Viewed (0) -
manifests/charts/istiod-remote/templates/crd-all.gen.yaml
certificates. type: string insecureSkipVerify: description: '`insecureSkipVerify` specifies whether the proxy should skip verifying the CA signature
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 06 21:31:42 UTC 2024 - 671.7K bytes - Viewed (0) -
src/crypto/tls/handshake_server_test.go
} } func TestVersion(t *testing.T) { serverConfig := &Config{ Certificates: testConfig.Certificates, MaxVersion: VersionTLS13, } clientConfig := &Config{ InsecureSkipVerify: true, MinVersion: VersionTLS12, } state, _, err := testHandshake(t, clientConfig, serverConfig) if err != nil { t.Fatalf("handshake failed: %s", err) } if state.Version != VersionTLS13 {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Jun 03 14:56:25 UTC 2024 - 64.7K bytes - Viewed (0) -
manifests/charts/base/crds/crd-all.gen.yaml
certificates. type: string insecureSkipVerify: description: '`insecureSkipVerify` specifies whether the proxy should skip verifying the CA signature
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 06 21:31:42 UTC 2024 - 671.6K bytes - Viewed (0) -
pkg/config/validation/agent/validation.go
if settings.CaCertificates != "" || settings.CredentialName != "" || settings.SubjectAltNames != nil { errs = AppendErrors(errs, fmt.Errorf("cannot specify CaCertificates or CredentialName or SubjectAltNames when InsecureSkipVerify is set true")) } } if settings.Mode == networking.ClientTLSSettings_MUTUAL { // In tls mutual mode, we can specify both client cert and ca cert by CredentialName.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 20:06:41 UTC 2024 - 30.9K bytes - Viewed (0) -
src/crypto/tls/tls.go
c.handshakeFn = c.serverHandshake return c } // Client returns a new TLS client side connection // using conn as the underlying transport. // The config cannot be nil: users must set either ServerName or // InsecureSkipVerify in the config. func Client(conn net.Conn, config *Config) *Conn { c := &Conn{ conn: conn, config: config, isClient: true, } c.handshakeFn = c.clientHandshake return c }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Jun 07 17:57:01 UTC 2024 - 12.2K bytes - Viewed (0) -
pkg/test/echo/server/endpoint/http.go
return net.Dial("unix", s.UDSServer) }, } } else if s.Port.TLS { url = fmt.Sprintf("https://%s", address) client.Transport = &http.Transport{TLSClientConfig: &tls.Config{InsecureSkipVerify: true}} // nolint: gosec // test only code } else { url = fmt.Sprintf("http://%s", address) } err := retry.UntilSuccess(func() error { resp, err := client.Get(url) if err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue May 23 16:20:31 UTC 2023 - 12.8K bytes - Viewed (0) -
pkg/wasm/imagefetcher.go
if opt.Insecure { t := remote.DefaultTransport.(*http.Transport).Clone() // nolint: gosec // This is only when a user explicitly sets a flag to enable insecure mode t.TLSClientConfig = &tls.Config{ InsecureSkipVerify: opt.Insecure, } fetchOpts = append(fetchOpts, remote.WithTransport(t)) } return &ImageFetcher{ fetchOpts: append(fetchOpts, remote.WithContext(ctx)), } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Dec 10 05:44:51 UTC 2023 - 12K bytes - Viewed (0) -
cmd/kubeadm/app/util/apiclient/wait.go
for _, comp := range components { fmt.Printf("[control-plane-check] Checking %s at %s\n", comp.name, comp.url) go func(comp controlPlaneComponent) { tr := &http.Transport{ TLSClientConfig: &tls.Config{InsecureSkipVerify: true}, } client := &http.Client{Transport: tr} start := time.Now() var lastError error err := wait.PollUntilContextTimeout( context.Background(),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 01 07:10:31 UTC 2024 - 13.3K bytes - Viewed (0)