-
Notifications
You must be signed in to change notification settings - Fork 949
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feature: enable setup common name whitelist for tls checking #1036
feature: enable setup common name whitelist for tls checking #1036
Conversation
main.go
Outdated
@@ -82,7 +82,8 @@ func setupFlags(cmd *cobra.Command) { | |||
flagSet.StringVar(&cfg.TLS.Key, "tlskey", "", "Specify key file of TLS") | |||
flagSet.StringVar(&cfg.TLS.Cert, "tlscert", "", "Specify cert file of TLS") | |||
flagSet.StringVar(&cfg.TLS.CA, "tlscacert", "", "Specify CA file of TLS") | |||
flagSet.BoolVar(&cfg.TLS.VerifyRemote, "tlsverify", false, "Use TLS and verify remote") | |||
flagSet.BoolVar(&cfg.TLS.VerifyRemote, "tlsverify", false, "Use TLS and verify re") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
%s/re/remote :)
Codecov Report
@@ Coverage Diff @@
## master #1036 +/- ##
==========================================
- Coverage 15.96% 15.71% -0.26%
==========================================
Files 161 139 -22
Lines 8856 8484 -372
==========================================
- Hits 1414 1333 -81
+ Misses 7339 7050 -289
+ Partials 103 101 -2
Continue to review full report at Codecov.
|
LGTM |
I rerun the CI and submitted an issue #1095 to record this flaky test. |
apis/server/router.go
Outdated
s.addRoute(r, http.MethodGet, "/containers/{name:.*}/json", s.getContainer) | ||
s.addRoute(r, http.MethodDelete, "/containers/{name:.*}", s.removeContainers) | ||
s.addRoute(r, http.MethodPost, "/containers/{name:.*}/exec", s.createContainerExec) | ||
s.addRoute(r, http.MethodPost, "/exec/{name:.*}/start", s.startContainerExec) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it is your missing line of code addRoute(r, http.MethodGet, "/exec/{name:.*}/json", s.getExecInfo)
leads to the CI failure.
Signed-off-by: Frank Yang <[email protected]>
LGTM |
I am wondering if we add more document in https://github.com/alibaba/pouch/blob/master/docs/features/pouch_with_tls.md to tell people how to use this feature. Thanks. @yyb196 |
Signed-off-by: Frank Yang [email protected]
Ⅰ. Describe what this PR did
enable setup common name whitelist for tls checking, not all the certificates which recognized by pouchd can connect to pouchd, if
--manager-whitelist
is specified only certificates whose common name in the whitelist will be accept by the pouchd.Ⅱ. Does this pull request fix one issue?
close #802
Ⅲ. Describe how you did it
Ⅳ. Describe how to verify it
Ⅴ. Special notes for reviews