Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for TLS Mutual authentication within forward input #1861

Merged
merged 1 commit into from
Mar 5, 2018

Conversation

martinssipenko
Copy link
Contributor

Hi,

This PR add support for Client auth (also knows as Mutual authentication).

This mainly consist of two things:

  • Configure SSL context to load ca_file from ca_path config. In case config is not set it will default to null, which is also acceptable.
  • If client_cert_auth config is set to true then configure SSL context to verify peer certificates.

This is my first ever ruby code and I'm having trouble understanding how to write test, so I would appreciate any help with that.

@repeatedly
Copy link
Member

Thanks. I will check it soon!

@repeatedly repeatedly self-assigned this Feb 26, 2018
@repeatedly repeatedly added v1 enhancement Feature request or improve operations labels Feb 26, 2018
@repeatedly repeatedly merged commit 2b7e62f into fluent:master Mar 5, 2018
@repeatedly
Copy link
Member

Add unit test is hard for this case. So we need to consider adding other test scenario in the feature.

@martinssipenko martinssipenko deleted the mutual_tls_auth branch March 5, 2018 09:14
@repeatedly
Copy link
Member

After CI testing is passed, I will release v1.1.1.

@martinssipenko
Copy link
Contributor Author

@repeatedly should I also update the docs to reflect this festure?

@repeatedly
Copy link
Member

@martinssipenko
Copy link
Contributor Author

fluent/fluentd-docs#465

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement Feature request or improve operations v1
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants