Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: fix mTLS logic #374

Merged
merged 2 commits into from
Apr 10, 2020
Merged

fix: fix mTLS logic #374

merged 2 commits into from
Apr 10, 2020

Conversation

arithmetic1728
Copy link
Collaborator

@arithmetic1728 arithmetic1728 commented Apr 9, 2020

new logic for client_options:

  1. api_endpoint: yes, client_cert_source: yes => use as it is (same as before)
  2. api_endpoint: yes, client_cert_source: no => no adc (previously try to load adc SSL cred)
  3. api_endpoint: whatever, client_cert_source: yes => use cert from client_cert_source, use provided api_endpoint or default mTLS endpoint (same as before)
  4. api_endpoint: no, client_cert_source: no => do nothing (same as before)

#360

previous PR triggers mTLS if client_options.api_endpoint is different 
from the default one, in this PR, we change the logic, mTLS is triggered 
if client_options.api_endpoint is provided
@googlebot googlebot added the cla: yes This human has signed the Contributor License Agreement. label Apr 9, 2020
Copy link
Contributor

@software-dov software-dov left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, just one small (nonblocking) question and one (optional) judgement call code nit.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cla: yes This human has signed the Contributor License Agreement.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants