-
Notifications
You must be signed in to change notification settings - Fork 70
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make TLS and Authorization Configuration Fields Optional #589
base: dev
Are you sure you want to change the base?
Make TLS and Authorization Configuration Fields Optional #589
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the PR guys! Few comments, and also
- base your PR on dev instead of main
- remember to follow the guideline here
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Remember to base your PR on dev instead of main~
server_config.alpn_protocols = vec![b"http/1.1".to_vec()]; | ||
let tls_config = Arc::new(server_config); | ||
Some(TlsAcceptor::from(tls_config)) | ||
if let (Some(private_key_path), Some(certificate_pem_path)) = ( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
if the pem paths are not set when tls.enabled
is true, we should throw an error — like your line 297
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we have updated pr to be based on the dev branch instead of the main branch and added validation to throw an error when TLS is enabled but PEM paths are not set.
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## dev #589 +/- ##
==========================================
+ Coverage 54.48% 54.50% +0.02%
==========================================
Files 193 193
Lines 20618 20633 +15
==========================================
+ Hits 11234 11247 +13
- Misses 9384 9386 +2 ☔ View full report in Codecov by Sentry. |
This pull request fixes #565 where the TLSNotary server fails to start when specific configuration fields (
private_key_pem_path
,certificate_pem_path
, andwhitelist_csv_path
) are missing, even when the corresponding features are disabled.Please review and provide feedback!