|
@ -64,12 +64,12 @@ func LoadServerTLS(config *util.ViperProxy, component string) (grpc.ServerOption |
|
|
RootOptions: advancedtls.RootCertificateOptions{ |
|
|
RootOptions: advancedtls.RootCertificateOptions{ |
|
|
RootProvider: serverRootProvider, |
|
|
RootProvider: serverRootProvider, |
|
|
}, |
|
|
}, |
|
|
RequireClientCert: false, |
|
|
|
|
|
|
|
|
RequireClientCert: true, |
|
|
VerifyPeer: func(params *advancedtls.VerificationFuncParams) (*advancedtls.VerificationResults, error) { |
|
|
VerifyPeer: func(params *advancedtls.VerificationFuncParams) (*advancedtls.VerificationResults, error) { |
|
|
glog.V(0).Infof("Client common name: %s.\n", params.Leaf.Subject.CommonName) |
|
|
glog.V(0).Infof("Client common name: %s.\n", params.Leaf.Subject.CommonName) |
|
|
return &advancedtls.VerificationResults{}, nil |
|
|
return &advancedtls.VerificationResults{}, nil |
|
|
}, |
|
|
}, |
|
|
VType: advancedtls.SkipVerification, |
|
|
|
|
|
|
|
|
VType: advancedtls.CertVerification, |
|
|
} |
|
|
} |
|
|
ta, err := advancedtls.NewServerCreds(options) |
|
|
ta, err := advancedtls.NewServerCreds(options) |
|
|
if err != nil { |
|
|
if err != nil { |
|
@ -134,7 +134,7 @@ func LoadClientTLS(config *util.ViperProxy, component string) grpc.DialOption { |
|
|
RootOptions: advancedtls.RootCertificateOptions{ |
|
|
RootOptions: advancedtls.RootCertificateOptions{ |
|
|
RootProvider: clientRootProvider, |
|
|
RootProvider: clientRootProvider, |
|
|
}, |
|
|
}, |
|
|
VType: advancedtls.SkipVerification, |
|
|
|
|
|
|
|
|
VType: advancedtls.CertVerification, |
|
|
} |
|
|
} |
|
|
ta, err := advancedtls.NewClientCreds(options) |
|
|
ta, err := advancedtls.NewClientCreds(options) |
|
|
if err != nil { |
|
|
if err != nil { |
|
|