-
Notifications
You must be signed in to change notification settings - Fork 60
fix(op-signer): allow anon auth when mTLS is disabled (for local testing only) #263
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #263 +/- ##
==========================================
- Coverage 53.76% 53.68% -0.09%
==========================================
Files 67 67
Lines 7923 7947 +24
==========================================
+ Hits 4260 4266 +6
- Misses 3381 3398 +17
- Partials 282 283 +1
Flags with carried forward coverage won't be shown. Click here to find out more.
🚀 New features to boost your workflow:
|
LGTM overall, tested & confirmed working. however, what should happen if the config file's additionally, seems like its possible to add |
I think this is fine and there doesn't need to be validation added here. This would be the same if there were duplicate hostname entries, so I would expect similar behavior.
I don't think we need to validate for this. I think this is fine, and they just wont be usable, and probably shouldn't be usable. I'm happy to add some validation in another PR. I think this should just result in warnings being logged |
Description
This MR adds
func NewAnonMiddleware() oprpc.Middleware
which sets theClientInfo.ClientName
toanonymous
when mTLS auth is disabled. This is needed to allow disabling TLS auth locally.Tests
You can test by creating a config.yaml like
Then post to op-signer to see the signing results