-
Notifications
You must be signed in to change notification settings - Fork 4.5k
advancedtls: Use the New tls.Config.VerifyConnection callback #3610
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@ZhenLian I'm looking into this issue and I have one question at the moment. I don't understand the statement here https://github.com/grpc/grpc-go/blob/master/security/advancedtls/advancedtls.go#L446-L447. // 2. will ignore basic certificate check when setting InsecureSkipVerify
// to true. I understand that May you elaborate on this? |
Since we are reloading the root CA certs in |
@kadenlnelson |
@ZhenLian May you take a look at my work in progress PR? https://github.com/grpc/grpc-go/pull/3963/files Also in reference to;
Not sure how this is going to be possible since the function signature is changing to use; VerifyPeer func(tls.ConnectionState) error |
@ZhenLian before I go ahead and add tests/docs, does my draft pull request assess the issue accordingly? |
I left some comments. Feel free to let me know if you have any questions. Thanks! |
The PR mentioned here was closed a while back due to inactivity. Hence, closing this one as well. |
Use case(s) - what problem will this feature solve?
A new verification method was recently introduced in PR https://go-review.googlesource.com/c/go/+/229122/ , with the initiative to have all the connection information(such as ServerName, PeerCertificate, etc) in verify callbacks. The original issue is golang/go#36736.
We might also want to switch to use this method in advancedtls, to improve internal code quality and reduce duplicate code with main tls library of gRPC. Right now we are using a workaround of building verification callback in a closure, which could be improved after this function is used.
No API Changes are expected. This is intended for internal code quality enhancement.
Proposed Solution
Use
tls.Config.VerifyConnection(s ConnectionState)
in advancedtls.@jiangtaoli2016 FYI.
The text was updated successfully, but these errors were encountered: