Skip to content

Conversation

@brendandburns
Copy link
Contributor

@brendandburns brendandburns commented Jun 24, 2017

@mbohlool this is needed for Bronze certification

Fixes #33

// grumpy'
String caCert = config.getCertificateAuthorityData();
String caCertFile = config.getCertificateAuthorityFile();
if (caCert != null || caCertFile != null) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should we fail if config.verifySSL() is true and both of these two are null?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No, because you could be using a legit well-known CA issued cert, in which case you don't have to supply your own CA root.

}
}
} else {
client.setVerifyingSsl(false);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should we also set this to true in the previous block. just to be bullet proof (e.g. somebody loading config with verifySSL false and then again with it set to true.

Copy link
Contributor Author

@brendandburns brendandburns Jun 25, 2017

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This call is static and always creates both a new KubeConfig object and returns a new client, so I don't think that is a risk.

@brendandburns
Copy link
Contributor Author

Comments addressed, relevant issue filed and linked.

@mbohlool
Copy link
Contributor

LGTM

@mbohlool mbohlool merged commit 27b164e into kubernetes-client:master Jun 25, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants