Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support to skip TLS verification #2202

Merged

Conversation

bombsimon
Copy link
Contributor

Follow up from #933 where InsecureSkipVerify was discussed but not
implemented.

Description: Add support to set InsecureSkipVerify to tls.Config. This will use a secure connection which Insecure does not, however it will not verify the certificate.

Link to tracking Issue: No issue but followup on #933.

Testing: Added test for the configuration to ensure settings were properly set.

Documentation: Updated configtls README with example.

/cc @ccaraman

Follow up from open-telemetry#933 where InsecureSkipVerify was discussed but not
implemented.
@bombsimon bombsimon requested a review from a team November 23, 2020 09:52
@linux-foundation-easycla
Copy link

linux-foundation-easycla bot commented Nov 23, 2020

CLA Signed

The committers are authorized under a signed CLA.

@codecov
Copy link

codecov bot commented Nov 23, 2020

Codecov Report

Merging #2202 (6850770) into master (cc0a999) will decrease coverage by 0.02%.
The diff coverage is 100.00%.

Impacted file tree graph

@@            Coverage Diff             @@
##           master    #2202      +/-   ##
==========================================
- Coverage   92.01%   91.99%   -0.03%     
==========================================
  Files         271      271              
  Lines       15783    15784       +1     
==========================================
- Hits        14523    14520       -3     
- Misses        858      860       +2     
- Partials      402      404       +2     
Impacted Files Coverage Δ
config/configtls/configtls.go 100.00% <100.00%> (ø)
translator/internaldata/resource_to_oc.go 88.73% <0.00%> (-5.64%) ⬇️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update cc0a999...6850770. Read the comment docs.

@bogdandrutu
Copy link
Member

Can you please sign the CLA?

@bombsimon
Copy link
Contributor Author

Can you please sign the CLA?

Yes, I'm trying to add our organisation to EasyCLA but there's some issues where the page just gets stuck loading. I'm not our CLA manager but will try this again soon and if the issue persist I guess I'll have to file an issue using the link the bot provided.

@bogdandrutu
Copy link
Member

bogdandrutu commented Nov 23, 2020

I sent a fix #2204 for the coverage flakiness, thanks for pointing that it is confusing, made me fix it :)

@bombsimon
Copy link
Contributor Author

Still no success having the CLA manager to join the company so I filed a support ticket to LFX help center. Will sign as soon as I'm able to associate my account with my organisation.

@bombsimon
Copy link
Contributor Author

@bogdandrutu Sorry for the delay, it was a pain to get the CLA setup working with CLA managers and whatnot. But it should be all OK now! 😸

@bogdandrutu bogdandrutu merged commit 74aadbc into open-telemetry:master Nov 24, 2020
@bombsimon
Copy link
Contributor Author

@bogdandrutu Thank you so much for the quick merge! How do you usually handle release cycles? Could I expect a v0.15.1 in a near future or will you release v0.16.0 in a month or so?

MovieStoreGuy pushed a commit to atlassian-forks/opentelemetry-collector that referenced this pull request Nov 11, 2021
…pen-telemetry#2202)

* s/ValueRecorder/Histogram/g

* s/ValueObserver/GaugeObserver/g

* s/UpDownSumObserver/UpDownCounterObserver/g

* s/SumObserver/CounterObserver/g

* changelog

* pr num

* unstable->experimental

* Apply suggestions from code review

Co-authored-by: Tyler Yahn <MrAlias@users.noreply.github.com>

* Apply suggestions from code review

* apply feedback from @evantorrie by hand

* Apply suggestions from code review

Thanks

Co-authored-by: ET <evantorrie@users.noreply.github.com>

* Update sdk/export/metric/metric.go

* Apply suggestions from code review

Thank you @evantorrie !

Co-authored-by: ET <evantorrie@users.noreply.github.com>

* revert getting-started fix let tyler's update remove this text

* more variable name fixes

* test repair

Co-authored-by: Tyler Yahn <MrAlias@users.noreply.github.com>
Co-authored-by: ET <evantorrie@users.noreply.github.com>
Co-authored-by: Anthony Mirabella <a9@aneurysm9.com>
hughesjj pushed a commit to hughesjj/opentelemetry-collector that referenced this pull request Apr 27, 2023
* Bump aquasecurity/trivy-action from 0.7.1 to 0.8.0

Bumps [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action) from 0.7.1 to 0.8.0.
- [Release notes](https://github.com/aquasecurity/trivy-action/releases)
- [Commits](aquasecurity/trivy-action@0.7.1...0.8.0)

---
updated-dependencies:
- dependency-name: aquasecurity/trivy-action
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>

* update flagged golang.org/x dependencies

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Ryan Fitzpatrick <rfitzpatrick@splunk.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants