-
Notifications
You must be signed in to change notification settings - Fork 801
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add cli tls support #5027
Add cli tls support #5027
Conversation
tools/cli/app.go
Outdated
@@ -79,6 +79,12 @@ func NewCliApp() *cli.App { | |||
Usage: "optional argument for transport protocol format, either 'grpc' or 'tchannel'. Defaults to tchannel if not provided", | |||
EnvVar: "CADENCE_CLI_TRANSPORT_PROTOCOL", | |||
}, | |||
cli.StringFlag{ | |||
Name: FlagTLSCertPathWithAlias, | |||
Value: "", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: delete this line to keep the style consistent
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done, thanks
Quick question, Have you tested this working? |
@longquanzheng Hi, yes, please see the testing procedure in my original comment:
Please let me know if you think any more should be conducted, thanks. |
Pull Request Test Coverage Report for Build 0184c121-23ad-4a12-bb0f-41bb15841445
💛 - Coveralls |
Added the option to use TLS via the Cadence CLI, by use of a
tls_cert_path
flag which accepts a file path to a PEM formatted certificate file.Why?
A user may want to make a CLI call to the grpc port of a TLS enabled Cadence cluster. In this case, the CLI needs to be able to construct the correct TLS outbound configuration, which requires enabling the user to pass the relevant cert file.
How did you test it?
cadence admin cluster describe
andcadence domain register
CLI calls to the grpc port of the TLS-enabled cluster, while passing the relevant cert file via the newtls_cert_path
flag.Potential risks
This change does not affect the behaviour of existing transport options. So, in the worst case (e.g. the new feature does not allow connection to a TLS-enabled cluster in some case), it should not break any existing deployments/configurations.
Release notes
No.
Documentation Changes
No.