mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-09-10 05:30:26 +00:00
Use CAFile even if client certificate is not specified
This commit is contained in:
@@ -186,9 +186,12 @@ func RESTClientFor(config *Config) (*RESTClient, error) {
|
||||
// default http.DefaultTransport if no special case behavior is needed.
|
||||
func TransportFor(config *Config) (http.RoundTripper, error) {
|
||||
// Set transport level security
|
||||
if config.Transport != nil && (config.CertFile != "" || config.Insecure) {
|
||||
if config.Transport != nil && (config.CAFile != "" || config.CertFile != "" || config.Insecure) {
|
||||
return nil, fmt.Errorf("using a custom transport with TLS certificate options or the insecure flag is not allowed")
|
||||
}
|
||||
if config.CAFile != "" && config.Insecure {
|
||||
return nil, fmt.Errorf("specifying a root certificates file with the insecure flag is not allowed")
|
||||
}
|
||||
var transport http.RoundTripper
|
||||
switch {
|
||||
case config.Transport != nil:
|
||||
@@ -199,6 +202,12 @@ func TransportFor(config *Config) (http.RoundTripper, error) {
|
||||
return nil, err
|
||||
}
|
||||
transport = t
|
||||
case config.CAFile != "":
|
||||
t, err := NewTLSTransport(config.CAFile)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
transport = t
|
||||
case config.Insecure:
|
||||
transport = NewUnsafeTLSTransport()
|
||||
default:
|
||||
|
Reference in New Issue
Block a user