-
Notifications
You must be signed in to change notification settings - Fork 191
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Optional TLS cert for Git over HTTPS #93
Comments
This is not going to be the easiest to solve due to the fact that the https://github.com/go-git/go-git/blob/641ee1dd69d3b8616127623e4b9341f4f4196d12/remote.go#L368 |
This can be implemented using |
I just got a question about using mutual TLS. It might be worth implementing support for that if possible also, which we are at it. |
Is there any temporary workaround for this? |
Hi, also interested in adding self-signed git source (GitHub Enterprise) using https. |
@hiddeco perhaps this is solvable by wrapping a Client with host specific behavior. |
What worries me is the management of the host specific behavior and credentials. It would require something like a host <-> credential pool with a TTL so that credentials for resources that "magically disappear" are evicted from the pool. Also: using the host is not a 100% fool proof, as multiple resources could point to the same host but with a different (m)TLS configuration. |
I have started working on an implementation that would work with the libgit2 provider FYI. Still a need to figure out how one would do this with go-git. |
I think it's acceptable to having this feature implemented for libgit2 only. |
Implemented in #283 |
When using Git over HTTPS, the controller should look for the cert files inside the credential secret, the same way we do for Helm repositories.
The
certFile
,keyFile
andcaFile
should be optional, when present, the controller will use them to connect to the Git HTTPS server.The text was updated successfully, but these errors were encountered: