Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Treat enablement of TLS separately for server and client config #2501

Merged
merged 2 commits into from
Feb 15, 2022

Conversation

sergeybykov
Copy link
Member

@sergeybykov sergeybykov commented Feb 14, 2022

What changed?
Replaced GroupTLS.IsEnabled() with GroupTLS.IsServerEnabled() and GroupTLS.IsClientEnabled().

Why?
Fixes #2448
Client may need to be enabled even when server TLS is disabled. The typical example is when client talks to a TLS-enabled load balancer.

How did you test it?
Added a unit test that reproduced #2448.

Potential risks
In theory, this changes treatment of TLS configuration and may cause some unexpected change in behavior.
In reality, this restores the behavior that existed prior to the introduction of ClientTLS.ForceTLS flag.

Is hotfix candidate?
Potentially

@sergeybykov sergeybykov requested a review from a team as a code owner February 14, 2022 01:34
@sergeybykov sergeybykov merged commit 632c4f7 into temporalio:master Feb 15, 2022
@sergeybykov sergeybykov deleted the pr/fe-force-tls branch February 15, 2022 06:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Invalid TLS config may crash service during service start
2 participants