-
Notifications
You must be signed in to change notification settings - Fork 173
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Break apart --insecure
#2860
Labels
Comments
Agree with this and added a good first issue label. We can deprecate and hide the |
joonas
added a commit
to joonas/zarf
that referenced
this issue
Aug 28, 2024
Fixes zarf-dev#2860 Signed-off-by: Joonas Bergius <[email protected]>
2 tasks
joonas
added a commit
to joonas/zarf
that referenced
this issue
Sep 1, 2024
Fixes zarf-dev#2860 Signed-off-by: Joonas Bergius <[email protected]>
joonas
added a commit
to joonas/zarf
that referenced
this issue
Sep 1, 2024
Fixes zarf-dev#2860 Signed-off-by: Joonas Bergius <[email protected]>
joonas
added a commit
to joonas/zarf
that referenced
this issue
Sep 5, 2024
Fixes zarf-dev#2860 Signed-off-by: Joonas Bergius <[email protected]>
joonas
added a commit
to joonas/zarf
that referenced
this issue
Sep 5, 2024
Fixes zarf-dev#2860 Signed-off-by: Joonas Bergius <[email protected]>
joonas
added a commit
to joonas/zarf
that referenced
this issue
Sep 7, 2024
Fixes zarf-dev#2860 Signed-off-by: Joonas Bergius <[email protected]>
joonas
added a commit
to joonas/zarf
that referenced
this issue
Sep 7, 2024
Fixes zarf-dev#2860 Signed-off-by: Joonas Bergius <[email protected]>
joonas
added a commit
to joonas/zarf
that referenced
this issue
Sep 7, 2024
Fixes zarf-dev#2860 Signed-off-by: Joonas Bergius <[email protected]>
joonas
added a commit
to joonas/zarf
that referenced
this issue
Sep 11, 2024
Fixes zarf-dev#2860 Signed-off-by: Joonas Bergius <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Is your feature request related to a problem? Please describe.
Currently the
--insecure
flag is overloaded to be both--http-only
and--tls-skip-verify
. This means that if you have a resource w/ a self-signed cert (like a OCI/Docker registry) Zarf will be unable to access that resource because it only requests over HTTP.For 1.0 it would be beneficial if these flags were separated similar to other tools
helm
,oras
.Not sure if you want Helm's full blown CA support though:
The text was updated successfully, but these errors were encountered: