fix(etcd): reverse the cert handling
the server tls config needs the client CA information and the client needs the pub/priv key. This is how this code used to work.release-0.4
parent
7f9c2eee45
commit
466229cf4d
6
etcd.go
6
etcd.go
|
@ -479,10 +479,10 @@ func tlsConfigFromInfo(info TLSInfo) (t TLSConfig, ok bool) {
|
|||
}
|
||||
|
||||
t.Scheme = "https"
|
||||
t.Server.Certificates = []tls.Certificate{tlsCert}
|
||||
t.Server.InsecureSkipVerify = true
|
||||
t.Server.ClientAuth, t.Server.ClientCAs = newCertPool(CAFile)
|
||||
|
||||
t.Client.ClientAuth, t.Client.ClientCAs = newCertPool(CAFile)
|
||||
t.Client.Certificates = []tls.Certificate{tlsCert}
|
||||
t.Client.InsecureSkipVerify = true
|
||||
|
||||
return t, true
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue