1
0
Fork 0
Commit Graph

4 Commits (a28fa4d7f261861f4fe6c7e44491cde600469f60)

Author SHA1 Message Date
radex 291f554164 go/pki: show helpful hint to new contributors about -hspki_disable
Change-Id: I714f503f5962578055b99009aa0eccb72517d37b
Reviewed-on: https://gerrit.hackerspace.pl/c/hscloud/+/1562
Reviewed-by: q3k <q3k@hackerspace.pl>
2023-09-22 20:45:15 +00:00
q3k bade46d45f go/pki: fix error return
DeveloperCredentialsLocation used to glog.Exitf instead of returning an
error, and a consumer (prodaccess) used to not check the return code.
Bad refactor?

Change-Id: I6c2d05966ba6b3eb300c24a51584ccf5e324cd49
2021-05-19 22:12:08 +00:00
q3k ef2fbaf892 go/pki: allow overriding host in client
Change-Id: I5d913d6056efc5128c26ffe4db962fdb86b08315
2020-08-01 22:01:33 +02:00
q3k f3312ef77e *: developer machine HSPKI credentials
In addition to k8s certificates, prodaccess now issues HSPKI
certificates, with DN=$username.sso.hswaw.net. These are installed into
XDG_CONFIG_HOME (or os equiv).

//go/pki will now automatically attempt to load these certificates. This
means you can now run any pki-dependant tool with -hspki_disable, and
with automatic mTLS!

Change-Id: I5b28e193e7c968d621bab0d42aabd6f0510fed6d
2020-08-01 17:15:52 +02:00