mirror of
https://github.com/ceph/ceph-csi.git
synced 2025-06-13 10:33:35 +00:00
rebase: update K8s packages to v0.32.1
Update K8s packages in go.mod to v0.32.1 Signed-off-by: Praveen M <m.praveen@ibm.com>
This commit is contained in:
2
vendor/go.etcd.io/etcd/client/pkg/v3/logutil/zap.go
generated
vendored
2
vendor/go.etcd.io/etcd/client/pkg/v3/logutil/zap.go
generated
vendored
@ -58,7 +58,7 @@ var DefaultZapLoggerConfig = zap.Config{
|
||||
|
||||
// Custom EncodeTime function to ensure we match format and precision of historic capnslog timestamps
|
||||
EncodeTime: func(t time.Time, enc zapcore.PrimitiveArrayEncoder) {
|
||||
enc.AppendString(t.Format("2006-01-02T15:04:05.999999Z0700"))
|
||||
enc.AppendString(t.Format("2006-01-02T15:04:05.000000Z0700"))
|
||||
},
|
||||
|
||||
EncodeDuration: zapcore.StringDurationEncoder,
|
||||
|
50
vendor/go.etcd.io/etcd/client/pkg/v3/transport/listener.go
generated
vendored
50
vendor/go.etcd.io/etcd/client/pkg/v3/transport/listener.go
generated
vendored
@ -180,12 +180,23 @@ type TLSInfo struct {
|
||||
parseFunc func([]byte, []byte) (tls.Certificate, error)
|
||||
|
||||
// AllowedCN is a CN which must be provided by a client.
|
||||
//
|
||||
// Deprecated: use AllowedCNs instead.
|
||||
AllowedCN string
|
||||
|
||||
// AllowedHostname is an IP address or hostname that must match the TLS
|
||||
// certificate provided by a client.
|
||||
//
|
||||
// Deprecated: use AllowedHostnames instead.
|
||||
AllowedHostname string
|
||||
|
||||
// AllowedCNs is a list of acceptable CNs which must be provided by a client.
|
||||
AllowedCNs []string
|
||||
|
||||
// AllowedHostnames is a list of acceptable IP addresses or hostnames that must match the
|
||||
// TLS certificate provided by a client.
|
||||
AllowedHostnames []string
|
||||
|
||||
// Logger logs TLS errors.
|
||||
// If nil, all logs are discarded.
|
||||
Logger *zap.Logger
|
||||
@ -407,19 +418,52 @@ func (info TLSInfo) baseConfig() (*tls.Config, error) {
|
||||
// Client certificates may be verified by either an exact match on the CN,
|
||||
// or a more general check of the CN and SANs.
|
||||
var verifyCertificate func(*x509.Certificate) bool
|
||||
|
||||
if info.AllowedCN != "" && len(info.AllowedCNs) > 0 {
|
||||
return nil, fmt.Errorf("AllowedCN and AllowedCNs are mutually exclusive (cn=%q, cns=%q)", info.AllowedCN, info.AllowedCNs)
|
||||
}
|
||||
if info.AllowedHostname != "" && len(info.AllowedHostnames) > 0 {
|
||||
return nil, fmt.Errorf("AllowedHostname and AllowedHostnames are mutually exclusive (hostname=%q, hostnames=%q)", info.AllowedHostname, info.AllowedHostnames)
|
||||
}
|
||||
if info.AllowedCN != "" && info.AllowedHostname != "" {
|
||||
return nil, fmt.Errorf("AllowedCN and AllowedHostname are mutually exclusive (cn=%q, hostname=%q)", info.AllowedCN, info.AllowedHostname)
|
||||
}
|
||||
if len(info.AllowedCNs) > 0 && len(info.AllowedHostnames) > 0 {
|
||||
return nil, fmt.Errorf("AllowedCNs and AllowedHostnames are mutually exclusive (cns=%q, hostnames=%q)", info.AllowedCNs, info.AllowedHostnames)
|
||||
}
|
||||
|
||||
if info.AllowedCN != "" {
|
||||
if info.AllowedHostname != "" {
|
||||
return nil, fmt.Errorf("AllowedCN and AllowedHostname are mutually exclusive (cn=%q, hostname=%q)", info.AllowedCN, info.AllowedHostname)
|
||||
}
|
||||
info.Logger.Warn("AllowedCN is deprecated, use AllowedCNs instead")
|
||||
verifyCertificate = func(cert *x509.Certificate) bool {
|
||||
return info.AllowedCN == cert.Subject.CommonName
|
||||
}
|
||||
}
|
||||
if info.AllowedHostname != "" {
|
||||
info.Logger.Warn("AllowedHostname is deprecated, use AllowedHostnames instead")
|
||||
verifyCertificate = func(cert *x509.Certificate) bool {
|
||||
return cert.VerifyHostname(info.AllowedHostname) == nil
|
||||
}
|
||||
}
|
||||
if len(info.AllowedCNs) > 0 {
|
||||
verifyCertificate = func(cert *x509.Certificate) bool {
|
||||
for _, allowedCN := range info.AllowedCNs {
|
||||
if allowedCN == cert.Subject.CommonName {
|
||||
return true
|
||||
}
|
||||
}
|
||||
return false
|
||||
}
|
||||
}
|
||||
if len(info.AllowedHostnames) > 0 {
|
||||
verifyCertificate = func(cert *x509.Certificate) bool {
|
||||
for _, allowedHostname := range info.AllowedHostnames {
|
||||
if cert.VerifyHostname(allowedHostname) == nil {
|
||||
return true
|
||||
}
|
||||
}
|
||||
return false
|
||||
}
|
||||
}
|
||||
if verifyCertificate != nil {
|
||||
cfg.VerifyPeerCertificate = func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {
|
||||
for _, chains := range verifiedChains {
|
||||
|
Reference in New Issue
Block a user