Allow tls certificates skipping

This commit is contained in:
wpetit 2022-07-21 14:58:53 +02:00
parent d0583cc23b
commit 5beae19d21
2 changed files with 19 additions and 1 deletions

View File

@ -2,6 +2,8 @@ package main
import (
"context"
"crypto/tls"
"net/http"
"gitlab.com/wpetit/goweb/logger"
"gitlab.com/wpetit/goweb/template/html"
@ -65,6 +67,20 @@ func getServiceContainer(ctx context.Context, conf *config.Config) (*service.Con
conf.HTTP.TemplateDir,
))
defaultHTTPTransport, ok := http.DefaultTransport.(*http.Transport)
if ok {
if defaultHTTPTransport.TLSClientConfig == nil {
defaultHTTPTransport.TLSClientConfig = &tls.Config{}
}
defaultHTTPTransport.TLSClientConfig.InsecureSkipVerify = conf.OIDC.InsecureSkipVerify
} else {
logger.Fatal(
ctx,
"could not configure default http client",
)
}
// Create and expose config service provider
ctn.Provide(config.ServiceName, config.ServiceProvider(conf))

View File

@ -49,9 +49,10 @@ type HTTPConfig struct {
type OIDCConfig struct {
ClientID string `yaml:"clientId" env:"OIDC_CLIENT_ID"`
ClientSecret string `yaml:"clientSecret" env:"OIDC_CLIENT_SECRET"`
IssuerURL string `ymal:"issuerUrl" env:"OIDC_ISSUER_URL"`
IssuerURL string `yaml:"issuerUrl" env:"OIDC_ISSUER_URL"`
RedirectURL string `yaml:"redirectUrl" env:"OIDC_REDIRECT_URL"`
PostLogoutRedirectURL string `yaml:"postLogoutRedirectURL" env:"OIDC_POST_LOGOUT_REDIRECT_URL"`
InsecureSkipVerify bool `ymal:"insecureSkipVerify" env:"OIDC_INSECURE_SKIP_VERIFY"`
}
type LogConfig struct {
@ -84,6 +85,7 @@ func NewDefault() *Config {
IssuerURL: "http://localhost:4444/",
RedirectURL: "http://localhost:3002/oauth2/callback",
PostLogoutRedirectURL: "http://localhost:3002",
InsecureSkipVerify: false,
},
}
}