Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Add "insecure" opt to provisioner #484

Merged
merged 1 commit into from
Jul 21, 2022

Conversation

Callisto13
Copy link
Member

This will give the option to start flintlock without basic auth or
certs.
I am adding the options for those next, just needed --insecure first.

This will give the option to start flintlock without basic auth or
certs.
I am adding the options for those next, just needed `--insecure` first.
@Callisto13 Callisto13 added the kind/feature New feature or request label Jul 18, 2022
@@ -321,6 +323,7 @@ containerd-socket: "$CONTAINERD_STATE_DIR/containerd.sock"
grpc-endpoint: "$address:9090"
verbosity: 9
parent-iface: "$parent_iface"
insecure: $insecure
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Any checks if $insecure contains 1|0 or true|false, or in that case we just say "user error, Read The Fancy Manual"

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am doing more around this soon, so this will likely change, just need to get unblocked on something.

We don't validate other inputs (for this users cannot actually give any input since it is a bool flag) so perhaps that is a ticket for another day

@Callisto13 Callisto13 merged commit 7946784 into liquidmetal-dev:main Jul 21, 2022
@Callisto13 Callisto13 deleted the provision-insecure branch July 21, 2022 10:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants