fix(op-signer): allow anon auth when mTLS is disabled (for local testing only)#263
fix(op-signer): allow anon auth when mTLS is disabled (for local testing only)#263ddaws wants to merge 4 commits intoethereum-optimism:mainfrom
Conversation
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #263 +/- ##
==========================================
- Coverage 53.76% 53.68% -0.09%
==========================================
Files 67 67
Lines 7923 7947 +24
==========================================
+ Hits 4260 4266 +6
- Misses 3381 3398 +17
- Partials 282 283 +1
Flags with carried forward coverage won't be shown. Click here to find out more.
🚀 New features to boost your workflow:
|
|
LGTM overall, tested & confirmed working. however, what should happen if the config file's additionally, seems like its possible to add |
I think this is fine and there doesn't need to be validation added here. This would be the same if there were duplicate hostname entries, so I would expect similar behavior.
I don't think we need to validate for this. I think this is fine, and they just wont be usable, and probably shouldn't be usable. I'm happy to add some validation in another PR. I think this should just result in warnings being logged |
Description
This MR adds
func NewAnonMiddleware() oprpc.Middlewarewhich sets theClientInfo.ClientNametoanonymouswhen mTLS auth is disabled. This is needed to allow disabling TLS auth locally.Tests
You can test by creating a config.yaml like
Then post to op-signer to see the signing results