Compare commits

...

1 Commits

Author SHA1 Message Date
c7fc9a3e8c misc: add proper ssl verification for private certs 2025-02-25 18:42:49 +09:00
5 changed files with 3 additions and 5 deletions

View File

@ -28,7 +28,7 @@ export const CassandraProvider = (): TDynamicProviderFns => {
}; };
const $getClient = async (providerInputs: z.infer<typeof DynamicSecretCassandraSchema>) => { const $getClient = async (providerInputs: z.infer<typeof DynamicSecretCassandraSchema>) => {
const sslOptions = providerInputs.ca ? { rejectUnauthorized: false, ca: providerInputs.ca } : undefined; const sslOptions = providerInputs.ca ? { ca: providerInputs.ca } : undefined;
const client = new cassandra.Client({ const client = new cassandra.Client({
sslOptions, sslOptions,
protocolOptions: { protocolOptions: {

View File

@ -30,7 +30,6 @@ export const ElasticSearchProvider = (): TDynamicProviderFns => {
url: new URL(`${providerInputs.host}:${providerInputs.port}`), url: new URL(`${providerInputs.host}:${providerInputs.port}`),
...(providerInputs.ca && { ...(providerInputs.ca && {
ssl: { ssl: {
rejectUnauthorized: false,
ca: providerInputs.ca ca: providerInputs.ca
} }
}) })

View File

@ -96,7 +96,7 @@ export const RabbitMqProvider = (): TDynamicProviderFns => {
}, },
...(providerInputs.ca && { ...(providerInputs.ca && {
httpsAgent: new https.Agent({ ca: providerInputs.ca, rejectUnauthorized: false }) httpsAgent: new https.Agent({ ca: providerInputs.ca })
}) })
}); });

View File

@ -65,7 +65,6 @@ export const RedisDatabaseProvider = (): TDynamicProviderFns => {
password: providerInputs.password, password: providerInputs.password,
...(providerInputs.ca && { ...(providerInputs.ca && {
tls: { tls: {
rejectUnauthorized: false,
ca: providerInputs.ca ca: providerInputs.ca
} }
}) })

View File

@ -33,7 +33,7 @@ export const SqlDatabaseProvider = (): TDynamicProviderFns => {
}; };
const $getClient = async (providerInputs: z.infer<typeof DynamicSecretSqlDBSchema>) => { const $getClient = async (providerInputs: z.infer<typeof DynamicSecretSqlDBSchema>) => {
const ssl = providerInputs.ca ? { rejectUnauthorized: false, ca: providerInputs.ca } : undefined; const ssl = providerInputs.ca ? { ca: providerInputs.ca } : undefined;
const isMsSQLClient = providerInputs.client === SqlProviders.MsSQL; const isMsSQLClient = providerInputs.client === SqlProviders.MsSQL;
const db = knex({ const db = knex({