Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(cdsctl): verbose and insecure config from env or flags #5384

Merged
merged 1 commit into from
Aug 19, 2020
Merged

fix(cdsctl): verbose and insecure config from env or flags #5384

merged 1 commit into from
Aug 19, 2020

Conversation

phsym
Copy link
Contributor

@phsym phsym commented Aug 19, 2020

Fixing cdsctl --verbose and --insecure flags not working all the time, especially during a login command

  1. Description
    cdsctl --verbose --insecure login --api-url https://..... fails when api endpoint uses TLS with an untrusted certificate. Insecure flag is not working as expected. While fixing the use of --insecure flag for the login command, I also fixed it in other places, and fixed the --verbose flag which was not properly handled neither.

  2. About tests
    cdsctl commands now works on an api endpoint using a self signed certificate

  3. Mentions

@ovh/cds

Signed-off-by: Pierre-Henri Symoneaux [email protected]

…. Especially during a login command

Signed-off-by: pierresy <[email protected]>
@richardlt richardlt changed the title Fixing cdsctl --verbose and --insecure flags fix(cdsctl): verbose and insecure config from env or flags Aug 19, 2020
@ovh ovh deleted a comment from ovh-cds Aug 19, 2020
@ovh ovh deleted a comment from ovh-cds Aug 19, 2020
@ovh ovh deleted a comment from ovh-cds Aug 19, 2020
@ovh ovh deleted a comment from ovh-cds Aug 19, 2020
@ovh ovh deleted a comment from ovh-cds Aug 19, 2020
@ovh ovh deleted a comment from ovh-cds Aug 19, 2020
@richardlt richardlt merged commit a5b0200 into ovh:master Aug 19, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants