-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
enable authentication #2887
enable authentication #2887
Conversation
Codecov ReportAttention:
Additional details and impacted files@@ Coverage Diff @@
## g11n-go-service #2887 +/- ##
===================================================
+ Coverage 79.72% 79.77% +0.05%
===================================================
Files 56 59 +3
Lines 3058 3259 +201
===================================================
+ Hits 2438 2600 +162
- Misses 505 525 +20
- Partials 115 134 +19
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Revive (reported by Codacy) found more than 10 potential problems in the proposed changes. Check the Files changed tab for more details.
1da5c36
to
d84df22
Compare
Because of the PR change a lot, Can you book a short meeting to review the PR |
} | ||
|
||
var GetLDAPConn = func() (ldap.Client, error) { | ||
tlsConfig := tls.Config{MinVersion: tls.VersionTLS13, InsecureSkipVerify: true} |
Check warning
Code scanning / Semgrep (reported by Codacy)
Checks for disabling of TLS/SSL certificate verification. Warning
Authentication is enabled on both V1 and V2 APIs.
The same token should be able to use in Java and Go.
This PR makes some changes in S3 bundles, please make sure S3 bundles work normally.