From 33d75c2493343046bbffa38316273ef71744a505 Mon Sep 17 00:00:00 2001 From: Harsh4902 Date: Thu, 7 Aug 2025 22:11:34 +0530 Subject: [PATCH] Fix: #180 Allow microcks client to handle insecure TLS requests Signed-off-by: Harsh4902 --- cmd/login.go | 4 ++++ pkg/connectors/microcks_client.go | 11 ++++++++++- 2 files changed, 14 insertions(+), 1 deletion(-) diff --git a/cmd/login.go b/cmd/login.go index 1d0c27a..3e71e99 100644 --- a/cmd/login.go +++ b/cmd/login.go @@ -67,6 +67,10 @@ microcks login http://localhost:8080 --sso --sso-launch-browser=false os.Exit(1) } + config.InsecureTLS = globalClientOpts.InsecureTLS + config.CaCertPaths = globalClientOpts.CaCertPaths + config.Verbose = globalClientOpts.Verbose + server = args[0] mc := connectors.NewMicrocksClient(server) keycloakUrl, err := mc.GetKeycloakURL() diff --git a/pkg/connectors/microcks_client.go b/pkg/connectors/microcks_client.go index e37b06e..83ddc01 100644 --- a/pkg/connectors/microcks_client.go +++ b/pkg/connectors/microcks_client.go @@ -149,7 +149,16 @@ func NewClient(opts ClientOptions) (MicrocksClient, error) { c.Verbose = opts.Verbose } - c.httpClient = &http.Client{} + if config.InsecureTLS || len(config.CaCertPaths) > 0 { + tlsConfig := config.CreateTLSConfig() + tr := &http.Transport{ + TLSClientConfig: tlsConfig, + } + c.httpClient = &http.Client{Transport: tr} + } else { + c.httpClient = http.DefaultClient + } + if localCfg != nil { err = c.refreshAuthToken(localCfg, ctxName, opts.ConfigPath) if err != nil {