Skip to content

Commit c1c06ad

Browse files
committed
Merge remote-tracking branch 'prometheus/main' into add-unit
Signed-off-by: Arianna Vespri <[email protected]>
2 parents 51a6ef4 + 773d566 commit c1c06ad

22 files changed

+1852
-259
lines changed

config/generate.go

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,6 @@ func SerialNumber() *big.Int {
7171
serialNumber.Add(&serial, big.NewInt(1))
7272

7373
return &serial
74-
7574
}
7675

7776
func GenerateCertificateAuthority(commonName string, parentCert *x509.Certificate, parentKey *rsa.PrivateKey) (*x509.Certificate, *rsa.PrivateKey, error) {
@@ -170,7 +169,7 @@ func writeCertificateAndKey(path string, cert *x509.Certificate, key *rsa.Privat
170169
return err
171170
}
172171

173-
if err := os.WriteFile(fmt.Sprintf("%s.crt", path), b.Bytes(), 0644); err != nil {
172+
if err := os.WriteFile(fmt.Sprintf("%s.crt", path), b.Bytes(), 0o644); err != nil {
174173
return err
175174
}
176175

@@ -179,7 +178,7 @@ func writeCertificateAndKey(path string, cert *x509.Certificate, key *rsa.Privat
179178
return err
180179
}
181180

182-
if err := os.WriteFile(fmt.Sprintf("%s.key", path), b.Bytes(), 0644); err != nil {
181+
if err := os.WriteFile(fmt.Sprintf("%s.key", path), b.Bytes(), 0o644); err != nil {
183182
return err
184183
}
185184

@@ -239,7 +238,7 @@ func main() {
239238
log.Fatal(err)
240239
}
241240

242-
if err := os.WriteFile("testdata/tls-ca-chain.pem", b.Bytes(), 0644); err != nil {
241+
if err := os.WriteFile("testdata/tls-ca-chain.pem", b.Bytes(), 0o644); err != nil {
243242
log.Fatal(err)
244243
}
245244
}

config/http_config.go

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ import (
3030
"sync"
3131
"time"
3232

33-
"github.com/mwitkow/go-conntrack"
33+
conntrack "github.com/mwitkow/go-conntrack"
3434
"golang.org/x/net/http/httpproxy"
3535
"golang.org/x/net/http2"
3636
"golang.org/x/oauth2"
@@ -378,9 +378,6 @@ func (c *HTTPClientConfig) Validate() error {
378378
if len(c.OAuth2.ClientID) == 0 {
379379
return fmt.Errorf("oauth2 client_id must be configured")
380380
}
381-
if len(c.OAuth2.ClientSecret) == 0 && len(c.OAuth2.ClientSecretFile) == 0 {
382-
return fmt.Errorf("either oauth2 client_secret or client_secret_file must be configured")
383-
}
384381
if len(c.OAuth2.TokenURL) == 0 {
385382
return fmt.Errorf("oauth2 token_url must be configured")
386383
}
@@ -729,13 +726,12 @@ func (rt *oauth2RoundTripper) RoundTrip(req *http.Request) (*http.Response, erro
729726
rt.mtx.RLock()
730727
changed = secret != rt.secret
731728
rt.mtx.RUnlock()
729+
} else {
730+
// Either an inline secret or nothing (use an empty string) was provided.
731+
secret = string(rt.config.ClientSecret)
732732
}
733733

734734
if changed || rt.rt == nil {
735-
if rt.config.ClientSecret != "" {
736-
secret = string(rt.config.ClientSecret)
737-
}
738-
739735
config := &clientcredentials.Config{
740736
ClientID: rt.config.ClientID,
741737
ClientSecret: secret,

0 commit comments

Comments
 (0)