config: remove references to named ports

- Go 1.12.8 changed the way url parse handles service named ports.

Signed-off-by: Bobby DeSimone <bobbydesimone@gmail.com>
This commit is contained in:
Bobby DeSimone 2019-08-14 13:34:48 -07:00
parent b3fa7023f6
commit 1bfb64ed31
No known key found for this signature in database
GPG key ID: AEE4CF12FE86D07E
5 changed files with 17 additions and 15 deletions

View file

@ -201,7 +201,7 @@ func Test_configToServerOptions(t *testing.T) {
opt *config.Options opt *config.Options
want *httputil.ServerOptions want *httputil.ServerOptions
}{ }{
{"simple convert", &config.Options{Addr: ":http"}, &httputil.ServerOptions{Addr: ":http"}}, {"simple convert", &config.Options{Addr: ":80"}, &httputil.ServerOptions{Addr: ":80"}},
} }
for _, tt := range tests { for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) { t.Run(tt.name, func(t *testing.T) {

View file

@ -4,18 +4,21 @@
### New ### New
- Add ability to set client certificates for downstream connections. [GH-259]
- GRPC Improvements. [#261](https://github.com/pomerium/pomerium/pull/261) and [#69](https://github.com/pomerium/pomerium/issues/69) - GRPC Improvements. [#261](https://github.com/pomerium/pomerium/pull/261) and [#69](https://github.com/pomerium/pomerium/issues/69)
- Enable WaitForReady to allow background retries through transient failures - Enable WaitForReady to allow background retries through transient failures
- Expose a configurable timeout for backend requests to Authorize and Authenticate - Expose a configurable timeout for backend requests to Authorize and Authenticate
- Enable DNS round_robin load balancing to Authorize and Authenticate services by default - Enable DNS round_robin load balancing to Authorize and Authenticate services by default
- Add ability to set client certificates for downstream connections. [GH-259](https://github.com/pomerium/pomerium/pull/259)
### Fixed ### Fixed
### Changed ### Changed
- A policy's custom certificate authority can set as a file or a base64 encoded blob(`tls_custom_ca`/`tls_custom_ca_file`). [GH-259] - A policy's custom certificate authority can set as a file or a base64 encoded blob(`tls_custom_ca`/`tls_custom_ca_file`). [GH-259](https://github.com/pomerium/pomerium/pull/259)
- Remove references to [service named ports](https://golang.org/src/net/lookup.go) and instead use their numeric equivalent. [GH-266](https://github.com/pomerium/pomerium/pull/266)
## v0.2.0 ## v0.2.0
@ -172,5 +175,5 @@
- `http.Server` and `httputil.NewSingleHostReverseProxy` now uses pomerium's logging package instead of the standard library's built in one. [GH-58] - `http.Server` and `httputil.NewSingleHostReverseProxy` now uses pomerium's logging package instead of the standard library's built in one. [GH-58]
[synology tutorial]: ./quick-start/synology.md
[certificates documentation]: ../reference/certificates.md [certificates documentation]: ../reference/certificates.md
[synology tutorial]: ./quick-start/synology.md

View file

@ -41,11 +41,11 @@ Service mode sets the pomerium service(s) to run. If testing, you may want to se
- Environmental Variable: `ADDRESS` - Environmental Variable: `ADDRESS`
- Config File Key: `address` - Config File Key: `address`
- Type: `string` - Type: `string`
- Example: `:https`, `:443`, `:8443` - Example: `:443`, `:8443`
- Default: `:https` - Default: `:443`
- Required - Required
Address specifies the host and port to serve HTTPS and gRPC requests from. If empty, `:https`/`:443` is used. Address specifies the host and port to serve HTTPS and gRPC requests from. If empty, `:443` is used.
## Administrators ## Administrators
@ -174,7 +174,7 @@ Enable grpc DNS based round robin load balancing. This method uses DNS to resol
- Environmental Variable: `HTTP_REDIRECT_ADDR` - Environmental Variable: `HTTP_REDIRECT_ADDR`
- Config File Key: `http_redirect_addr` - Config File Key: `http_redirect_addr`
- Type: `string` - Type: `string`
- Example: `:80`, `:http`, `:8080` - Example: `:80`, `:8080`
- Optional - Optional
If set, the HTTP Redirect Address specifies the host and port to redirect http to https traffic on. If unset, no redirect server is started. If set, the HTTP Redirect Address specifies the host and port to redirect http to https traffic on. If unset, no redirect server is started.

View file

@ -43,7 +43,7 @@ type Options struct {
Services string `mapstructure:"services"` Services string `mapstructure:"services"`
// Addr specifies the host and port on which the server should serve // Addr specifies the host and port on which the server should serve
// HTTPS requests. If empty, ":https" (localhost:443) is used. // HTTPS requests. If empty, ":443" (localhost:443) is used.
Addr string `mapstructure:"address"` Addr string `mapstructure:"address"`
// Cert and Key specifies the TLS certificates to use. // Cert and Key specifies the TLS certificates to use.
@ -55,8 +55,7 @@ type Options struct {
KeyFile string `mapstructure:"certificate_key_file"` KeyFile string `mapstructure:"certificate_key_file"`
// HttpRedirectAddr, if set, specifies the host and port to run the HTTP // HttpRedirectAddr, if set, specifies the host and port to run the HTTP
// to HTTPS redirect server on. For example, ":http" would start a server // to HTTPS redirect server on. If empty, no redirect server is started.
// on port 80. If empty, no redirect server is started.
HTTPRedirectAddr string `mapstructure:"http_redirect_addr"` HTTPRedirectAddr string `mapstructure:"http_redirect_addr"`
// Timeout settings : https://github.com/pomerium/pomerium/issues/40 // Timeout settings : https://github.com/pomerium/pomerium/issues/40
@ -167,7 +166,7 @@ var defaultOptions = Options{
"X-XSS-Protection": "1; mode=block", "X-XSS-Protection": "1; mode=block",
"Strict-Transport-Security": "max-age=31536000; includeSubDomains; preload", "Strict-Transport-Security": "max-age=31536000; includeSubDomains; preload",
}, },
Addr: ":https", Addr: ":443",
CertFile: filepath.Join(fileutil.Getwd(), "cert.pem"), CertFile: filepath.Join(fileutil.Getwd(), "cert.pem"),
KeyFile: filepath.Join(fileutil.Getwd(), "privkey.pem"), KeyFile: filepath.Join(fileutil.Getwd(), "privkey.pem"),
ReadHeaderTimeout: 10 * time.Second, ReadHeaderTimeout: 10 * time.Second,

View file

@ -10,7 +10,7 @@ import (
// ServerOptions contains the configurations settings for a http server. // ServerOptions contains the configurations settings for a http server.
type ServerOptions struct { type ServerOptions struct {
// Addr specifies the host and port on which the server should serve // Addr specifies the host and port on which the server should serve
// HTTPS requests. If empty, ":https" is used. // HTTPS requests. If empty, ":443" is used.
Addr string Addr string
// TLS certificates to use. // TLS certificates to use.
@ -27,7 +27,7 @@ type ServerOptions struct {
} }
var defaultTLSServerOptions = &ServerOptions{ var defaultTLSServerOptions = &ServerOptions{
Addr: ":https", Addr: ":443",
CertFile: filepath.Join(fileutil.Getwd(), "cert.pem"), CertFile: filepath.Join(fileutil.Getwd(), "cert.pem"),
KeyFile: filepath.Join(fileutil.Getwd(), "privkey.pem"), KeyFile: filepath.Join(fileutil.Getwd(), "privkey.pem"),
ReadHeaderTimeout: 10 * time.Second, ReadHeaderTimeout: 10 * time.Second,
@ -61,7 +61,7 @@ func (o *ServerOptions) applyTLSDefaults() {
} }
var defaultHTTPServerOptions = &ServerOptions{ var defaultHTTPServerOptions = &ServerOptions{
Addr: ":http", Addr: ":80",
ReadHeaderTimeout: 10 * time.Second, ReadHeaderTimeout: 10 * time.Second,
ReadTimeout: 5 * time.Second, ReadTimeout: 5 * time.Second,
WriteTimeout: 5 * time.Second, WriteTimeout: 5 * time.Second,