-
Notifications
You must be signed in to change notification settings - Fork 70
Auto updated assets for go models and clients eng #3028
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: eng
Are you sure you want to change the base?
Conversation
Signed-off-by: gurunath-avi <[email protected]>
return nil, err | ||
} | ||
avisess.transport = &http.Transport{ | ||
TLSClientConfig: &tls.Config{InsecureSkipVerify: true}, |
Check failure
Code scanning / CodeQL
Disabled TLS certificate check High
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix
AI 17 days ago
To fix the problem, we need to ensure that TLS certificate verification is enabled. This involves setting InsecureSkipVerify
to false
and properly configuring the certificates. If the certificates are not available or cannot be verified, the connection should fail rather than proceeding insecurely.
The best way to fix the problem without changing existing functionality is to remove the InsecureSkipVerify: true
setting and ensure that the application uses valid certificates. This might involve loading the system's root CA certificates or specifying a custom CA certificate.
-
Copy modified line R377 -
Copy modified line R382
@@ -376,3 +376,3 @@ | ||
avisess.transport = &http.Transport{ | ||
TLSClientConfig: &tls.Config{InsecureSkipVerify: true}, | ||
TLSClientConfig: &tls.Config{}, | ||
Proxy: http.ProxyURL(proxyURL), | ||
@@ -381,3 +381,3 @@ | ||
avisess.transport = &http.Transport{ | ||
TLSClientConfig: &tls.Config{InsecureSkipVerify: true}, | ||
TLSClientConfig: &tls.Config{}, | ||
} |
} | ||
} else { | ||
avisess.transport = &http.Transport{ | ||
TLSClientConfig: &tls.Config{InsecureSkipVerify: true}, |
Check failure
Code scanning / CodeQL
Disabled TLS certificate check High
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix
AI 17 days ago
To fix the problem, we need to ensure that TLS certificate verification is enabled. This can be done by setting InsecureSkipVerify
to false
or by removing the TLSClientConfig
entirely if it is not needed. Additionally, we should ensure that the application is configured with the correct certificates to allow for proper verification.
The best way to fix the problem without changing existing functionality is to set InsecureSkipVerify
to false
and ensure that the application is using valid certificates. This change should be made in the go/session/avisession.go
file, specifically on lines 377 and 382.
-
Copy modified line R377 -
Copy modified line R382
@@ -376,3 +376,3 @@ | ||
avisess.transport = &http.Transport{ | ||
TLSClientConfig: &tls.Config{InsecureSkipVerify: true}, | ||
TLSClientConfig: &tls.Config{InsecureSkipVerify: false}, | ||
Proxy: http.ProxyURL(proxyURL), | ||
@@ -381,3 +381,3 @@ | ||
avisess.transport = &http.Transport{ | ||
TLSClientConfig: &tls.Config{InsecureSkipVerify: true}, | ||
TLSClientConfig: &tls.Config{InsecureSkipVerify: false}, | ||
} |
Signed-off-by: gurunath-avi <[email protected]>
No description provided.