Skip to content

[Backport 7.13] [DOCS] Fix client_authentication setting default #73746

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jun 4, 2021

Conversation

tvernum
Copy link
Contributor

@tvernum tvernum commented Jun 4, 2021

The value of *.ssl.client_authentication is required for
everything except xpack.security.http.ssl.client_authentication, for
which is it none.

The doc template for this setting was configured to have a default
value, and allow an override. However, the default was set to none
when it should have been required.

The override for http was correctly set to none (but that didn't
really do anything, since that was the same as the default).

This commit changes the default to required, which matches the code
(see XPackSettings.CLIENT_AUTH_DEFAULT), and leaves the override for
http as none (see XPackSettings.HTTP_CLIENT_AUTH_DEFAULT).

Backport of: #73743

The value of `*.ssl.client_authentication` is `required` for
everything except `xpack.security.http.ssl.client_authentication`, for
which is it `none`.

The doc template for this setting was configured to have a default
value, and allow an override. However, the default was set to `none`
when it should have been `required`.

The override for `http` was correctly set to `none` (but that didn't
really do anything, since that was the same as the default).

This commit changes the default to `required`, which matches the code
(see `XPackSettings.CLIENT_AUTH_DEFAULT`), and leaves the override for
http as `none` (see `XPackSettings.HTTP_CLIENT_AUTH_DEFAULT`).

Backport of: elastic#73743
@tvernum tvernum merged commit 89ecd0a into elastic:7.13 Jun 4, 2021
@tvernum tvernum deleted the backport/7.13/73743--DOCS-Fix-client branch June 4, 2021 06:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant