- 29 Nov, 2016 18 commits
-
-
bergquist committed
-
bergquist committed
-
bergquist committed
-
bergquist committed
-
bergquist committed
-
generalized database connection cert support and added to postgres
Carl Bergquist committed -
bergquist committed
-
bergquist committed
-
[5443] Check if title is empty before save a new dashboard
Carl Bergquist committed -
bergquist committed
-
[6679] Check if org exists before delete it
Carl Bergquist committed -
bergquist committed
-
bergquist committed
-
Torkel Ödegaard committed
-
bergquist committed
-
Torkel Ödegaard committed
-
Pavlos Daoglou committed
-
- 28 Nov, 2016 6 commits
-
-
bergquist committed
-
* fix(table): renderes empty date column as '-' closes #6728 * docs(changelog): add note about closing 6728
Carl Bergquist committed -
bergquist committed
-
bergquist committed
-
closes #6731
bergquist committed -
Torkel Ödegaard committed
-
- 27 Nov, 2016 8 commits
- 24 Nov, 2016 8 commits
-
-
bergquist committed
-
Feature/tls client auth
Carl Bergquist committed -
Daniel Lee committed
-
bergquist committed
-
- Three text areas where the user can paste in the CA Cert (optional), Client Cert and Client Key. - Tooltips for Auth checkboxes with brief descriptions of what With Credentials and With CA Cert are. - Adds popover for TLS Auth header too. - Aligns gf-form elements as labels and checkboxes were not aligned before. - Makes CA Cert optional as it is only needed for self-signed certs.
Daniel Lee committed -
Daniel Lee committed
-
The tls files are stored as a json blob in the SecureJsonData field. To update one file, the json has to be fetched from the db first and then updated with the cert file that has been changed. Also, a change to the dto with flags that are used in the frontend to show if a file has been uploaded. For example, if tlsClientKeySet is set to true then means a file for the client key is saved in the db. This is to avoid sending any private data to the frontend.
Daniel Lee committed -
For self-signed TLS Certificates, authentication with InsecureSkipVerify set to false then this error will occur: x509: certificate signed by unknown authority The solution is to allow the user to upload the CA cert as well.
Daniel Lee committed
-