-
Notifications
You must be signed in to change notification settings - Fork 17.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
proposal: cmd/go: enable mutual TLS authentication with client certificates in the go tool #30119
Comments
I think the array of possible authentication schemes is too wide, so these should be handled by a local GOPROXY that exposes the unauthenticated protocol to the client, and does whatever authentication you want to the upstream. I'm starting to think it would be nice to let GOPROXY be a binary that the go tool runs itself, so that a GOPROXY can be made even for small tasks, without having to run a network service on the local machine, which is a lot of friction. |
I think a drawback of the local GOPROXY solution is that everyone running go who has to play the authentication game would need not just set some environment variables but would have to obtain / install / keep up-to-date, and make sure |
Let's get the basic HTTP auth stuff working first (#26232) and then circle back to thinking about even more exotic authentication like TLS client certs. |
It would be very useful for us to be able to pass a client certificate to the |
There is a temporary solution. I use a MITM tool to provide client certificates.
And set
|
I'd really love to be able to use client certificates as well. |
@rsc Given that #26232, which implemented basic HTTP authentication, is now complete, could we revisit this issue and potentially bring it before the proposal committee? |
It would be useful to be able to pass to the
go
tool a client TLS certificate + key + CAcert (in environment variables or otherwise) - especially, in environments that take Zero Trust Network (ZTN) seriously and wherego
tool needs to talk to the other side (thereplace
targets) that lives in a public cloud using mutual TLS for authN/Z. The "other side" can be either a GOPROXY server or a redirector (likegolang.org
) serving the meta tags. Since one of the ZTN principles is "every network connection must be authenticated and authorized", the question is how to implement it with the go tool and the requests it initiates.Technically, it possibly comes down to how to pass desired TLS options (key/certificate/cacert filenames or such) to
tls.Config
thatgo
would use when initiating connections.The text was updated successfully, but these errors were encountered: