Merge branch 'v1.11' into rocketmq-consumer

This commit is contained in:
Hannah Hunter 2023-05-09 14:20:41 -04:00 committed by GitHub
commit 79757853fb
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 21 additions and 10 deletions

View File

@ -26,6 +26,8 @@ spec:
value: /Users/somepath/client.pem # OPTIONAL <path to client cert> or <pem encoded string>
- name: MTLSClientKey
value: /Users/somepath/client.key # OPTIONAL <path to client key> or <pem encoded string>
- name: MTLSRenegotiation
value: RenegotiateOnceAsClient # OPTIONAL one of: RenegotiateNever, RenegotiateOnceAsClient, RenegotiateFreelyAsClient
- name: securityToken # OPTIONAL <token to include as a header on HTTP requests>
secretKeyRef:
name: mysecret
@ -42,6 +44,7 @@ spec:
| MTLSRootCA | N | Output |Path to root ca certificate or pem encoded string |
| MTLSClientCert | N | Output |Path to client certificate or pem encoded string |
| MTLSClientKey | N | Output |Path client private key or pem encoded string |
| MTLSRenegotiation | N | Output |Type of TLS renegotiation to be used | `RenegotiateOnceAsClient`
| securityToken | N | Output |The value of a token to be added to an HTTP request as a header. Used together with `securityTokenHeader` |
| securityTokenHeader| N | Output |The name of the header for `securityToken` on an HTTP request that |
@ -317,6 +320,13 @@ These fields can be passed as a file path or as a pem encoded string.
- If the pem encoded string is provided, the string is used as is.
When these fields are configured, the Dapr sidecar uses the provided certificate to authenticate itself with the server during the TLS handshake process.
If the remote server is enforcing TLS renegotiation, you also need to set the metadata field `MTLSRenegotiation`. This field accepts one of following options:
- `RenegotiateNever`
- `RenegotiateOnceAsClient`
- `RenegotiateFreelyAsClient`.
For more details see [the Go `RenegotiationSupport` documentation](https://pkg.go.dev/crypto/tls#RenegotiationSupport).
### When to use:
You can use this when the server with which the HTTP binding is configured to communicate requires mTLS or client TLS authentication.

View File

@ -10,7 +10,7 @@
link: s3
state: Stable
version: v1
since: "1.0"
since: "1.11"
features:
input: false
output: true

View File

@ -1,13 +1,13 @@
- component: Redis
link: redis-configuration-store
state: Alpha
state: Stable
version: v1
since: "1.5"
since: "1.11"
- component: Postgres
link: postgres-configuration-store
state: Alpha
state: Stable
version: v1
since: "1.9"
since: "1.11"
- component: Azure App Configuration
link: azure-appconfig-configuration-store
state: Alpha

View File

@ -15,7 +15,8 @@
description: Enables the [OAuth2 Client Credentials Grant flow](https://tools.ietf.org/html/rfc6749#section-4.4) on a Web API
- component: OpenID Connect
link: /reference/components-reference/supported-middleware/middleware-bearer
state: Alpha
state: Stable
since: "1.11"
version: v1
description: Verifies a [Bearer Token](https://tools.ietf.org/html/rfc6750) using [OpenID Connect](https://openid.net/connect/) on a Web API
- component: Rego/OPA Policies

View File

@ -2,7 +2,7 @@
link: setup-gcp-pubsub
state: Stable
version: v1
since: "1.0"
since: "1.11"
features:
bulkPublish: false
bulkSubscribe: false

View File

@ -2,7 +2,7 @@
link: setup-firestore
state: Stable
version: v1
since: "1.0"
since: "1.11"
features:
crud: true
transactions: false

View File

@ -165,9 +165,9 @@
query: false
- component: SQLite
link: setup-sqlite
state: Beta
state: Stable
version: v1
since: "1.10"
since: "1.11"
features:
crud: true
transactions: true