Merge branch 'v1.11' into rocketmq-consumer

This commit is contained in:
Hannah Hunter 2023-05-09 14:20:41 -04:00 committed by GitHub
commit 79757853fb
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 21 additions and 10 deletions

View File

@ -26,6 +26,8 @@ spec:
value: /Users/somepath/client.pem # OPTIONAL <path to client cert> or <pem encoded string> value: /Users/somepath/client.pem # OPTIONAL <path to client cert> or <pem encoded string>
- name: MTLSClientKey - name: MTLSClientKey
value: /Users/somepath/client.key # OPTIONAL <path to client key> or <pem encoded string> value: /Users/somepath/client.key # OPTIONAL <path to client key> or <pem encoded string>
- name: MTLSRenegotiation
value: RenegotiateOnceAsClient # OPTIONAL one of: RenegotiateNever, RenegotiateOnceAsClient, RenegotiateFreelyAsClient
- name: securityToken # OPTIONAL <token to include as a header on HTTP requests> - name: securityToken # OPTIONAL <token to include as a header on HTTP requests>
secretKeyRef: secretKeyRef:
name: mysecret name: mysecret
@ -42,6 +44,7 @@ spec:
| MTLSRootCA | N | Output |Path to root ca certificate or pem encoded string | | MTLSRootCA | N | Output |Path to root ca certificate or pem encoded string |
| MTLSClientCert | N | Output |Path to client certificate or pem encoded string | | MTLSClientCert | N | Output |Path to client certificate or pem encoded string |
| MTLSClientKey | N | Output |Path client private key or pem encoded string | | MTLSClientKey | N | Output |Path client private key or pem encoded string |
| MTLSRenegotiation | N | Output |Type of TLS renegotiation to be used | `RenegotiateOnceAsClient`
| securityToken | N | Output |The value of a token to be added to an HTTP request as a header. Used together with `securityTokenHeader` | | securityToken | N | Output |The value of a token to be added to an HTTP request as a header. Used together with `securityTokenHeader` |
| securityTokenHeader| N | Output |The name of the header for `securityToken` on an HTTP request that | | securityTokenHeader| N | Output |The name of the header for `securityToken` on an HTTP request that |
@ -317,6 +320,13 @@ These fields can be passed as a file path or as a pem encoded string.
- If the pem encoded string is provided, the string is used as is. - If the pem encoded string is provided, the string is used as is.
When these fields are configured, the Dapr sidecar uses the provided certificate to authenticate itself with the server during the TLS handshake process. When these fields are configured, the Dapr sidecar uses the provided certificate to authenticate itself with the server during the TLS handshake process.
If the remote server is enforcing TLS renegotiation, you also need to set the metadata field `MTLSRenegotiation`. This field accepts one of following options:
- `RenegotiateNever`
- `RenegotiateOnceAsClient`
- `RenegotiateFreelyAsClient`.
For more details see [the Go `RenegotiationSupport` documentation](https://pkg.go.dev/crypto/tls#RenegotiationSupport).
### When to use: ### When to use:
You can use this when the server with which the HTTP binding is configured to communicate requires mTLS or client TLS authentication. You can use this when the server with which the HTTP binding is configured to communicate requires mTLS or client TLS authentication.

View File

@ -10,7 +10,7 @@
link: s3 link: s3
state: Stable state: Stable
version: v1 version: v1
since: "1.0" since: "1.11"
features: features:
input: false input: false
output: true output: true

View File

@ -1,13 +1,13 @@
- component: Redis - component: Redis
link: redis-configuration-store link: redis-configuration-store
state: Alpha state: Stable
version: v1 version: v1
since: "1.5" since: "1.11"
- component: Postgres - component: Postgres
link: postgres-configuration-store link: postgres-configuration-store
state: Alpha state: Stable
version: v1 version: v1
since: "1.9" since: "1.11"
- component: Azure App Configuration - component: Azure App Configuration
link: azure-appconfig-configuration-store link: azure-appconfig-configuration-store
state: Alpha state: Alpha

View File

@ -15,7 +15,8 @@
description: Enables the [OAuth2 Client Credentials Grant flow](https://tools.ietf.org/html/rfc6749#section-4.4) on a Web API description: Enables the [OAuth2 Client Credentials Grant flow](https://tools.ietf.org/html/rfc6749#section-4.4) on a Web API
- component: OpenID Connect - component: OpenID Connect
link: /reference/components-reference/supported-middleware/middleware-bearer link: /reference/components-reference/supported-middleware/middleware-bearer
state: Alpha state: Stable
since: "1.11"
version: v1 version: v1
description: Verifies a [Bearer Token](https://tools.ietf.org/html/rfc6750) using [OpenID Connect](https://openid.net/connect/) on a Web API description: Verifies a [Bearer Token](https://tools.ietf.org/html/rfc6750) using [OpenID Connect](https://openid.net/connect/) on a Web API
- component: Rego/OPA Policies - component: Rego/OPA Policies

View File

@ -2,7 +2,7 @@
link: setup-gcp-pubsub link: setup-gcp-pubsub
state: Stable state: Stable
version: v1 version: v1
since: "1.0" since: "1.11"
features: features:
bulkPublish: false bulkPublish: false
bulkSubscribe: false bulkSubscribe: false

View File

@ -2,7 +2,7 @@
link: setup-firestore link: setup-firestore
state: Stable state: Stable
version: v1 version: v1
since: "1.0" since: "1.11"
features: features:
crud: true crud: true
transactions: false transactions: false

View File

@ -165,9 +165,9 @@
query: false query: false
- component: SQLite - component: SQLite
link: setup-sqlite link: setup-sqlite
state: Beta state: Stable
version: v1 version: v1
since: "1.10" since: "1.11"
features: features:
crud: true crud: true
transactions: true transactions: true