You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Summary:
- Basic TLS support for MCP server and MCP testing client.
- Added robot test `Concurrent psql and Reverse Proxy MCP HTTPS Server Query Tool`.
returnnil, fmt.Errorf("failed to append CA certificate '%s' into trust store: no valid CERTIFICATE PEM blocks found (blocks=%d, valid=%d)", caFile, blockCount, validCerts)
107
+
} else {
108
+
logger.Infof("Successfully appended custom CA(s) from '%s'", caFile)
logger.Warnf("No CA certificates (IsCA=true) found in '%s'. If this file contains only the server leaf certificate it cannot establish standard trust. Supply the issuing CA (or chain) or enable 'promote_leaf_to_ca'.", caFile)
134
+
} else {
135
+
logger.Debugf("Detected %d CA certificate(s) in '%s'", caCount, caFile)
136
+
}
137
+
}
138
+
139
+
// Read optional flags
140
+
promoteLeaf:=false
141
+
ifv, ok:=clientCfgMap["promote_leaf_to_ca"]; ok {
142
+
b, okb:=v.(bool)
143
+
if!okb {
144
+
returnnil, fmt.Errorf("promote_leaf_to_ca must be a boolean")
145
+
}
146
+
promoteLeaf=b
147
+
}
148
+
149
+
insecureSkipVerify:=false
150
+
ifv, ok:=clientCfgMap["insecure_skip_verify"]; ok {
151
+
suppliedSkipVerify, isBool:=v.(bool)
152
+
if!isBool {
153
+
returnnil, fmt.Errorf("insecure_skip_verify must be a boolean")
154
+
}
155
+
insecureSkipVerify=suppliedSkipVerify
156
+
}
157
+
158
+
varserverNamestring
159
+
ifv, ok:=clientCfgMap["server_name"]; ok {
160
+
ifs, ok2:=v.(string); ok2 {
161
+
serverName=s
162
+
} else {
163
+
returnnil, fmt.Errorf("server_name must be a string")
164
+
}
165
+
}
166
+
167
+
// If server_name not supplied and base URL host differs from cert common name/SAN (common in IP usage),
168
+
// user should supply server_name explicitly; we just log hint.
169
+
ifserverName=="" {
170
+
ifrawURL, ok:=clientCfgMap["base_url"].(string); ok {
logger.Warnf("Promoting leaf certificate (CN=%s, SHA256=%X) to trust anchor (non-CA). NOT recommended for production.", leafCert.Subject.CommonName, fp[:8])
197
+
} else {
198
+
logger.Warnf("Promoting leaf certificate (parse error for fingerprint: %v)", perr)
199
+
}
200
+
tlsConfig.InsecureSkipVerify=true// we will verify manually
0 commit comments