Browse Source

fix(etcd): reverse the cert handling

the server tls config needs the client CA information and the client
needs the pub/priv key. This is how this code used to work.
Brandon Philips 12 years ago
parent
commit
466229cf4d
1 changed files with 3 additions and 3 deletions
  1. 3 3
      etcd.go

+ 3 - 3
etcd.go

@@ -479,10 +479,10 @@ func tlsConfigFromInfo(info TLSInfo) (t TLSConfig, ok bool) {
 	}
 
 	t.Scheme = "https"
-	t.Server.Certificates = []tls.Certificate{tlsCert}
-	t.Server.InsecureSkipVerify = true
+	t.Server.ClientAuth, t.Server.ClientCAs = newCertPool(CAFile)
 
-	t.Client.ClientAuth, t.Client.ClientCAs = newCertPool(CAFile)
+	t.Client.Certificates = []tls.Certificate{tlsCert}
+	t.Client.InsecureSkipVerify = true
 
 	return t, true
 }