VaultAddress string `json:"vaultaddress"`
VaultToken string `json:"vaulttoken"`
+ DisableTLS bool `json:"disable_tls"`
}
// SMSConfig is the structure that stores the configuration
}
defer f.Close()
- SMSConfig = &SMSConfiguration{}
+ // Default behaviour is to enable TLS
+ SMSConfig = &SMSConfiguration{DisableTLS: false}
decoder := json.NewDecoder(f)
err = decoder.Decode(SMSConfig)
if err != nil {
httpRouter := smshandler.CreateRouter(backendImpl)
- // TODO: Use CA certificate from AAF
- tlsConfig, err := smsauth.GetTLSConfig(smsConf.CAFile)
- if err != nil {
- log.Fatal(err)
- }
-
httpServer := &http.Server{
- Handler: httpRouter,
- Addr: ":10443",
- TLSConfig: tlsConfig,
+ Handler: httpRouter,
+ Addr: ":10443",
}
// Listener for SIGINT so that it returns cleanly
close(connectionsClose)
}()
- err = httpServer.ListenAndServeTLS(smsConf.ServerCert, smsConf.ServerKey)
+ // Start in TLS mode by default
+ if smsConf.DisableTLS == true {
+ smslogger.WriteWarn("TLS is Disabled")
+ err = httpServer.ListenAndServe()
+ } else {
+ // TODO: Use CA certificate from AAF
+ tlsConfig, err := smsauth.GetTLSConfig(smsConf.CAFile)
+ if err != nil {
+ log.Fatal(err)
+ }
+
+ httpServer.TLSConfig = tlsConfig
+ err = httpServer.ListenAndServeTLS(smsConf.ServerCert, smsConf.ServerKey)
+ }
+
if err != nil && err != http.ErrServerClosed {
log.Fatal(err)
}
"serverkey": "auth/server.key",
"vaultaddress": "http://localhost:8200",
- "vaulttoken": "f56d2c0e-d58d-2be2-aed4-bb9931bedad2"
+ "vaulttoken": "f56d2c0e-d58d-2be2-aed4-bb9931bedad2",
+ "disable_tls": false
}