Allow ssl.endpoint.identification.algorithm config #417
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Problem
kcat does not allow users to set the
ssl.endpoint.identification.algorithm
property in config files.One can verify this behavior by creating a config file with
ssl.endpoint.identification.algorithm=<non_default_value>
and runningkcat -F <config_file> -X dump
This causes friction for folks that wish to use config files and rely on (m)TLS but do not use CN/SAN based verification.
Note that one can specify the aforementioned config value via command line args.
Background
none
tohttps
(enabling hostname verification).I imagine this issue has gone unnoticed due to (2); folks tend not to notice that a TLS feature is disabled until you enable it 😅.