-
Notifications
You must be signed in to change notification settings - Fork 37
server: propagate TLS flags to tiflow options #4083
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
server: propagate TLS flags to tiflow options #4083
Conversation
Summary of ChangesHello @wlwilliamx, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request addresses a critical issue in TiCDC's old architecture mode where TLS configuration was not correctly propagated to the underlying tiflow server when using command-line flags. The changes ensure that TLS credentials are properly transferred, allowing TiCDC to successfully connect to HTTPS PD endpoints, thereby enhancing secure communication without breaking existing functionality. Highlights
🧠 New Feature in Public Preview: You can now enable Memory to help Gemini Code Assist learn from your team's feedback. This makes future code reviews more consistent and personalized to your project's style. Click here to enable Memory in your admin console. Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
📝 WalkthroughWalkthroughThe PR introduces a new helper function Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~12 minutes Poem
🚥 Pre-merge checks | ✅ 4 | ❌ 1❌ Failed checks (1 warning)
✅ Passed checks (4 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing touches
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request correctly addresses an issue with TLS flag propagation for the old architecture mode. The introduction of buildTiFlowServerOptions is a good refactoring that improves code clarity and testability. The accompanying test case thoroughly validates the fix. I have a couple of minor suggestions to enhance error handling to be more consistent with the existing codebase.
|
/test all |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: 3AceShowHand, wk989898 The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
[LGTM Timeline notifier]Timeline:
|
|
/retest |
1 similar comment
|
/retest |
What problem does this PR solve?
Issue Number: close #4082
What is changed and how it works?
In old architecture mode, TiCDC delegates to
github.com/pingcap/tiflow/pkg/cmd/serverbut reuses TiCDC's cobra command, so cobra flags are bound to TiCDC's options instead of tiflow's.tiflow
Options.complete()rebuildsServerConfig.SecurityfromtiflowServer.Options.CaPath/CertPath/KeyPath, so TiCDC must propagate TLS flag values into those fields. Otherwise, when TLS flags are present on the CLI, tiflow sees them as visited but with empty values, overwrites the security config to empty, and fails https PD endpoint validation.This PR adds a small adapter function to build tiflow server options and explicitly fills
CaPath/CertPath/KeyPath/AllowedCertCN.Check List
Tests
go test ./cmd/cdc/server -run TestBuildTiFlowServerOptionsPropagatesTLSFlags)Questions
Will it cause performance regression or break compatibility?
No. This only affects old architecture mode's delegation path and only changes how TLS flags are propagated to tiflow options.
Do you need to update user documentation, design documentation or monitoring documentation?
N/A
Release note
Summary by CodeRabbit
✏️ Tip: You can customize this high-level summary in your review settings.