tyk
tyk copied to clipboard
[TT-11672] Update description of CertificatesConfig.Upstream
User description
Description
The tyk-docs repository has had a PR raised that proposes a config description update for CertificatesConfig.Upstream within the autogenerated Gateway config file from source. This PR has been created on behalf of @matthewdickinson with proposed change for review. Once reviewed and if approved, the fix would need to be synced into docs repository.
Related Issue
Motivation and Context
How This Has Been Tested
Screenshots (if appropriate)
Types of changes
- [ ] Bug fix (non-breaking change which fixes an issue)
- [ ] New feature (non-breaking change which adds functionality)
- [ ] Breaking change (fix or feature that would cause existing functionality to change)
- [ ] Refactoring or add test (improvements in base code or adds test coverage to functionality)
Checklist
- [ ] I ensured that the documentation is up to date
- [ ] I explained why this PR updates go.mod in detail with reasoning why it's required
- [ ] I would like a code coverage CI quality gate exception and have explained why
Type
documentation
Description
- Updated the
CertificatesConfig.Upstreamdocumentation inconfig/config.goto improve clarity on how to specify upstream mutual TLS certificates globally. This includes a more detailed description and examples for bothtyk.confand environmental variable configurations.
Changes walkthrough
| Relevant files | |||
|---|---|---|---|
| Documentation |
|
✨ PR-Agent usage: Comment
/helpon the PR to get a list of all available PR-Agent tools and their descriptions
API Changes
--- prev.txt 2024-08-29 14:31:47.118547887 +0000
+++ current.txt 2024-08-29 14:31:44.190540201 +0000
@@ -5252,7 +5252,10 @@
type CertificatesConfig struct {
API []string `json:"apis"`
- // Specify upstream mutual TLS certificates at a global level in the following format: `{ "<host>": "<cert>" }``
+ // Upstream is used to specify the certificates to be used in mutual TLS connections to upstream services. These are set at gateway level as a map of domain -> certificate id or path.
+ // For example if you want Tyk to use the certificate `ab23ef123` for requests to the `example.com` upstream and `/certs/default.pem` for all other upstreams then:
+ // In `tyk.conf` you would configure `"security": {"certificates": {"upstream": {"*": "/certs/default.pem", "example.com": "ab23ef123"}}}`
+ // And if using environment variables you would set this to `*:/certs/default.pem,example.com:ab23ef123`.
Upstream map[string]string `json:"upstream"`
// Certificates used for Control API Mutual TLS
ControlAPI []string `json:"control_api"`
PR Description updated to latest commit (https://github.com/TykTechnologies/tyk/commit/1ace166055394edabdfe1556b78c9b558bc511c8)
PR Review
| ⏱️ Estimated effort to review [1-5] |
1, because the PR involves a straightforward documentation update within the code. It updates comments to provide clearer instructions on how to configure upstream mutual TLS certificates. The change is limited to comments and does not affect the functionality of the code, making it a quick and easy review. |
| 🧪 Relevant tests |
No |
| 🔍 Possible issues |
No |
| 🔒 Security concerns |
No |
Code feedback:
| relevant file | config/config.go |
| suggestion |
Consider adding examples for more complex configurations if applicable. This could help users understand how to handle scenarios with multiple certificates or more intricate setups. [medium] |
| relevant line | // In tyk.conf, this would be `"security": {"certificates": {"upstream": {"*": "/certs/default.pem", "example.com": "ab23ef123"}}},`; as an environmental variable it would be |
✨ Review tool usage guide:
Overview:
The review tool scans the PR code changes, and generates a PR review. The tool can be triggered automatically every time a new PR is opened, or can be invoked manually by commenting on any PR.
When commenting, to edit configurations related to the review tool (pr_reviewer section), use the following template:
/review --pr_reviewer.some_config1=... --pr_reviewer.some_config2=...
With a configuration file, use the following template:
[pr_reviewer]
some_config1=...
some_config2=...
Utilizing extra instructionsThe Be specific, clear, and concise in the instructions. With extra instructions, you are the prompter. Specify the relevant sub-tool, and the relevant aspects of the PR that you want to emphasize. Examples for extra instructions:
Use triple quotes to write multi-line instructions. Use bullet points to make the instructions more readable. |
How to enable\disable automation
meaning the |
Auto-labelsThe
|
Extra sub-toolsThe |
Auto-approve PRsBy invoking:
The tool will automatically approve the PR, and add a comment with the approval. To ensure safety, the auto-approval feature is disabled by default. To enable auto-approval, you need to actively set in a pre-defined configuration file the following:
(this specific flag cannot be set with a command line argument, only in the configuration file, committed to the repository) You can also enable auto-approval only if the PR meets certain requirements, such as that the
|
More PR-Agent commands
|
See the review usage page for a comprehensive guide on using this tool.
PR Code Suggestions
| Category | Suggestions |
| Maintainability |
Break down the long comment into multiple lines for better readability.Consider breaking down the long comment into multiple lines to adhere to Go's convention
|
✨ Improve tool usage guide:
Overview:
The improve tool scans the PR code changes, and automatically generates suggestions for improving the PR code. The tool can be triggered automatically every time a new PR is opened, or can be invoked manually by commenting on a PR.
When commenting, to edit configurations related to the improve tool (pr_code_suggestions section), use the following template:
/improve --pr_code_suggestions.some_config1=... --pr_code_suggestions.some_config2=...
With a configuration file, use the following template:
[pr_code_suggestions]
some_config1=...
some_config2=...
Enabling\disabling automationWhen you first install the app, the default mode for the improve tool is:
meaning the |
Utilizing extra instructionsExtra instructions are very important for the Be specific, clear, and concise in the instructions. With extra instructions, you are the prompter. Specify relevant aspects that you want the model to focus on. Examples for extra instructions:
Use triple quotes to write multi-line instructions. Use bullet points to make the instructions more readable. |
A note on code suggestions quality
|
More PR-Agent commands
|
See the improve usage page for a more comprehensive guide on using this tool.
Please retry analysis of this Pull-Request directly on SonarCloud
@dcs3spp Is there anything you need me to do to move this along, or is it still waiting for reviews?
@dcs3spp Is there anything you need me to do to move this along, or is it still waiting for reviews?
@dcs3spp Is there anything I can do to help correct this documentation or is that fix being handled elsewhere?
Hi @lghiur @tbuchaillot would it be possible to review and merge PR for @matthewdickinson ?
Thanks @andrei-tyk @andyo-tyk @jeffy-mathew @lghiur I have updated branch and reran CI checks. Ci checks now passing. @matthewdickinson I will merge PR to master branch. This will appear in the next scheduled release.
Quality Gate passed
Issues
0 New issues
0 Accepted issues
Measures
0 Security Hotspots
0.0% Coverage on New Code
0.0% Duplication on New Code