From 0bbc069faf17f06eff1891aa90e634adea67b216 Mon Sep 17 00:00:00 2001 From: voetberg Date: Fri, 14 Jun 2024 11:47:08 -0500 Subject: [PATCH] Client: Pass forward x509 cert and key #6822 --- bin/rucio | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/bin/rucio b/bin/rucio index 81267292c1..aef05462e9 100755 --- a/bin/rucio +++ b/bin/rucio @@ -234,6 +234,8 @@ def get_client(args): 'oidc_issuer': args.oidc_issuer, 'oidc_username': args.oidc_username, 'oidc_password': args.oidc_password} + elif auth_type == "x509": + creds = {'client_cert': args.certificate, "client_key": args.client_key} else: creds = None @@ -1854,7 +1856,8 @@ def get_parser(): + 'to the keys configured in the /etc/idpsecrets.json auth server configuration file.') # NOQA: W503 # Options for the x509 auth_strategy - oparser.add_argument('--certificate', dest='certificate', default=None, help='Client certificate file.') + oparser.add_argument('--certificate', dest='certificate', default=None, help='Client certificate file for x509 Authentication.') + oparser.add_argument('--client_key', dest='client_key', default=None, help='Client key for x509 Authentication.') oparser.add_argument('--ca-certificate', dest='ca_certificate', default=None, help='CA certificate to verify peer against (SSL).') # Ping command